The World’s First Cyber Weapon Attack on a Nuclear Plant | Cyberwar

2024 ж. 27 Нау.
686 781 Рет қаралды

Stuxnet was a sophisticated cyber attack on an Iranian nuclear plant that may have changed the nature of warfare forever.
This episode of Cyberwar first aired on VICE TV in 2016.
Help keep VICE News’ fearless reporting free for millions by making a one-time or ongoing contribution here. - vice.com/contribute
Subscribe to VICE News here: bit.ly/Subscribe-to-VICE-News
Check out VICE News for more: vicenews.com
Follow VICE News here:
TikTok: www.tiktok.com/@vicenews?lang=en
Facebook: / vicenews
Twitter: / vicenews
Instagram: / vicenews
More videos from the VICE network: www.fb.com/vicevideo
#VICENews #News

Пікірлер
  • Thanks to Vice you can relive 2016 again and again, and again and...

    @bartlx@bartlxАй бұрын
    • Again?

      @Konglomerant@KonglomerantАй бұрын
    • And again

      @gumpycognac4505@gumpycognac4505Ай бұрын
    • And again until they get their ad views

      @ckrgksdkrak@ckrgksdkrakАй бұрын
    • Thank you, therefore I won't watch the video and will instead dislike and report!

      @petricor1420@petricor142029 күн бұрын
    • Yes, but you wouldn't believe how many people don't know or understand Stuxnet. This episode is great for people to understand cybersecurity, politics, etc.

      @FNameLName@FNameLName29 күн бұрын
  • Reminder, this episode was from 2016, 8 years ago. Edit: Vice news is really wanting us to endure 2016 again

    @MES1111@MES1111Ай бұрын
    • Yes, important reminder

      @ammonite-muscaria@ammonite-muscariaАй бұрын
    • Check out darknet diaries with my boy jack... current hacker ish

      @jchastain789@jchastain789Ай бұрын
    • Maverick got enough time to push it on big screen.

      @GD-mw1kd@GD-mw1kdАй бұрын
    • Thank U. Saved me the watch.

      @lil----lil@lil----lilАй бұрын
    • JUST A FRIENDLY REMINDER------ America is in violation of the Symington Amendment by giving aid to Israel when they haven't signed the Nuclear NPT, and promote terrorism on Iran when they seek to develop their own energy program.

      @rammo16@rammo16Ай бұрын
  • vice if your gonna repost old articles at least include the orginial post date and the tag #repost or something.

    @tonymante8759@tonymante8759Ай бұрын
    • The descriptions says it’s a repost

      @Duckduckobtusegoose@Duckduckobtusegoose29 күн бұрын
    • Yeh but they could have atleast put it in the dam title smh​@Duckduckobtusegoose

      @kieronluke4657@kieronluke465728 күн бұрын
    • ​@@kieronluke4657it's not hard to read the description. can you not understand anything that's not hashtagged?

      @og666@og66628 күн бұрын
    • 324,185 views Mar 28, 2024 #VICENews #News Stuxnet was a sophisticated cyber attack on an Iranian nuclear plant that may have changed the nature of warfare forever. This episode of Cyberwar first aired on VICE TV in 2016.

      @johnk4396@johnk439628 күн бұрын
    • @@og666 it's not hard, but the issue is that it is hard to know the description is important. Titles have the benefit of being on screen all the time (PC, non-full screen) and hashtags have the bonus benefit of popping out from being a different color.

      @Niruase@Niruase28 күн бұрын
  • whats crazy to me, is that my highschool in 2010 didn't allow unauthorized USBs to be plugged in we had to go to the tech room and show the usb to a teacher and he had to scan it and give it a little sticker saying it was ok to use on our laptops, but the Iranians at a nuclear facility didnt do this. wild edit: Irans

    @theredacted3805@theredacted3805Ай бұрын
    • I doubt that’s how it happened… most likely the engineer was paid by intelligence to bug the system

      @Freiheit1232@Freiheit1232Ай бұрын
    • This was not your run-of-the-mill worm. Your teacher's antivirus would not have seen anything, that's whata 0-day attack does. It is called that because 0 days have transcured since the attack has been discovered by security companues and therefore no countermesure to that attack exists yet. And the method used was to inject this worm in as many normal computers in the world as possible so that everytime a technician would break the air gap to import some code he would have more and more chance to be using a pen drive that would have been previously inserted in an infected computer. I don't remember the exact number but when Stuxnet was first reported on it had infected an astonishing number of computers worldwide, something like 20 percent.

      @themroc8231@themroc8231Ай бұрын
    • @@Freiheit1232ok, but what dude is saying is Iran should of had something in place to protect itself from just some bad actor plugging in a USB stick into a computer and taking down their entire operation. AMATEURS! Hahaha

      @sforza209@sforza209Ай бұрын
    • You would be surprised to find out in some second / third world countries this thing is still going on in governmental building. Simply because security protocols are overseen by employees, and security awareness is just something from a check list that nobody cares but they all sing the paper because is the norm.

      @TraceursMonkey@TraceursMonkeyАй бұрын
    • @@sforza209 There would definitely be a way around such a system whether it is a high ranking individual at the plant or someone who just bypassed security protocols

      @raenico5285@raenico5285Ай бұрын
  • YALL GONNA MAKE PPL FREAK OUT 😂

    @CantRemember69@CantRemember69Ай бұрын
    • emotions will be tugged

      @Theabstractblu@TheabstractbluАй бұрын
    • People that are helpless and don’t have guns lmao

      @crackerjack2303@crackerjack2303Ай бұрын
    • JUST A FRIENDLY REMINDER------ America is in violation of the Symington Amendment by giving aid to Israel when they haven't signed the Nuclear NPT, and promote terrorism on Iran when they seek to develop their own energy program.

      @rammo16@rammo16Ай бұрын
    • @@crackerjack2303Hiroshima’s pistols did nothing

      @murrloc1859@murrloc1859Ай бұрын
    • This story is about 10 years old tho lol

      @00SamG@00SamGАй бұрын
  • Remember that this episode was from 2016

    @Lionwithhats@LionwithhatsАй бұрын
    • It's also a bit inaccurate. The first known cyberattack dates to at least 1982 with software that caused specific massive damage being inserted into natural gas equipment destined for the Soviet Union. It triggered.""The result was the most monumental non-nuclear explosion and fire ever seen from space," he recalls, adding that U.S. satellites picked up the explosion. Reed said in an interview that the blast occurred in the summer of 1982." (Washington Post).

      @nochannel1q2321@nochannel1q2321Ай бұрын
    • USA is the main threat

      @kroooassant9899@kroooassant9899Ай бұрын
    • Sure

      @Saydomar1155@Saydomar115529 күн бұрын
    • Episode is from 2016 about an event(s) that happened in 2010. And the details are very watered down.

      @jjann54321@jjann5432126 күн бұрын
    • Interesting how this episode is more relevant today than in 2016.

      @barrettabney@barrettabney26 күн бұрын
  • The delivery method is incorrect. It had since been revealed that it came in via a part that was infected, not a usb.

    @zeberast@zeberastАй бұрын
    • Wayyyy more impressive tbh😂😂 them boys at Siemens hooked them up😂

      @gumpycognac4505@gumpycognac4505Ай бұрын
    • Something stolen: USA did similar to the Soviets back in the day.

      @4thought___@4thought___Ай бұрын
    • Source

      @bobguy6542@bobguy654227 күн бұрын
    • According to the dark research that came out 5 years ago, it was attacked through the HVAC system.

      @barrettabney@barrettabney26 күн бұрын
    • Also the threat analyst misdefined zero day as a zero click attack, I guess fact-checking isn’t one of Vice’s strengths

      @xidney_@xidney_26 күн бұрын
  • "We demonstrated the capability that you could have devastating physical impacts by cyber means" That seem like an accidental admission.

    @who2u333@who2u33329 күн бұрын
  • 4 zero days in one piece of malicious code is beyond insane.

    @KernalPanics@KernalPanicsАй бұрын
    • That crazy man

      @emekaetube538@emekaetube538Ай бұрын
    • That's probably $10m in value right there...

      @Fatman305@Fatman305Ай бұрын
    • @@Fatman305 Way way way more. A single zero day exploit that requires zero user input to execute can fetch up to 20 million dollars.

      @jiszle697@jiszle697Ай бұрын
    • I don’t know about them but I believe you.

      @EndeavorsDnB@EndeavorsDnBАй бұрын
    • @@jiszle697 I was wrong, the other way. It likely cost less than $1m back in 2010. Look for Forbes article from 2012 "Shopping For Zero-Days". And note that even those ~$100k high-end exploits back in 2012 were much cheaper a few years earlier: "This is very different than in 2007, when researcher Charlie Miller wrote about his attempts to sell zero-day exploits; and a 2010 survey implied that there wasn’t much money in selling zero days. The market has matured substantially in the past few years."

      @Fatman305@Fatman30529 күн бұрын
  • This is such an insane story. Cyber security is still such paramount importance in 2024 and I feel like a lot of people are still very unprepared or uneducated about proper security.

    @DKong1026@DKong102628 күн бұрын
    • Very much so! I'm been in cyber security an other aspects of the industry for many years and I'm still learning.

      @tx3973@tx397322 күн бұрын
  • 0 day means a technology virus we don't currently have a solution for. It literally means day 0, the first day of the existence of a new virus. It has nothing at all to do with the capabilities of the virus.

    @johnthomas1422@johnthomas142227 күн бұрын
    • Yes, zero-click was what they were talking about.

      @Daniel-Davies-Gonstead-Student@Daniel-Davies-Gonstead-Student23 күн бұрын
  • Interesting how an IT engineer did not know what a PLC was. A USB stick in your work machine. That has not "formally" been permitted since early 2000's in most commercial organizations that I have done business with.

    @TriAngles3D@TriAngles3DАй бұрын
    • Things like that wouldn't ever be a standard educational criteria until there's an issue. 😅😂

      @tonywalker4207@tonywalker420728 күн бұрын
    • @@tonywalker4207 None of them will ever forget what a PLC is now.

      @TriAngles3D@TriAngles3D27 күн бұрын
    • Because an security researcher (as you call it "IT engineer") is a software engineer and not an electrical engineer...? Do you think that all electrical engineers can complete a malware analysis because they are an engineer?

      @jjann54321@jjann5432126 күн бұрын
    • @@jjann54321 Valid (excellent) point. In particular for "stick to your lane" type engineers. But the very best among us, including hackers, tend to be multidisciplinary. Mitnick's M.O. was less about tech and more about social engineering. As a "security researcher" it is important to be aware about the most basic instruments used in (critical) industry.

      @TriAngles3D@TriAngles3D26 күн бұрын
    • @@TriAngles3D Totally unacceptable to have zero clue what a PLC is. A cursory understanding of hardware systems is a must for softdevs.

      @anonymousreviewer169@anonymousreviewer16924 күн бұрын
  • Nuclear power plant worker here, if someone was determined enough to attack a power plant and cause radiological sabotage... you're fucked. The NRC requirements aren't high enough to protect against modern threats.

    @RicondaRacing@RicondaRacingАй бұрын
    • *stares in nuke worker at a plant with 1950 tech that's never heard of the Internet* I mean, they could crash our email and make it hard to watch KZhead but, actually a threat to radiologic safety? Nah, we good.

      @EyeKnowRaff@EyeKnowRaff29 күн бұрын
    • I heard power plants controls are so confusing even the hackers are like wtf lol

      @will201084@will20108421 күн бұрын
    • @@EyeKnowRaff yes there's plenty of antiquated tech but they're modernizing it with ICS

      @RicondaRacing@RicondaRacing21 күн бұрын
    • @@will201084that’s 🧢 they have old ass plc’s anyone can go online with and make edits

      @Ebap-dy9zp@Ebap-dy9zp14 күн бұрын
  • 0day is just an exploit that has not being disclosed yet.

    @deejwize@deejwizeАй бұрын
    • Yea he didn’t explain what a zero day was lol .

      @inility5772@inility5772Ай бұрын
    • ​@@inility57722:35

      @zaccomptonk590@zaccomptonk590Ай бұрын
    • Uncle Sam ain’t gona do that for a while baby 🇺🇸🤠🤩 💪

      @gumpycognac4505@gumpycognac4505Ай бұрын
  • I wish they would date it in the head line instead of using it as click bate. Other wise well done.

    @wrenlittle8826@wrenlittle8826Ай бұрын
  • Vice is killing it. Wait this is not zero days old?

    @EricBishard@EricBishard29 күн бұрын
    • Vice exposing things that can get us all hurt.. like we really want Iran to have nukes? Tf they doing.. like Snowden.. all that for what? To live in effing Russia? Lmfao

      @will201084@will20108421 күн бұрын
  • The interesting thing is that the guy who likely planted it. Who was a dutch engineer , died in a one sided motor accident a few years later in Dubai. He was likely recruited by Dutch intellegence services. Who handed him over to the israeli and US services. The strange thing is that most of Dutch officers who were actively involved by recruiting him had no idea that this happened. The whole operation was so fractured that people only know about their small part. Which makes it impossible for most people to actually know what was giong on. Which is the power of the organisation. Even high Dutch politicians did not know what the Dutch role was. And it is still is a mystery till today.

    @gerbenbakker_@gerbenbakker_26 күн бұрын
  • Its terrifying to think that there are cyber weapons out there that could dictate if we live or not

    @Lionwithhats@LionwithhatsАй бұрын
    • there aren't. in order to pull something like this off you need years and state resources. like a complicated spy mission. its not like some child can inadvertently do this in a fit of immature rage because the virus is just floating around its possible that russia or china could do this to some US infrastructure, but only if it was a long term concerted effort with many people involved, as it was for the allies that launched stuxnet

      @HanTheProphet@HanTheProphetАй бұрын
    • ​@@HanTheProphet This video was from 2016 8 YEARS AGO PRETTY SURE THEY'VE HAD ENOUGH TIME TO UP THEIR GAME!

      @MommaBear_316@MommaBear_316Ай бұрын
    • @@HanTheProphetever heard of an emp?

      @nah4215@nah4215Ай бұрын
    • @@MommaBear_316Security has had 8 years to evolve as well. It’s a classical arms race. All it takes is for one to get through, yes. But how many are going to face back at you? Techwar has to obey MAD like anything else.

      @ghostpiratelechuck2259@ghostpiratelechuck2259Ай бұрын
    • ​@@HanTheProphetare there, or are there not? You said both lol

      @pauljohnson2451@pauljohnson2451Ай бұрын
  • James Actin is not an expert on the IAEA. He is incorrect to say that the Fuel Enrichment Plant at Natanz is too small to fuel a nuclear power reactor. In fact, Natanz has a capacity for 50,000 centrifuges, sufficient to provide fuel for a 1000 MWe reactor such as that at Bushehr!

    @shahanshah2223@shahanshah22232 күн бұрын
  • The more time goes by and information becomes more available new things are becoming apparently more common helping us to understand the complexity of the internet

    @blueeyecinema5384@blueeyecinema538428 күн бұрын
  • One big difference is your HS was very much connected to the WWW whereas Iran though it was "safe" because this nuclear facility was off the grid w/o WWW access, and they apparently overlooked the potential of an internal threat....with a USB with not 1, not 2, but 4 Zero Day exploits. That gives 4 potential completely separate attack surfaces within Stuxnet. I'm impressed that your HS scanned thumb drives back in 2010 before allowing them to be plugged in.

    @MW97058@MW97058Ай бұрын
    • RIght, this guy is a fraud just like VICE itself. Real hard-hitting journalism when Mr. "Hacker Tracker" over here doesn't even understand simple concepts like air-gapping, as if his lie about his USBs being scanned that long ago even matters. Also that would go against the premise of air gapped systems where most likely whatever is scanning the USB was currently or previously network connected (especially to the WORLD WIDE web) LMAO. Stay safe brother and God bless.

      @dxpdigital5343@dxpdigital534329 күн бұрын
  • Pretty wild that the SysAdmins in the nuclear plant didnt block USB drives on their PCs. Pretty big oversight for something that sensitive.

    @MaximumPasta@MaximumPastaАй бұрын
    • Infected part not a usb stick

      @akki20897@akki2089724 күн бұрын
  • Did he just admit it was the US at the end there? "We demonstrated"

    @jinniu@jinniuАй бұрын
    • Yepper

      @evildoer8994@evildoer8994Ай бұрын
    • they did actually.

      @ROBLOXGamingDavid@ROBLOXGamingDavid29 күн бұрын
    • 😅q7​@@ROBLOXGamingDavidthe i8776677u7766😅

      @philipstowers4741@philipstowers474129 күн бұрын
    • U.S. sabatoging something Iranian sounds about right.

      @expert8665@expert866529 күн бұрын
    • You really thought you did something huh

      @Boomhauersdad@Boomhauersdad29 күн бұрын
  • Very informative. Thanks for the research

    @RyckmanApps@RyckmanApps27 күн бұрын
  • I really like this segment from vice. I wish they would continue it!

    @sforza209@sforza209Ай бұрын
  • Symantec security: discovers super weapon attacking bad guys “We should let everyone know about this”

    @MG-gj7pv@MG-gj7pv29 күн бұрын
    • I prefer a security company to be as neutral as possible...

      @FortunateWalker@FortunateWalker28 күн бұрын
    • Agreed. Better than being like Kaspersky and their engineers getting arrested if they don't do what they're supposed to.

      @j.f.fisher5318@j.f.fisher531828 күн бұрын
    • Your idea of "bad guys" are not the same as everyone's idea of "bad guys."

      @sweetbabyjesus8467@sweetbabyjesus846728 күн бұрын
    • it got out of control and spread through numerous other countries.

      @theforsakeen-9014@theforsakeen-901428 күн бұрын
    • Symantec security: discovered super weapon that could wipe out lots of people at once and directly cause international wars "We should let everyone know about this"

      @maxim3830@maxim383027 күн бұрын
  • Excellent video. Very interesting, informative and worthwhile video.

    @robertschlesinger1342@robertschlesinger1342Ай бұрын
  • For anyone wanting a more up-to-date insider look at this event, read "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age" by David Sanger.

    @Atlastheyote222@Atlastheyote22225 күн бұрын
  • Now this great journalism !

    @Sindale1@Sindale1Ай бұрын
  • So why would Chen and Symantec broadcast they found Stuxnet, determining it was a weapon and being used against Irans nuclear weapons program? Great they had the skill and fortitude to detect and decode, but why rat out the ‘rat’ being used against a larger rat?

    @chrish1721@chrish1721Ай бұрын
    • That’s what I was thinking the whole time while watching this

      @Igor_tigor@Igor_tigorАй бұрын
    • I'm surprised they didn't get a call from Mossad or NSA to keep quiet

      @Fatman305@Fatman305Ай бұрын
    • Because it was already detected by a Belarussian company. If they kept quiet, that's just a clear indication of something shady.

      @catcoder12@catcoder12Ай бұрын
    • Exactly it's because they were in help programming this with the United States government to demonstrate what its capable of

      @iiiKingLongSwipeiii@iiiKingLongSwipeiii29 күн бұрын
    • Why are there still people that genuinely believe that, in this time and age, causing geopolitical trouble will leave them unharmed?

      @maxim3830@maxim383027 күн бұрын
  • 10:06 Literally shows us it being on the charts

    @SamVillano@SamVillano13 сағат бұрын
  • Iran running Windows legally is impossible since Microsoft would never sell them license keys.

    @lukasandresson3990@lukasandresson3990Ай бұрын
    • It’s called looking up windows keys, Microsoft actually doesn’t stop it because then they have more people on their OS

      @sp-dm8ej@sp-dm8ejАй бұрын
  • 3:04 really? You’re misdefining a crucial term 3 minutes into the entire video? That’s so shobby

    @keitatsutsumi@keitatsutsumiАй бұрын
  • What's interesting, since this aired Iran is one of the leaders in AI research. US firms tried desperately to recruit Iranian engineers but trump refused to allow it. That's why companies in Silicon Valley opened up research facilities in Canada and Europe, so thy could hire these people.

    @redspock@redspockАй бұрын
    • If Iran is one of the leaders in AI research then how come Iran hasent come out with a leading tech company till now just like China?

      @arbaz79@arbaz79Ай бұрын
    • @@arbaz79You mention two state run economies and question why private corps haven’t upset them in the same breath.

      @ghostpiratelechuck2259@ghostpiratelechuck2259Ай бұрын
    • Yep, they are now hacking the states that hacked them back then. Not extraordinarily, but still, they are now advancing.

      @rafayahmed6259@rafayahmed625910 күн бұрын
  • What’s with y’all refurbishing old news that y’all already covered lately?

    @MrLovez@MrLovezАй бұрын
  • I work on PLCs occassionally as an electrician and they control everything industrial. Suprised it took this long to realize even if this is from 2016. Not much has changed as far as PLC security thats for sure

    @myusername570@myusername57028 күн бұрын
  • Awesome to see Vice bang out great content

    @wewantmoreparty@wewantmorepartyАй бұрын
  • Oh man!! When I watched this for the first time by downloading it via a torrent, it was surreal! Now, after 8 years, it is nice to see it available publicly and I can share with everyone. This series was great! Can't wait for the Russia episode.

    @MohammadHamad@MohammadHamad25 күн бұрын
  • So its a real life Skynet without an A.I.

    @jsnam8139@jsnam8139Ай бұрын
  • When he threw the blank pieces of paper, that really hit home.

    @EndeavorsDnB@EndeavorsDnBАй бұрын
  • Wait when he said ‘normal malware doesn’t go after control systems’ was he referring to malware outside of international cyber-terrorism? I understand that most cyber attacks are most clandestine but surely it’s not unheard of for them to go after control of the particular infrastructure/government facility

    @cranberrycanvas@cranberrycanvas26 күн бұрын
    • Do you think a normal malware could infect an unknown operating system? You know windows,mac and linux. However a nuclear power plant OS does not use any of those. So it can only be of someone that understands how a nuclear power plant operates from the infrastructure/bare level. Look it is easy to figure out if you just think a little for a few mins.

      @Furry_Lord@Furry_Lord11 күн бұрын
  • Stuxnet was the start of a new era

    @Chineeex@ChineeexАй бұрын
    • by then, it is already as dangerous as it can get.

      @ROBLOXGamingDavid@ROBLOXGamingDavid29 күн бұрын
  • Stuxnet was dangerously used & it came back to hurt us. But it was an incredible Team effort to pull this off.

    @hughjaass3787@hughjaass3787Ай бұрын
  • Upvote if you came back from year 2032 to re-watch this.

    @ckrgksdkrak@ckrgksdkrakАй бұрын
    • And here I am in 2232 and thinking 🤔 You made a typo.

      @lewiskunst1089@lewiskunst108925 күн бұрын
  • parts of stuxnet is what affected the ship that hit the Baltimore Bridge.

    @BeTeLGeuZeX@BeTeLGeuZeX29 күн бұрын
  • Zero-day: if found, it is kept and not reported to the developers by the agencies for precisely this reason (to be used when needed).

    @user-bf4cm6ef8l@user-bf4cm6ef8l24 күн бұрын
  • Excellent reporting.

    @michaelmokotong@michaelmokotongКүн бұрын
  • Anybody else notice that the interviews were sped up?

    @808Mark@808Mark28 күн бұрын
  • As a Power Engineer and PLC user this scares the hell out of me ..

    @CanadaVlog-gm2jf@CanadaVlog-gm2jf28 күн бұрын
  • Who wants Captain Crunch?

    @RiVer-Parish@RiVer-ParishАй бұрын
    • me me meee

      @Akac3sh@Akac3shАй бұрын
    • Yes

      @sir.spiral2600@sir.spiral2600Ай бұрын
  • The code was inputed so after it was all put out then the ransoms could happen

    @nicholaslandolina@nicholaslandolinaАй бұрын
  • The explanation in the beginning of what a “zero day” exploit is not really correct. It is a cyberattack that takes advantage of an unknown or unaddressed security flaw in computer software, hardware or firmware. The term “Zero day" refers to the fact that the software or device vendor has zero days to fix the flaw because malicious actors can already use it to access vulnerable systems. Second, kinetic really shouldn’t be applied to missiles bc a “kinetic energy weapon” is one that doesn’t use explosives but rather speed/density to destroy something….

    @stevenwynn7162@stevenwynn716226 күн бұрын
  • Few people know that during one week in 2023: 1. The FAA's Air Traffic Control System went offline in the U.S. 2. Within hours Canada's Air Traffic Control System also went offline. They are completely separate systems. 3. A month earlier the Philippines own Air Traffic Control System went down. That was a test run. 4. For those living in reality, three separate incredible events in three separate countries is called a hack/ransom ware attack. The media reported them as just a catastrophic system failure...that was reversed within hours. 5. The value of Bitcoin jumped dramatically right after the U.S. and Canadian events = the ransoms were paid.

    @kgm2182@kgm218229 күн бұрын
    • Get a life

      @ZahiFarah87@ZahiFarah8729 күн бұрын
    • Whole lotta yappin

      @lonesome3958@lonesome395829 күн бұрын
    • That's a pretty interesting claim, I've looked up and verified all the other stuff and the price of bitcoin does seem to increase dramatically over the days afterward. Love the level of replies from the two idiots above me tho

      @ifxthenwhy6202@ifxthenwhy620227 күн бұрын
    • ​​@@ifxthenwhy6202your post read my mind, top to bottom. This whole thing makes Jason Lowery's book Softwar all the more interesting.

      @fldnga8781@fldnga878125 күн бұрын
    • ​@@ifxthenwhy6202exactly, even microsoft pays ransoms, what the two above you on?

      @rafayahmed6259@rafayahmed625910 күн бұрын
  • It was a programmer in Minsk who first discover Stuxnet

    @Nobody-eg4bi@Nobody-eg4bi13 күн бұрын
  • i remember a boeing engineer was telling me stories about how they'd put code in usb sticks that would get sold to russian nuclear plants and how it would slightly alter their output somehow to make them less efficient which caused massive losses over time.

    @Em022@Em02228 күн бұрын
  • I worked on Siemens LOGO industrial controllers at the time...this is interesting...

    @TheRealKlinky@TheRealKlinky22 күн бұрын
  • 21:37 I consider this statement as an admission of responsibility

    @aakhthuu@aakhthuuАй бұрын
  • Wait till Ai comes to cyberwars.

    @Pain_is_temperory.@Pain_is_temperory.Ай бұрын
  • Nuclear *enrichment* plant, not a power plant. Massive difference in intent.

    @rfolks92@rfolks92Ай бұрын
  • Yeah I seen a video on this a little while back. It was a USB from memory that infected the system.

    @pingerboy69@pingerboy6929 күн бұрын
  • I'm guessing there won't be a new season :(

    @Mike-fk8xr@Mike-fk8xrАй бұрын
    • Considering this video is almost 10 years old, nope.

      @captainspaulding5963@captainspaulding5963Ай бұрын
  • Well this is just the problem of having cyber and techonlogy can cause alot of problem from computers and such that is upholding the systems in reacters and cause an meltdown which is just crazy and should not be allowed too do and should be supervised.

    @denniswrande6004@denniswrande600428 күн бұрын
  • Full disclaimer I work with mostly competitor products but wow...Siemens: From Concentration Camps to Iranian Nuclear facilities. (According to the Siemens website and this video.) Too bad I can't bring this up in a business meeting without looking like an ass, lol. Sometimes being P.C. blows my mind.

    @okinawanate@okinawanate21 күн бұрын
  • Some people call Stuxnet the opening battle of WW3.

    @FNameLName@FNameLName29 күн бұрын
  • so glad im a cybersecurity major rn

    @ag77777@ag7777725 күн бұрын
  • Wonder what happened to this insider. He probably was not a systems administrator, network security person but a programmer.

    @DamonWright-cm8bf@DamonWright-cm8bf27 күн бұрын
  • According to the investigation published by De Volkskrant, Dutch Engineer Erik van Sabben, an agent of the Dutch General Intelligence and Security Service (AIVD) is responsible for introducing Stuxnet to Natanz. He was died in a motorbike crash near his home in Dubai two years after the operation.

    @engineeranonymous@engineeranonymous29 күн бұрын
  • They are currently in conflict... Except their parents were able to be vocal

    @nicholaslandolina@nicholaslandolinaАй бұрын
  • Genuine question is the interview tripping sack during the interview with the guy from Symantec? Pupils are absolutely massive for being in a lit room

    @BertFlandreau@BertFlandreau26 күн бұрын
  • Very educative for cybersecurity education

    @etukudojoseph4744@etukudojoseph474416 күн бұрын
  • It wasn't attacking a nuclear plant, it was looking for a specific configuration of PLCs that operated centrifuges for enriching uranium.

    @winklethrall2636@winklethrall263627 күн бұрын
    • ...within a nuclear power plant

      @goodlandchugz@goodlandchugz27 күн бұрын
    • Yeah so when the plant pops it will be an "unfortunate accident"

      @batata1979@batata197927 күн бұрын
  • Explanation of "zero day"..... Having such a "specialist" provoke not only them..

    @lerooyferr3725@lerooyferr372529 күн бұрын
  • when the facts do come to light this will be a great movie

    @lotsofhairbutnomoney3705@lotsofhairbutnomoney370528 күн бұрын
  • maybe reasons why on lower attrition type weapons manufacturing as well

    @watcher5729@watcher572928 күн бұрын
  • “The US opened a door that everyone will walk through now”

    @noturavgbaba@noturavgbaba28 күн бұрын
    • No Vice and NY Times let our enemies now in detail what's up lol

      @will201084@will20108421 күн бұрын
  • There was an attack on a uk power station two or three months ago in the uk

    @jamesridley3596@jamesridley3596Ай бұрын
  • Thank you VICE NEWS

    @fernandomarquez3131@fernandomarquez3131Ай бұрын
  • They did that guy super dirty with the thumbnail lmao

    @madibrown9609@madibrown960921 күн бұрын
  • That crazy

    @glanerao1356@glanerao1356Ай бұрын
    • lol what’s crazy it came out 4 minutes ago. Confuzzed!

      @Rynam@RynamАй бұрын
    • @@Rynam happened 2016 bro. things are twice as worse in the shadows rn

      @Akac3sh@Akac3shАй бұрын
    • ​@@Akac3shnot in 2016, 2009 i think

      @rafayahmed6259@rafayahmed625910 күн бұрын
    • @rafayahmed6259 dam bro that’s crazy !!

      @Akac3sh@Akac3sh10 күн бұрын
  • Great video.

    @samsmusichub@samsmusichubКүн бұрын
  • The thing with sanctioning Iran for so long is that they have learned to develop their own home grown versions of weapons. This could eventually spell disaster and backfire on the U.S and Israel ... Just saying. 🤔

    @misterjorge2581@misterjorge258127 күн бұрын
    • You made some valid points.

      @jondoe9548@jondoe954827 күн бұрын
    • That's a good point you made.

      @gustywind-de7xb@gustywind-de7xb27 күн бұрын
    • Yup if they did not sanction iran, they could pull more of these stuxnet type attacks. Now everything in iran is anti-stuxnet. 😂

      @rafayahmed6259@rafayahmed625910 күн бұрын
  • Why did the major company disclose this to Iran?

    @joshgonzalez2112@joshgonzalez211229 күн бұрын
  • "It was an act of war without there being a war...." Get real, there is always a war.

    @HeartFeltGesture@HeartFeltGestureАй бұрын
  • More videos about hacking even if its a old video but you guys should make cyber warfare videos

    @HellHound___0@HellHound___0Ай бұрын
  • i love this version of Vice, not the political one

    @mesac13mizo@mesac13mizo27 күн бұрын
  • Plc's like siemens, allen bradley, sneider were not built with security in mind. These are in all systems in warehousing, factories and energy grids around the world. And the more advance the country the more vulnerable they are.

    @aphaseelec@aphaseelec6 күн бұрын
    • True! Easy to hack! Still 😂

      @snowrabbit9558@snowrabbit9558Сағат бұрын
  • Seán McGurk, former director of NCCIC, US Dept. of Homeland Security: "I think that there is no clear... complete evidence or even complete indication that it was one country or another." Also Seán McGurk: "Stuxnet to me was a Trinity moment... we demonstrated a capability that you could have devastating physical impacts by cyber means." Hold on, what do you mean by, "we?"

    @jweller2258@jweller2258Ай бұрын
    • bro youre overthinking it, he means the employees of HLS, and anyone involved (not israel)

      @thikifo395@thikifo395Ай бұрын
  • Trojan horses were the first cyber weapon and that's arguable.

    @dillonfredrikson7034@dillonfredrikson703425 күн бұрын
  • The crazy thing is to think Iran will slow down their program by diplomatic negotiations. They will say yes and be ready to get all that money relieved by sanctions but it’s already been proves they did not stop enriching Uranium.

    @loridavis9904@loridavis9904Ай бұрын
    • What?! Where the hell did u get that?! After the that was reached with Obama they did reduce enrichment and they only resumed when Trump existed the deal.

      @aliameribraimizadeh5631@aliameribraimizadeh5631Ай бұрын
  • If vice stuck to investigation journalism like this they would still be viable today

    @patmack2871@patmack287129 күн бұрын
  • Uhhhhhhh didn't Australian Media report on this approximately 15 years ago?

    @christiandavidjr4241@christiandavidjr424129 күн бұрын
  • looks like ill have to step in.

    @Akac3sh@Akac3shАй бұрын
  • *For example think of a missile* : and how it delivers its payload

    @iiiKingLongSwipeiii@iiiKingLongSwipeiii29 күн бұрын
  • With amazing reporting like this it's hard to understand why Vice went bankrupt. Who's uploading these?

    @AdaptorLive@AdaptorLive24 күн бұрын
  • Gosh the amount of times this has been covered.... is Vice using Microsoft Edge?

    @MultiSciGeek@MultiSciGeek28 күн бұрын
  • Remember that Francis Scott Key Bridge, a cargo ship crashed in Baltimore.

    @TheRandomVideos_YT@TheRandomVideos_YTАй бұрын
    • That wasn’t the only bridge that night either

      @Alan-ml8vq@Alan-ml8vq27 күн бұрын
  • Sounds like someone is setting us up for a “checkmate “

    @marcellofry459@marcellofry45926 күн бұрын
  • Maybe one day all wars will be cyber-wars.

    @petitio_principii@petitio_principii19 күн бұрын
  • PLC easy to program

    @thomaslee5531@thomaslee5531Ай бұрын
  • To all those who are complaining that it's from 2016... Don't. The point is this is happening and has been happening for a while and vice has taught more of us just how fragile our predicament is.

    @lewiskunst1089@lewiskunst108925 күн бұрын
KZhead