Grant Gross
Senior Writer

Report: Obama ordered Stuxnet attacks on Iran

news
Jun 1, 20124 mins

The worm, developed by U.S. and Israeli agencies, targeted Iran's nuclear program, according to the New York Times

U.S. President Barack Obama ordered the Stuxnet cyber attacks on Iran in an effort to slow the country’s development of a nuclear program, according to a report in The New York Times.

The Times, quoting anonymous sources, reported that, in the early days of his presidency, Obama accelerated attacks related to an effort begun by the George W. Bush administration. The Stuxnet worm, long rumored to have been developed by Israel or the U.S., escaped from Iranian computers in mid-2010 and compromised computers across the Internet.

[ Keep up on the day’s tech news headlines with InfoWorld’s Today’s Headlines: Wrap Up newsletter. ]

Obama considered shutting down the cyber attacks after Stuxnet began compromising other computers, but decided to continue with the program, according to the Times. The Stuxnet worm came from a joint U.S. and Israeli effort to target the Iranian nuclear program, the Times said. The newspaper interviewed U.S., Israeli and European officials currently and formerly involved with the cyber attack program, it said.

Stuxnet was discovered in July 2010, when a Belarus-based security company detected the worm on computers belonging to an Iranian client. The consensus of security experts at the time was that Stuxnet was built by a sophisticated attacker, likely a nation state, and was designed to destroy something big, such as Iran’s Bushehr nuclear reactor. Security experts examining the worm when it was first discovered said that it placed its own code into systems installed with Siemens software, after detecting a certain type of Programmable Logic Controller (PLC) device.

A White House spokesman declined to comment on The New York Times story.

Obama raised concerns that the Stuxnet program, code-named Olympic Games, would embolden other countries, terrorists and hackers to use similar attacks, but concluded that the U.S. had no other options available against Iran, the Times story said.

The goal of the attacks was to gain access to the industrial computer controls in Iran’s Natanz nuclear plant, the story said. The U.S. National Security Agency and a secret Israeli cyber unit developed the Stuxnet worm, the story said.

The report that the U.S. and Israel were behind the Stuxnet attack didn’t surprise Snorre Fagerland, senior virus analyst with Norman, an IT security vendor in Lysaker, Norway. The Stuxnet worm was “orders of magnitude” more complex and sophisticated than previous cyberattacks, he said, and the creation of the malware would have needed significant resources.

It would have taken a team of 10 to 20 people to write Stuxnet, Fagerland said.

The report of U.S. involvement may lead to an increase in cyberattacks, with other countries stepping up their offensive cybercapabilities, Fagerland said. “It raises the stakes,” he said. “That will cause others to think, ‘They’re doing it, so why shouldn’t we?'”

While several other countries may have offensive cybercapabilities, they appear to be “less organized” than the team that put together Stuxnet, he added.

Stuxnet was sophisticated, but it was not difficult to copy after it was made public, said Bit9’s Sverdlove. Iran recently announced it’s been attacked by the Flame worm, a piece of malware that’s 40 times the size of the original Stuxnet, he noted. “Now the bar has been raised yet again,” he said.

The report that the U.S. and Israel were behind Stuxnet will have broad geopolitical consequences, with more nations considering cyberattacks, he added.

“The problem is that the barrier to entry to have even a moderately sophisticated cyber program is pretty small,” Sverdlove said. “[Stuxnet] was a significant development effort. Now someone else can do this with a handful of guys in a garage.”

Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant’s email address is grant_gross@idg.com.

Grant Gross

Grant Gross, a senior writer at CIO, is a long-time IT journalist who has focused on AI, enterprise technology, and tech policy. He previously served as Washington, D.C., correspondent and later senior editor at IDG News Service. Earlier in his career, he was managing editor at Linux.com and news editor at tech careers site Techies.com. As a tech policy expert, he has appeared on C-SPAN and the giant NTN24 Spanish-language cable news network. In the distant past, he worked as a reporter and editor at newspapers in Minnesota and the Dakotas. A finalist for Best Range of Work by a Single Author for both the Eddie Awards and the Neal Awards, Grant was recently recognized with an ASBPE Regional Silver award for his article “Agentic AI: Decisive, operational AI arrives in business.”

More from this author