Stuxnet debuted with a frenzy in 2010 after researchers exposed the malware already busily disrupting Iran s nuclear enrichment program. The most troubling buzz of 2011 was that many of the vulnerabilities exploited by the worm remain unpatched. Nobody has stepped forward to take credit for crafting the disruptive worm, experts say. Basic errors in the original StuxNET code made the malware less effective and easier to detect than it might have been. The mistakes likely also mean that the programmers behind the attack may not have been the super-elite cadre of state-sponsored developers we ve been led to.
Source: https://threatpost.com/stuxnet-finger-pointing/91887/

