About Me

My photo
I Am Hamza Subedar in 14th And Doing Software Engineer And Like To Solve Computer and Of Any Gadgets Problem I Like To Tell People That I Can Help To Solve Your Problem Anyways Bolg Me And Get your Problem Solve

Followers

Thursday, June 7, 2012

Israeli Backed Terrorists Launched Stuxnet Virus

It turned out that the Stuxnet virus, responsible for putting back Iran’s nuclear program by some years, was launched by an Israeli backed terrorist group.

iran-flag-image.jpg


US intelligence officials admitted that one of the members of the Mujahedeen-e-Khalq (MEK) is believed to use a corrupt memory stick. It’s the same Israeli proxies that have been bumping off Iran’s nuclear scientists, according to these sources. Vince Cannistraro, an ex-head of the CIA’s Counter terrorism unit, was cited in IS Source when he said that the MEK was being used as the assassination arm of Israel’s Mossad intelligence service.

It turned out that the dissidents had a functioning, effective network inside the targeted country and access to officials in the nuclear program. The Mujahedeen-e-Khalq was founded back in the 1970s. From the beginning, the organization was stridently anti-Shah and later allied itself with the dictatorship of Iraq’s Saddam Hussein. The outfit is known for helping him kill domestic opponents as well as the massacre of Iraqi Shias and Kurds during the 1991 uprising. The MEK is also known for conducting killings in Paris, including 6 or 7 American Army sergeants. Unsurprisingly, the French were really terrified of the organization.

That’s how the system was infected: a saboteur at the Natanz nuclear facility, who appeared to be a member of an Iranian dissident group, did it with an infected memory stick. Thanks to that memory stick, Stuxnet managed to infiltrate the entire network and take over the system. The representatives of the United States claimed they think the infection started when the user clicked on the associated icon in Windows. A number of the reports revealed that it was a direct application of one of the zero-day vulnerabilities the malware used. 

No comments:

Post a Comment