Advertisement
"The operators were doomed, the plant was doomed," Eric Chien, a security researcher at Symantec who tore apart Stuxnet for months, says.The attack was so well-done that the virus worked undetected for months, and its victims didn't know about it until security companies around the world discovered it and started talking about it.At the time, the security world gasped at the sophistication of Stuxnet. No one had ever seen anything like it. Obviously, everyone was wondering who could have been behind such advanced and unprecedented malware, which is perhaps the only one—at least that we know of—to really warrant the definition of "cyberweapon."To this day, the "whodunnit," at least officially, is unknown. No country has ever claimed or admitted responsibility. But six years later, it's widely assumed that the United States and Israel were the culprits.As Kim Zetter, the author of Countdown to Zero Day (the definitive book on Stuxnet) puts it, "I don't think that there's a question that the US is behind it." In 2012 The New York Times reported that the US government ordered the attack, which it was officially dubbed Olympic Games.In this week's episode of the SBS VICELAND documentary series CYBERWAR, Zetter refers to the years-long internal investigation that the US government launched after that New York Times article to find the leaker as one of the many signs pointing towards the US government."You don't launch a leak investigation for a covert operations you didn't do," she says."The operators were doomed, the plant was doomed."