Stuxnet source code opens a pandoras box of cyberwarfare – Breaking News & Latest Updates 2026
Skip to main content

Stuxnet source code could open a Pandora’s Box of cyberwarfare

A 60 Minutes report delves into the Pandora’s Box created by the release of Stuxnet into the wild.

A 60 Minutes report delves into the Pandora’s Box created by the release of Stuxnet into the wild.

Iran nuclear
Iran nuclear
Iran nuclear
Thomas Ricker
is a deputy editor and Verge co-founder with a passion for human-centric cities, e-bikes, and life as a digital nomad. He’s been a tech journalist for 20 years.

By now, you should all be familiar with the Stuxnet computer virus detailed last night on 60 Minutes. The worm, first discovered in mid 2010 after successfully targeting and disrupting uranium enrichment facilities in Iran, was almost certainly developed with US and Israeli participation. It’s also thought to be the most sophisticated cyber weapon ever created having managed to elude the detection of Iranian plant operators even as it spun hundreds of centrifuges beyond their breaking points.

Now that the Stuxnet source code is available for download (it took a CBS producer about a week to find it on “hacking sites”), it can be studied and possibly repurposed and repackaged by any motivated individual or organization to attack the programmable logic controllers crucial to the operation of national infrastructure services like traffic systems, power grids, or water treatment facilities — any industrial system that relies upon PLCs. A Pandora’s Box, if you will, that could be turned against the creators of Stuxnet for mischief or cyberwarfare.



Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.