USB Stuxnet Launch Code!

Author: Henry Dalziel | July 14, 2017
Category: USB Hacking

Yup. That’s right. If you want to put Uranium producing centrifuges out of business then we got you. Our set up includes the world’s fastest USB to make sure that this bad-boy worm infects your Nuclear Processing Plant of choice. Stuxnet specifically targets programmable logic controllers (PLCs) thereby allowing for the (nefarious) automation of electromechanical processes such as those used to control machinery on factory assembly lines, amusement rides, or centrifuges for separating nuclear material. Exploiting four zero-day flaws, Stuxnet functions by targeting machines using the Microsoft Windows operating system (what else FFS) and networks, then seeking out Siemens Step7 software. President Mahmoud Ahmadinejad got in touch with us here at hacker.equipment and was completely bent out of shape when his System Admin told him about the breach. Apparently Stuxnet compromised his PLCs causing the fast-spinning centrifuges to tear themselves apart. By the way, Stuxnet’s design and architecture are not domain-specific and it could be tailored as a platform for attacking modern SCADA and PLC systems, the majority of which reside in Europe, Japan and the US. Stuxnet has three modules: a worm that executes all routines related to the main payload of the attack; a link file that automatically executes the propagated copies of the worm; and a rootkit component responsible for hiding all malicious files and processes, preventing detection of the presence of Stuxnet. Nice. Stuxnet is typically introduced to the target environment via an infected fast-delivering USB flash drive which we have kindly included in the above link for you. You’re welcome.