How Stuxnet changed cyberwarfare

How Stuxnet changed cyberwarfare
Summary

For a long time, people have thought of the Internet as a completely separate world from reality. It was difficult to conceive that something that happened online could physically harm anyone. That concept changed in 2010, when Stuxnet demonstrated that malware can cause physical damage to critical infrastructure, not just steal data or crash systems. 

What is Stuxnet?

Stuxnet is one of the most significant and sophisticated pieces of malware ever discovered. Its development is believed to have started between 2005 and 2007, with early versions of the worm released in 2009. 

How does Stuxnet work?

Stuxnet initially spread via infected USB drives. It exploited four zero-day vulnerabilities in Microsoft Windows – an unprecedented number at the time. Once inside a system, it scanned for specific Siemens Step7 PLCS (Programmable Logic Controllers) running industrial equipment.

Stuxnet specifically targeted Siemens WinCC/PCS 7 SCADA systems that controlled centrifuges – machines that spin uranium gas to separate isotopes. In particular, it targeted frequency converters used to control the rotation speed of centrifuge motors. 

Stuxnet would manipulate the speed of the centrifuges (speeding them up or slowing them down irregularly), causing mechanical stress and eventual failure — all while reporting normal data to operators, making detection extremely difficult.

Screenshot 2025 04 17 At 4.27.52 PM 601x1024

Stuxnet is estimated to have destroyed 1,000+ centrifuges, significantly delaying Iran’s nuclear ambitions. In June 2010, VirusBlokAda, a Belarusian cybersecurity firm, discovered it.  Several major AV companies immediately started reverse engineering the worm to study it, and in 2012, a New York Times article confirmed U.S. involvement through leaked interviews.

The impact of Stuxnet

Stuxnet is the first known cyberweapon to cause physical destruction. It showed that air-gapped systems (offline, isolated networks) are not immune to malware. Stuxnet spread via removable media, breaching secure environments. It blurred the line between cybercrime and warfare, setting a dangerous precedent for cyberwarfare between nation-states.

A new era of cyber-warfare

Key aspects of cyberwarfare include:

Stuxnet inspired a wave of copycat malware and military-grade cyber tools (e.g., Flame, Duqu) and triggered an increased global investment in cyber defence, particularly around Industrial Control Systems (ICS) and SCADA environments. It ultimately led to a shift in policy and strategy in countries like the U.S., Russia, China, and Iran regarding offensive cyber capabilities. 

Cyberwarfare before and after stoxnix
Cyberwarfare Before Stuxnet
Cyberwarfare After Stuxnet

Modern cyberwarfare is becoming increasingly hybrid. Cyberattacks now accompany kinetic military actions, as in the Russia-Ukraine war. Targets include military and civilian systems like banks, hospitals, and media. Attackers also tend to compromise trusted software and vendors while outsourcing operations to contractors or criminal groups. 

Flame and Duqu

Flame and Duqu are malware directly inspired by Stuxnet. 

Other powerful cyber weapons developed recently are NotPetya, WannaCry, HermeticWiper & WhisperGate, and Volt Typhoon. 

Share this post :

PID Perspectives is migrating to European Servers. Please, let us know if you experience a slow response or technical issues.