The engineer served as a mole for the intelligence agency and succeeded in delivering the
Stuxnet virus via a USB drive.
Iranian Minister of Information and Communications Technology Mohammad Javad Azari Jahromi revealed that Tehran had developed an indigenous firewall securing its sensitive industrial facilities against
Stuxnet, a cyber-weapon widely believed to be made by the US and Israel and used in the past to target the Islamic Republic's nuclear energy program.
The
Stuxnet attack exploited four such vulnerabilities.
It was said that the success of
Stuxnet - in both forms - averted a planned military strike by Israel against Iran's reprocessing efforts in 2011.
Various teams of cyber experts from around the world began dissecting the code of this cyber worm, which became known as
Stuxnet, and debates grew over its origin and targets.
Stuxnet security flaw was first spotted by German security researcher Michael Heerklotz.
Stuxnet was used to take Iran's uranium centrifuges offline by
A new version of
Stuxnet was compiled and time-stamped on June 22, 2009, the day hard-line candidate Mahmoud Ahmadinejad was officially declared the winner of a contested presidential election.
Woodward pointed that once
Stuxnet was released, its spread was impossible to predict or control because the code intended for Iranian nuclear enrichment facilities attacked Siemens control systems, including electrical generation plants, factories and water treatment works.
The US and Israel were said to be behind a (http://www.ibtimes.co.uk/articles/425562/20130118/warns-iranian-cyber-capabilites.htm)
Stuxnet attack on the Natanz nuclear plant in Iran in January.
On June 1, 2012, The New York Times revealed that
Stuxnet was part of a wave of sophisticated digital attacks codenamed "Olympic Games," which US President Barack Obama had ordered against the computer systems that run Iran's main nuclear enrichment facilities.
Understanding the Implication of
Stuxnet. Aby Tehranipour, Eastern Michigan University