Bushehr pic newer.
(photo credit: ASSOCIATED PRESS)
The German computer security expert who first reported that the Stuxnet worm was designed to attack targets in Iran said the virus specifically attacked the country's nuclear program, in a report posted Friday.
RELATED:Iranian defense minister: Stuxnet had no impact Security and Defense: Nuclear worming Iran: We've learned how to fight Stuxnet computer worm
In his analysis, Ralph Langner said Stuxnet contained two distinct "digital warheads," specifically designed to attack military targets: Uranium enrichment plants and the Bushehr nuclear power plant.
Langner said that the portion of the worm that targeted Uranium enrichment plants manipulated the speeds of mechanical parts in the enrichment process, which would ultimately "result in cracking the rotor, thereby destroying the centrifuge."
He said the strategic importance of such an attack is that it was able
to "attack and destroy centrifuge facilities that are unknown to IAEA
inspectors and the world," saying that this was likely the main goal of
the worm's first "warhead."
The second "warhead" targeted the Bushehr nuclear plant, according to
Langner's report. Explaining how the program was designed to work, he
notes that this segment of code had no relation to the first "warhead."
He purported that the second segment was intended to attack the external
turbine controller of the Bushehr plant, a 150 foot "chunk of metal,"
that could "destroy the turbine as effectively as an air strike."
Praising the sophistication of the attack code, Langner said, "it is
obvious that several years of preparation went into the design of this
attack." Describing the technological advancement it represents, he
compared it to "the arrival of an F-35 fighter jet on a World War I
battlefield." He called the technology, "much superior to anything ever
seen before, and to what was assumed possible."