Viewing a single comment thread. View all comments

CupResponsible797 t1_j4h6xui wrote

>Considering the code is now out in the open, is being reverse engineered, and now being repurposed for other attacks?

It's 2023, Stuxnet has been out in the wild since at least the 2010. What other attacks materialized from Stuxnet being reverse engineered?

Duqu isn't a Stuxnet "strain", it's an entirely separate piece of malware developed by some of the people involved in the creation of Stuxnet.

> If the gun is the great equalizer because men, women, and children can use it to attack or defend regardless of physical strength, then this virus is also an equalizer.

Not really, the exploits get fixed as soon as they become public knowledge. Stuxnet had already been fired, and the exploits burned. All that was left was a spent cartridge.

>Releasing Stuxnet was pretty much giving everyone a "nuclear weapon." There's no longer a nuclear deterrence but a viral deterrence. Launching cyber attacks assures mutual destruction.

This is a weird take. The "dangerous" parts of Stuxnet became irrelevant as soon as it's existence became public knowledge, Microsoft issued patches and Stuxnet was rapidly reduced to nothing but a curiosity.

How do you "patch" nuclear weapons?

Stuxnet isn't the nuke-like capability here, it's the team of people sitting in Fort Meade ensuring a steady supply of 0days.

15