How the World’s First CYBERWEAPON destroyed physical objects!

Поделиться
HTML-код
  • Опубликовано: 18 май 2024
  • Sign up for ESET Home internet security for FREE: www.eset.com/us/protecting-ar...
    ESET is sponsoring the STARMUS festival in Bratislava, Slovakia May 12-17, 2024: www.starmus.com/
    TALK TO ME on Patreon:
    / arvinash
    REFERENCES:
    How ChatGPT works: • So How Does ChatGPT re...
    CSOonline Stuxnet article: tinyurl.com/yovpvh5m
    Anatomy of Stuxnet: tinyurl.com/2xjkpqxe
    Medium article on Stuxnet: tinyurl.com/233j7dj8
    Avast article on Stuxnet: www.avast.com/c-stuxnet
    IEEE article: www.avast.com/c-stuxnet
    Significance of Stuxnet: tinyurl.com/267jugyp
    News Story about Nanatz attack: tinyurl.com/28kjgoe3
    CHAPTERS:
    0:00 How Stuxnet started
    1:58 Who created Stuxnet & Why
    3:54 How Stuxnet worked
    6:33 How Stuxnet was detected
    9:54 What Stuxnet implies for the future of hacking
    11:44 ESET is a way to protect yourself (sponsor)
    SUMMARY:
    It is thought that a person working at an Iranian nuclear facility inserted a malware-infected USB drive into a computer. This malware is called Stuxnet and was developed by the USA and Israel specifically to damage Iranian centrifuges which were involved in enriching Uranium for development of a nuclear bomb. This set the Iranian nuclear program back by about 2 years.
    This was the first known case of physical equipment being damaged by malware. It was the first case of cyber warfare.
    The year was about 2005. This particular malware was designed in such a way that it mostly stayed dormant and made such subtle changes over such a long period of time, that no one noticed it for years.
    #stuxnet
    #virus
    It was designed specifically to target PLCs, that is Programmable Logic Controllers. These are industrial computers that control industrial processes. In this case the target was centrifuges.
    Iran had gone to great lengths to ensure security. For example the facility’s computers were not physically connected to any computer outside the facility. This is called an air gap. So there was seemingly no way to infiltrate these computers remotely via any kind of internet or extranet.
    Stuxnet exploited at least 4 previously unknown Windows vulnerabilities. These are called zero day vulnerabilities - they are security flaws for which the vendor has not yet made a patch. Stuxnet was "discovered" in 2010, but it’s estimated that development on it probably began in 2005 under the George W Bush and Barak Obama administrations.
    These administrations believed that if Iran were to develop atomic weapons, Israel would launch airstrikes against them, which could trigger a major conflict and destabilize the region. Developing and unleashing a cyberwarfare software weapon was seen as a nonviolent alternative. The program was labeled Operation Olympic Games.
    It was designed to destroy the centrifuges that Iran was using to enrich uranium for its nuclear bomb program. Why is enrichment needed? Because Mined Uranium has only a small fraction of fissile U235 of 0.7%. It has to be at least 90% U235 in order to be used in a nuclear weapon. A centrifuge is used to spin uranium fast enough to separate the lighter U235 isotope from U238. The nature of these centrifuges is such that they tend to have a short lifetime. They get damaged in normal operation. But Stuxnet was able to damage many more than in normal operation.
    Stuxnet altered Siemens PLC programming which caused the centrifuges to spin irregularly, damaging or destroying them more often in the process. And even more brilliantly, while this malfunction was happening, the worm used a vulnerability in the Siemens software to change the PLCs programming so that it would tell all the controlling computers that nothing was wrong. So it infected both the computer software and the control software running the PLCs.
    How was the Stuxnet worm eventually detected? Only after it unexpectedly spread beyond the air gap of the Iranian nuclear facility. No one knows exactly how it got out.
    Kaspersky lab estimates that it took a team of at least 10 developers 3 years to develop the worm.
    Neither the US nor Israel have officially admitted to creating Stuxnet, and none of its developers have ever come forward.
    Stuxnet showed, for the first time, that malware can actually affect the physical world, not just your PC or digital data. In this case it was destroying centrifuges. But subsequent cyberattacks have targeted other types of machines, for example Industroyer, developed by Russia-sponsored hackers, targeted industrial control systems and disrupted the Ukranian power grid in 2016. Stuxnet showed that almost nothing is off limits to hackers intent on malice. A hacker could conceivably take over and put such devices under the control of a malicious entity. Imagine someone taking over your IV drug dosage remotely while you’re in the hospital, or remotely driving your car.
  • НаукаНаука

Комментарии • 287

  • @ArvinAsh
    @ArvinAsh  14 дней назад +20

    A few notable details about Stuxnet not included in the video, that we learned during our research, and also sent to us by an anonymous source:
    1) STUXNET was an encrypted virus that remained benign until very particular preconditions were met. It unpacked only what was necessary to achieve the next objective, which allowed it to infect millions of devices globally while only damaging centrifuges in an Iranian nuclear facility.
    2) STUXNET was the first known virus to have affected physical objects
    3) STUXNET was so precise that it targeted serial numbers of the hardware within the Iranian nuclear enrichment plant.
    4) STUXNET evolved and was able to incorporate updates into its base payload. This is believed to have been possible because of the high global infection rate, which allowed newer variants to be released anywhere and eventually update the virus at the target area.
    5) DUQU preceded STUXNET and remained undetected for years after STUXNET was discovered. DUQU was a network mapping program and keylogger that relayed exact information back to the source. This information was used to update STUXNET making it very precise, which allowed it to target specific networks, manufacturers, hardware, serial numbers, etc.
    6) STUXNET/DUQU were used to target and assassinate specific scientists of the Iranian enrichment program (* NOTE: This is from an anonymous source. We have not confirmed this)
    7) STUXNET is about 15 years old! Modern malware is probably an order of magnitude more sophisticated - scary!

    • @LaltidevuGupta
      @LaltidevuGupta 14 дней назад +1

      Arvin Sir, anti-virus (solutions) creators are actually the first people to create viruses (problems).

    • @LaltidevuGupta
      @LaltidevuGupta 14 дней назад +1

      Why suddenly this universe content creator talks about computers?!?!?

    • @dziban303
      @dziban303 14 дней назад +1

      @@LaltidevuGupta because he's doing an ad for an anti-virus vendor, come on man watch the video. everybody needs to eat, and this is an interesting topic

    • @Kaizzer
      @Kaizzer 13 дней назад +1

      @@dziban303 and, at least it's about a real practical technical issue about nuclear physics

    • @ArvinAsh
      @ArvinAsh  12 дней назад +3

      @@LaltidevuGupta I cover science and tech, not always cosmology.

  • @dziban303
    @dziban303 14 дней назад +72

    Y'all would be horrified if you knew just how bad industrial and infrastructure cybersecurity remains to this day

    • @ArvinAsh
      @ArvinAsh  14 дней назад +14

      indeed.

    • @mikapeltokorpi7671
      @mikapeltokorpi7671 14 дней назад +6

      10 years ago it was mostly WinCe. Also in hospitals. A French water power plant and a US steel mill had RDP ports open to the world in their computer systems. That water dam/power mill was warned about the fact over dozen times and it still did not make any action.

    • @Kedvespatikus
      @Kedvespatikus 14 дней назад +4

      Most of the companies I inspected prefer to learn it in the hard way. Ransomware criminals are happy with it.

    • @ThePaulv12
      @ThePaulv12 14 дней назад +1

      Not really when you read about all the personal data that is exposed almost on a daily basis from every organization from medical insurance to electricity companies. Daily just about.
      What you're saying is very obviously true.

    • @dziban303
      @dziban303 14 дней назад +3

      @@ThePaulv12 Your name and address being exposed is a personal tragedy. The water treatment plant getting shut down is a collective one (and is sometimes easier to do).

  • @Grandy_UiD
    @Grandy_UiD 14 дней назад +12

    The "right now" at the beginning of each video just always makes me smile. Arvin delivers is with such joy, it's simply contagious.

    • @ArvinAsh
      @ArvinAsh  14 дней назад +2

      Much appreciated! Thanks for watching.

  • @DeconvertedMan
    @DeconvertedMan 15 дней назад +39

    "I found this on the ground! I'll just plug it into my computer what could go wrong?!"

    • @thexanderthemander
      @thexanderthemander 15 дней назад +18

      * my work computer at a secret nuclear processing facility

    • @dziban303
      @dziban303 14 дней назад +13

      these days you can't even trust USB sticks you order from Amazon. Tons of examples of low cost noname brand USB drives and SD cards shipping out with unexpected bonus software included.

    • @Mr-wv1tu
      @Mr-wv1tu 14 дней назад

      @@dziban303 really? I'm not saying you're wrong, not at all, it's just new information for me.
      Do you have any specific links? Thanks.

    • @Techmagus76
      @Techmagus76 14 дней назад

      well that was just a made up version of the famous Bruce Schneier story from the late 1990s (not sure if he was the first one, but for sure he made the story famous, paid for a white hack from outside as security check at a finance institute and could not find a way in as anything from outside was just blocked, after 4 weeks of trial and error he dropped 30 usb sticks and 2 hours later more then half were plugged in). Intelligence service agencies haven't really a well known reputation for telling the true story of an attack vector that was used and misleading is their basic business.
      The surprising and most interesting part of the story was that Siemens were contacted by the Indian Nuclear facility at Busher too as they had issues with a much higher failure rate of the centrifuges. How could that had happened if Irans Nuclear program was attacked, could it be they worked together even if India always denied that.

    • @SB-qm5wg
      @SB-qm5wg 14 дней назад

      It was a Dutchman working for the alphabet bros. Search Operation Olympic Games

  • @effwitt
    @effwitt 13 дней назад +9

    The fact that the thumb drive appeared to be in the original packaging was a clever twist. No way I would have picked one up off the ground and used one otherwise.

    • @ArvinAsh
      @ArvinAsh  13 дней назад +3

      Exactly. The agents who planted it knew that too.

    • @ticketforlife2103
      @ticketforlife2103 12 дней назад

      ​@ArvinAsh can you not call them agents? They are spies and terrorist

  • @TheElectra5000
    @TheElectra5000 14 дней назад +10

    "Oh, yeah, let's install Windows in our nuclear weapons program... What could possibly go wrong?"

    • @ArvinAsh
      @ArvinAsh  14 дней назад +3

      Lol. great point.

    • @gakwayadavid1558
      @gakwayadavid1558 5 дней назад

      No, the issue is not windows, any operating system can easily be hacked, whether mac, Linux, android, ios... Look at Pegasis, it targets ios and androids... And it's very successful and pretty scary

  • @RobMacMusic
    @RobMacMusic 14 дней назад +22

    Now I know why my 168 centrifuges keep malfunctioning. I'll try 166.

  • @ronch550
    @ronch550 14 дней назад +5

    This is one of my favorite RUclips channels.

  • @nerdexproject
    @nerdexproject 14 дней назад +3

    Super fascinating! More pls! :)

  • @danielduarte5073
    @danielduarte5073 14 дней назад +1

    Well done!

  • @JayakrishnanNairOmana
    @JayakrishnanNairOmana 2 дня назад

    This gotta be the best sponsor ad on RUclips. I cant decide if I just watched so intently for 14 mins only to be sold on a cyber security product by an ad. Who came first, the sponsor or the idea?

  • @b4fball
    @b4fball 14 дней назад +3

    wow, this was really interesting!

  • @ISK_VAGR
    @ISK_VAGR 14 дней назад +3

    Super cool topic…!

  • @alisharifian535
    @alisharifian535 14 дней назад +28

    Israel has killed key people in nuclear program and has blown up the facilities many times. The Stuxnet case was one of the incidents.

    • @PhucNguyen-vf1zt
      @PhucNguyen-vf1zt 14 дней назад

      cool

    • @alisharifian535
      @alisharifian535 14 дней назад +1

      @@PhucNguyen-vf1zt Yes but keeps middle east quite warm and escalated.

    • @user-pf8hs7nv6z
      @user-pf8hs7nv6z 14 дней назад

      @@alisharifian535 in desert, you prefer cool to warm

    • @alisharifian535
      @alisharifian535 14 дней назад

      @@user-pf8hs7nv6z For sure,that is why i am afraid of "warm and escalated"

    • @ticketforlife2103
      @ticketforlife2103 12 дней назад

      They are as much terrorists as any other

  • @OPOS-el7tj
    @OPOS-el7tj 14 дней назад +1

    Good video

  • @Starchface
    @Starchface 14 дней назад +2

    What a phenomenal video and a fascinating tale of intrigue. I guess the moral of the story is that if you're working at a top-secret facility, do not plug devices into the computer that you find in the parking lot, or any outside/unauthorized device for that matter.
    Often such facilities have measures established to prevent things like that from happening, such as physically disabling the ports, and locking the equipment in hardware and software to use only permitted I/O devices. The Iranians were sloppy with their security processes, but I imagine that's been tightened up.
    That was brilliant integration of today's sponsor. Too often a sponsor has little if anything to do with the subject matter, but here that is not the case. Well done.

  • @EverythingTechTime
    @EverythingTechTime 14 дней назад +14

    More tech content! I loved this video

    • @ArvinAsh
      @ArvinAsh  14 дней назад +5

      Glad you like it! More to come if there is demand from others like yourself.

    • @-q-b0_1
      @-q-b0_1 14 дней назад

      +1

    • @gatsby66
      @gatsby66 14 дней назад

      Too short! Could have easily been 45-60 minutes.

  • @TheGraviton
    @TheGraviton 14 дней назад

    For every curious mind Mr Arvin is here🙌. Hats off man. Please make a video about the theory of Raikons (the fundamentals of the universe).

  • @tlhIngan
    @tlhIngan 12 дней назад +1

    It's possible to destroy hardware for a long time now - in the 90s monitors were not as robust, and it was possible to misprogram your video card to output something your monitor couldn't support. Some monitors shut down, while others tried to display it, which overloaded their circuits. At best. the monitor will destroy itself. At worse, it could burn your house down. Then in the late 90s and early 2000s there were viruses that would erase the BIOS in your PC, so rendering it useless and basically impossible to fix back then.

  • @owaizkhadaklat7546
    @owaizkhadaklat7546 6 дней назад +1

    @ArvinAsh, I love your videos, but can make a video on Fermi energy and Fermi levels?

  • @APNambo
    @APNambo 2 дня назад

    Just pointing out that the graphics shows a mixer not a centrifuge. Centrifuges spins the whole tube in a circle, not mechanically mixing it with a stick.

  • @Rationalific
    @Rationalific 14 дней назад

    Despite the dangers such things pose, even after learning only the general idea and not having insight or ability to understand the minutiae, this was/is a fascinating work of art.

  • @jensphiliphohmann1876
    @jensphiliphohmann1876 14 дней назад +1

    04:08
    _Uranium 238 is not fissile, ..._
    Not in the sense that you're getting a chain reaction. It still can be split by fast neutrons as produced by a hydrogen bomb.

  • @matmehalfway
    @matmehalfway 14 дней назад +3

    Now THIS is a proper merch LoL

  • @impromptu24
    @impromptu24 12 дней назад +1

    I appreciate the fact that you are branching out and covering other topics. Not necessarily my cup of tea this topic, but watched the video in its entirety to support your channel. Let's get back to physics, please 🤓

    • @ArvinAsh
      @ArvinAsh  11 дней назад +1

      I appreciate it, but I'm not branching out. I have always made videos on science and tech. In the past, I have made several video on quantum computing, AI, and some philosophical subjects as well. I cover topics that typically ask big questions, or have profound implications. The Stuxnet story to me is profound because it potentially foreshadows an ominous future where our IOT devices, or any internet-connected object could be susceptible to malicious control.

  • @DeeDee-rv2rf
    @DeeDee-rv2rf 14 дней назад +8

    Did this video turn out to be a 14min long ad?

    • @n-hexane8271
      @n-hexane8271 14 дней назад

      lol

    • @ArvinAsh
      @ArvinAsh  14 дней назад +1

      Haha. no. But I always try to find a smooth segue into our sponsor announcement. And this time, our sponsor happened to be a great match for this content.

  • @benqurayza7872
    @benqurayza7872 15 дней назад +49

    The title of this video should have been "The secret cyber attack that prevented WW 3".

    • @ArvinAsh
      @ArvinAsh  14 дней назад +11

      Ahhh...good suggestion!

    • @acmhfmggru
      @acmhfmggru 14 дней назад +6

      @@ArvinAsh But it didn't prevent world war 3 and we are arguably now involved in the middle east because of the downstream effects of stuxnet... You can make a stronger argument that it FOMENTED WW 3 (or whatever you want to call the current proxy wars going on around the world between NATO and their enemies) rather than preventing it. If nothing else, it was an even that preceded and predicted our current international wars... You should change the title to something less political if you want to be taken seriously.

    • @drepyman1385
      @drepyman1385 14 дней назад +1

      The title changed lol

    • @Heartwing37
      @Heartwing37 14 дней назад

      Agree but it only prolonged it….

    • @friedrichjunzt
      @friedrichjunzt 14 дней назад

      Correct!

  • @MVHens
    @MVHens 13 дней назад

    Is the picture at 11:04 taken in Antwerp - Belgium, the 4 nuclear power facility in Doel ?

  • @lucidmoses
    @lucidmoses 14 дней назад +4

    It was fine but it was a bit of a left turn for you channel.

    • @Soupy_loopy
      @Soupy_loopy 11 дней назад +1

      Yeah, well, it's a good way to sell anti-virus software. Just imagine the videos if Nike was the sponsor. 🤔

  • @mopnem
    @mopnem 14 дней назад +1

    Oh no that Segway from “informing” to product advertising I can’t co-sign & I like this channel alot

    • @BillMac1966
      @BillMac1966 12 дней назад

      *segue, not segway

    • @mopnem
      @mopnem 11 дней назад

      @@BillMac1966 Thanks but spellchecking on RUclips is missing that RUclips wants the comments to be a mess, their spellcheck is egregious

  • @xoiyoub
    @xoiyoub 14 дней назад +1

    The guy realizing he lost the thumb drive: 💀💀💀💀

  • @MANTHAN-11
    @MANTHAN-11 15 дней назад +1

    Shoutout

  • @xea-1226
    @xea-1226 14 дней назад

    Please reply !!!! 😭, what is the soundtrack from 6:35 onwards

  • @LaltidevuGupta
    @LaltidevuGupta 14 дней назад +1

    Why suddenly this universe content creator talks about computers?!?!?

  • @davidb2331
    @davidb2331 14 дней назад +2

    Don't mind me I'm just taking notes 😁😁😁

  • @Mr-wv1tu
    @Mr-wv1tu 14 дней назад

    Just think about what can be done to hospitals, which we already know have a generally bad security against cyber attacks. Imagine being operated at, when there is a failure of the equipment.

  • @adamschannel8685
    @adamschannel8685 14 дней назад

    When does season 2 of one piece come out?

  • @Jho399
    @Jho399 6 дней назад

    What is the name of the melodi at the end?

  • @Kedvespatikus
    @Kedvespatikus 14 дней назад

    Years before Operation Olympic Games, the Y2K vulnerability had clearly shown the possibility of cyber attacks against complex industrial and infrastructure systems.

  • @MCMXCDX
    @MCMXCDX 10 дней назад

    almost at a million! 🤩

  • @osmang442
    @osmang442 14 дней назад +1

    imagine how many sleeper computer virus exist today

  • @Unplanted
    @Unplanted 14 дней назад +1

    What a coincidence. Just a few hours ago I created a USB-Stick with some tools for testing and ESET Antivirus was among them. :)

    • @ArvinAsh
      @ArvinAsh  14 дней назад

      seriously? That's quite a coincidence.

  • @thingsiplay
    @thingsiplay 14 дней назад +10

    I don't think the theory how this got infected makes no sense. If there is a high security nuclear facility, why would a trained personal take a random usb stick from the street (or other place) and put it into a computer on the nuclear facility? One that was deliberately excluded from the internet for security reasons.
    Sorry, but I don't believe this story one bit.

    • @ArvinAsh
      @ArvinAsh  14 дней назад +34

      Security is only as good as the weakest link. Humans tend to be that link. And the more humans that are present, the weaker that link is likely to be.

    • @saneasthenextguy196
      @saneasthenextguy196 14 дней назад +4

      @@ArvinAsh Correct.

    • @acmhfmggru
      @acmhfmggru 14 дней назад +17

      it is a very common attack vector and it works a surprisingly high amount of the time. Source: I'm a penetration tester.

    • @alphadog6970
      @alphadog6970 14 дней назад

      Don't bother it's intentional.
      It is known how they were infected, through a compromised pump and the guy Dutch subcontractor who installed the pump was killed in a freak car accident in Dubai when he wanted to blow the whistle.

    • @EverythingCameFromNothing
      @EverythingCameFromNothing 14 дней назад +9

      You’ve clearly never worked for a government organisation 😂

  • @Taskforce1
    @Taskforce1 14 дней назад +4

    what is with this resurgence of stuxnet content? you're like the 3 or 4th channel to post something about it in the last couple weeks. new info I assume?

    • @ArvinAsh
      @ArvinAsh  14 дней назад +5

      Probably just a coincidence. I have always been fascinated with how a code was able to destroy a physical thing. That is pretty astounding imo.

    • @jimsubtle886
      @jimsubtle886 14 дней назад

      This software virus destroyed the internet for years once it was unleashed onto the earth. Printers stopped printing paper forms, Wifi routers stopped doing wireless, cash checkout registers still to this day die randomly from stupid zero day exploits like this. The world is finally starting to become more aware of this type of malware

    • @jjhhandk3974
      @jjhhandk3974 14 дней назад

      I too was fascinated by this. Especially an air gapped network. I remember reading about this so long ago. Pure genius design. The planning that went into this.... it laying dormant solely for the purpose to maximize damage ! I loved it. It could have destroyed one centrifuge immediately upon infection but it laid dormant to spread , and spread... and I also found it fascinating that it changed the programming on the plcs to report no fault .".".

    • @Taskforce1
      @Taskforce1 14 дней назад

      @@ArvinAsh can't argue with that - thanks for the vid!

    • @MrElvis1971
      @MrElvis1971 14 дней назад +1

      It's all about the algorithm and monetisation.

  • @i.a.o.2909
    @i.a.o.2909 14 дней назад

    Always scan external drives 😎

  • @ElijahHunter77
    @ElijahHunter77 14 дней назад

    Kaspersky works! GO, KASPER, GO!

  • @shoot-n-scoot3539
    @shoot-n-scoot3539 14 дней назад

    Stuxnet is/was a worm and not a virus.
    Stuxnet had a rootkit allowing the worm to take over computer systems without user intervention.
    Seems defending against rootkits is key.

  • @user-ft3ed5wv7w
    @user-ft3ed5wv7w 14 дней назад +1

    Yeah Snakeoil software is sometimes the malware itself .) I heart about kaspersky is banned from gov computers, because of the russian background. But it has still the highest detection rate, so its needed.

  • @uriituw
    @uriituw 15 дней назад

    🤘

  • @Chillnel
    @Chillnel 12 дней назад

    Has you sub count decreased? You should cover new tech more for sure the physics stuff isn't trendy atm I don't think

    • @ArvinAsh
      @ArvinAsh  12 дней назад

      If there is enough demand, there are lots of subjects in tech I could cover. But my tech videos so far have tended not to get as many views.

    • @Chillnel
      @Chillnel 11 дней назад

      @@ArvinAsh fair enough must just be losing interest in physics, probably definitely just me. I used to watch everything you put out but these days only rarely.

  • @TM-yn4iu
    @TM-yn4iu 14 дней назад +1

    This will look like a small issue, like a particle of dust, in the next few years...moreover beyond

    • @Mr-wv1tu
      @Mr-wv1tu 14 дней назад

      Well, it's better than trying to implement the utopian idea of communism - we've seen where that road takes us, for more than a century now.

  • @josmeproslonije724
    @josmeproslonije724 13 дней назад +2

    This whole thing was an ad.

    • @Soupy_loopy
      @Soupy_loopy 11 дней назад +1

      Yup. What's weird is how most people don't even realize it. I mean, it couldn't be more obvious.

  • @droebitiuseri3669
    @droebitiuseri3669 14 дней назад +1

    I wonder what kind of collateral damage will occur with use of current AI tech as malware.

    • @nias2631
      @nias2631 14 дней назад +1

      In a sense the collateral damage is currently happening.

    • @ArvinAsh
      @ArvinAsh  14 дней назад

      Great question. I think it could be significant.

  • @threeMetreJim
    @threeMetreJim 11 дней назад

    Why does everyone seem to fixate on Uranium enrichment when all modern weapons use Plutonium? I understand that it is much easier to get a result using Uranium, but it's the modern era (even NK seems to use Plutonium), and you could probably hide testing of an implosion device (the conventional explosive part) among testing of other conventional weapons. From what I understand, you need a nuclear power plant (that the Iranians have) and ordinary Uranium to produce Plutonium, along with some way of not being detected extracting and processing the plutonium.

    • @ArvinAsh
      @ArvinAsh  11 дней назад +1

      Do you know where the Plutonium comes from? In Western countries, it's from Uranium used in nuclear power plants, which has to be enriched. Plutonium is not something that exists in sufficient quantities to be mined, so its created mostly from (enriched) Uranium fission. Enrichment is fundamental to any kind of nuclear bomb production.

    • @threeMetreJim
      @threeMetreJim 11 дней назад

      @@ArvinAsh You only need to enrich a few percent for a reactor, and Iran has a civilian nuclear programme already; the old agreements were fine with that. That is why I wondered what the fuss about high enrichment was about if plutonium can be extracted from u238 that has been exposed in a reactor (or maybe from fuel re-processing).

  • @garnergc
    @garnergc 14 дней назад +1

    There are gonna be a few AB fanboys that’ll be upset that you say Siemens then show a picture of a micrologix1400

    • @ArvinAsh
      @ArvinAsh  14 дней назад

      If it's the scene I'm thinking of, that scene was to show that Stuxnet targeted Siemens, and infected them and not any others.

  • @explainer660
    @explainer660 14 дней назад

    Avnesh are you indian bro, becoz your name matches to us

  • @MapaloNgosa-fk3mq
    @MapaloNgosa-fk3mq 7 дней назад

    Look a free hard drive am ganna plug it in my computer meanwhile Israel calls the USA and says “gentlemen we have got them”👏

  • @iam6424
    @iam6424 14 дней назад +1

    Software destroying a Hardware , oops man !

  • @videosight1
    @videosight1 14 дней назад +1

    This is so old, saw it on thoughty2 years ago

    • @Jesse-cw5pv
      @Jesse-cw5pv 14 дней назад

      Yea and he wasn't the first to report on it either lol. This happened in the 2000s. Who gives a shit if you heard about it. People can make videos on things that have been covered already

    • @Soupy_loopy
      @Soupy_loopy 11 дней назад

      Your mom is so old, she still goes to the drugstore looking for ice cream floats.

  • @PetraKann
    @PetraKann 15 дней назад +5

    I wonder who planted the USB stick there?

    • @uriituw
      @uriituw 14 дней назад +2

      Some guy.

    • @alext8828
      @alext8828 14 дней назад

      W.

    • @mw9297
      @mw9297 14 дней назад

      Probably a lot for numerous people

    • @ArvinAsh
      @ArvinAsh  14 дней назад +7

      There are two theories on this. One is that many sticks were dropped over a long period of time until someone picked one up. My guess, if this is the case, would be that it was dropped off by a nearly undetectable small drone. The other theory is that there was a Western spy at the facility that the US/Israel used to insert the virus.

    • @PetraKann
      @PetraKann 14 дней назад

      @@uriituw Working for who?
      Why aren't you allowed to say it?

  • @KingDog-787
    @KingDog-787 14 дней назад

    this is from 10 years ago !!

    • @ArvinAsh
      @ArvinAsh  14 дней назад +4

      No, 16 years ago.

  • @4jonah
    @4jonah 14 дней назад +1

    The story as presented in the documentary about Stuxnet called "Zero Days" is that intelligence learned who would be coming for regular inspections and preventative maintenance and they loaded the virus into their machine...they has to bring software updates to load onto the reactors computer...so the virus loaded itself onto the USB drive without the inspector knowing. It was written in such a way it didn't show up as a file on the drive

  • @tfkdandsvkc
    @tfkdandsvkc 21 час назад

    Why does youtube keep unsubscribing me from arvin ash???

  • @DaKoopaKing
    @DaKoopaKing 14 дней назад

    You need to fire your audio guy

    • @ArvinAsh
      @ArvinAsh  13 дней назад

      What was wrong with the audio?

  • @hanks.9833
    @hanks.9833 14 дней назад

    I suppose that Iranians would say what goes around comes around. The virus was smart but not smart enough to not infect general devices.

  • @andycapp9081
    @andycapp9081 13 дней назад

    Scrolling the comments, I can't see anybody mention that the Palestinians have been wiped from existence

  • @rwarren58
    @rwarren58 14 дней назад +2

    I remember the Obama administration "not knowing nothing about them centri-thingies". I knew it was a brilliant act of espionage but I never knew how brilliant. Much preferable to violence. Thanks for the real story, Arvin!

    • @peoplezk1
      @peoplezk1 14 дней назад

      This is violence. Both the assassinations of scientists in Iran and the stuxnet virus which caused an explosion inside the enrichment facility which lucky for Iranians didnt lead to major contamination of the surrounding area.

  • @jggerald7877
    @jggerald7877 9 дней назад

    Publicity lang yan. Probably from the 1970s retold for the modern times. But cybersecurity is real, huh?

  • @maxdoubt5219
    @maxdoubt5219 14 дней назад +3

    Trump was a fool to pull out of the nuclear agreement we had with Iran that - with regular IAEA inspections - capped enrichment at a level unusable for bombs but still good for power plants.

    • @nias2631
      @nias2631 14 дней назад +2

      He also thought it was a good idea to keep a ton of classified docs at his property for no clear reason. So I guess it is just par for the course with him.

  • @SinkFlaMain
    @SinkFlaMain 14 дней назад +4

    The real horror is the AI image at 1:20. I saw another channel use similar AI created images and were sourced through Getty. The real worm all along is the one that funnels money to people who input brief prompts into a 5 second image generator lol.

    • @acmhfmggru
      @acmhfmggru 14 дней назад +4

      bro, that's a photo of the actual facility... you are correct that AI is a serious problem, but you are charging at a windmill and calling it a giant...

    • @peterburgess9735
      @peterburgess9735 14 дней назад +2

      Yes, AI generated images are definitely the worst threat to mankind 😂😂

    • @peterburgess9735
      @peterburgess9735 14 дней назад +2

      They're at best an annoyance to already skint artists who don't understand how AI actually works and need a scapegoat for their failures

    • @kooky45
      @kooky45 14 дней назад

      I'm glad your pointed this image out, I wonder if Arvin noticed it's AI generated, probably not.

    • @peterburgess9735
      @peterburgess9735 14 дней назад +1

      @@kooky45 It sounds like you're thinking Arvin might have accidentally found an AI generated image to use, and you think somehow that's a problem? I'm not sure why him purposely using modern technology would be a problem, much less accidentally using it, lol

  • @tapdapy
    @tapdapy 14 дней назад +3

    what a "good", "stable" and "human-loving" politico-economic system is on the Earth, where its various actors are forced to harm and destroy each other in the struggle for leadership in accessing to resources and capitals that provide prosperity and wealth

    • @Mr-wv1tu
      @Mr-wv1tu 14 дней назад

      Well, it's better than trying to implement the utopian idea of communism - we've seen where that road takes us, for more than a century now.

    • @Mr-wv1tu
      @Mr-wv1tu 14 дней назад

      Well, it's better than trying to implement the utopian idea of communism - we've seen where that road takes us, for more than a century now.

    • @twonumber22
      @twonumber22 14 дней назад

      ​@@Mr-wv1tuI don't see a difference. At all.

  • @spacejaga
    @spacejaga 14 дней назад +1

    Eric van Sabben (and yeah it's a very well kept secret even on wikipedia). No USB flash drives in a parking lot (tho this cautionary tale is a nice teaching moment), that part is less than speculative, it's just plain unrelated to this story.... So yeah, some correction for the story would be nice....

  • @Heartwing37
    @Heartwing37 14 дней назад +1

    Stuxnet was brilliant!

  • @deadlock_problem
    @deadlock_problem 14 дней назад +1

    ESET literally bounces off my superior qubes linux install

  • @ricardodelzealandia6290
    @ricardodelzealandia6290 14 дней назад

    That was a fairly interesting 14 minute ad!

  • @snappycattimesten
    @snappycattimesten 14 дней назад +2

    Without breaking any laws recently passed in the congress: ask yourself how this act would be perceived if the shoe was on the other foot. Just saying, nothing good about this stuff.

    • @ArvinAsh
      @ArvinAsh  14 дней назад +1

      Indeed. Russia is suspected to have sabotaged some US infrastructure. There is a cat and mouse game going on in right now in cyber warfare.

  • @marcelob.5300
    @marcelob.5300 14 дней назад +5

    Funny thing is Iran has never intended to develop a nuclear weapon, only nuclear energy production.

    • @cortster12
      @cortster12 14 дней назад +2

      uh huh

    • @nathanlingle5552
      @nathanlingle5552 14 дней назад +3

      Riiiiiiiight

    • @Mr-wv1tu
      @Mr-wv1tu 14 дней назад

      Right..... in Make-Believe Land, maybe? You know the place where Iran is a "peaceful" nation, and doesn't kill and torture inocent citizens. There?

    • @twonumber22
      @twonumber22 14 дней назад +1

      True. But they wanted to make sure they could if the Saudis did the same.

  • @maciejblazejowski1212
    @maciejblazejowski1212 13 дней назад

    .

  • @Gereon_
    @Gereon_ 14 дней назад

    Usually malware is a bad thing, but in this case you could argue it was actually a good thing.

  • @Nobody2989
    @Nobody2989 14 дней назад +1

    Cool video, but the AI images/upscaled images are just distracting. Just use real pictures, especially when talking about something as down to earth as this.

    • @ArvinAsh
      @ArvinAsh  14 дней назад +3

      There are no real ones.

    • @peterburgess9735
      @peterburgess9735 14 дней назад

      ​@@ArvinAsh great video. Not sure why so many people have come here with AI chips on their shoulders. I don't know if you used AI images or not, but don't see why you should feel guilty for using modern technology if you did. I wonder if this guy is a bad artists who needs an easy scapegoat

  • @LaltidevuGupta
    @LaltidevuGupta 14 дней назад

    Arvin Sir, anti-virus (solutions) creators are actually the first people to create viruses (problems).

  • @MrKotBonifacy
    @MrKotBonifacy 10 дней назад +1

    4:28 - _"A centrifuge is used to spin..."_ WHAT?! *URANIUM* ??! Or was it supposed to be *uranium hexafluoride* - which, at slightly elevated temperatures is a gas? (Vapour, actually, but never mind these small technicalities.)
    Yes, yes, I know - a slip of tongue, but still, rather dumb one, innit? Especially in a video by a scientist...
    Also, your titles are becoming kinda clickbaity, in a silly way - YOU, yourself have said clearly in the opening minutes of the video that Stuxnet was developed PRECISELY in order to avoid any direct military action (by Israel), WHICH ACTION could could then, in turn, trigger a world war (actually, hardly, but let's assume for argument sake t hat it could) - so, in the title you claim that this cyber attack "almost triggered" ("almost sorta kinda nearly close to a remote possibility" rather),even if you perfectly know it's a load of horse manure.
    I'd say "not very unbecoming of a scientist" (aka noblesse oblige), but what do I know...

  • @TheJCJexe
    @TheJCJexe 14 дней назад

    The dude in the intro has 6 fingers wtf lol

    • @upscalednostalgiaofficial
      @upscalednostalgiaofficial 14 дней назад

      you blind? I counted it and it's only five. Try to use the pause button next time to double check. :)

  • @Jungleofnight
    @Jungleofnight 14 дней назад +2

    If US & Israel can do this then imagine what China can do 😁😁😁

  • @DragonKingGaav
    @DragonKingGaav 14 дней назад

    I love how Simon did a video about this six days ago! ruclips.net/video/UtFqtA0X_hM/видео.html

  • @TheLeadStriker
    @TheLeadStriker 15 дней назад

    First

  • @blahsomethingclever
    @blahsomethingclever 14 дней назад

    If Iran thinks the US is the devil then why are they using Microsoft Windows XP? Shouldn't they be using their own heavenly software?!
    That was sarc, nothing is better than Windows lol

    • @alisharifian535
      @alisharifian535 14 дней назад

      Developing an operating system is not easy. It is time and money consuming and requires many software and hardware experts staying awake many nights writing codes,alpha testing,beta testing keeping it updated etc... so people usually use whatever they have unless they want to go more secure and more difficult for outsiders figure out how their systems work. Considering the computers were "isolated" they didn't bother using a custom linux distribution or similar.

    • @xferme
      @xferme 14 дней назад +2

      More likely that it was Siemens requirement for the PLC control facility.

    • @don_5283
      @don_5283 14 дней назад

      It's funny how often the people screeching loudest about the evils of the Great Satan get driven to their speeches in Fords, and so very many other such hypocrisies.

  • @bhargavreddy3626
    @bhargavreddy3626 15 дней назад

    20 mins 600 views.bro fell off

  • @michaelpipkin9942
    @michaelpipkin9942 14 дней назад

    Cmon,click bait!
    Haha jk!

  • @Andreygreat67
    @Andreygreat67 13 дней назад

    Im so tired of manipulative attitude like in this video. Do you really want Iran (terrorist state) to have nuclear weapon? Then why you blame Israel for almost starting WW3? It was a prevention of possible nuclear war. More than that, in this case Israel choose to behave as non-violently as possible. You still draw Israel as a villain here.

    • @impromptu24
      @impromptu24 12 дней назад

      Did we watch the same video? I did not get any "pro this" or "anti that" vibe from this video. Can you link the specific timestamp to your concern?

  • @DoomSlayer-MAGA
    @DoomSlayer-MAGA 14 дней назад

    Very cleaver

  • @jjhhandk3974
    @jjhhandk3974 14 дней назад

    Why would you recommend antivirus? Show me one computer scientist who would recommend anitivirus software for personal use who isn't getting paid to say it.... 99% of the time antivirus software is worse than any virus!

    • @xferme
      @xferme 14 дней назад

      Not everyone has the same security literacy.