Stuxnet

GPTKB entity

Statements (102)
Predicate Object
gptkbp:instance_of gptkb:virus
gptkbp:bfsLayer 5
gptkbp:bfsParent gptkb:Operation_Glowing_Symphony
gptkb:Equation_Group
gptkb:Nitro_Zeus
gptkbp:collaborations NSA and Unit 8200
gptkbp:created_by delay Iran's nuclear program
gptkbp:defeated centrifuges
gptkbp:designed_by gptkb:Politician
gptkb:United_States
gptkbp:developed_by gptkb:Politician
gptkb:United_States
gptkb:Unit_8200
sabotage
2005 to 2010
delay Iran's nuclear program
gptkbp:discovered_by gptkb:virus
gptkb:2010
gptkbp:distribution USB drives
gptkbp:examines gptkb:documentaries
government agencies
gptkbp:example advanced persistent threat (APT)
gptkbp:exported_to USB drives
gptkbp:first_appearance 2010 by the media
gptkbp:first_described_by gptkb:Virus_Blok_Ada
gptkbp:focus industrial control system security
gptkbp:has_impact_on gptkb:Embassy
uranium enrichment
nuclear enrichment process
gptkbp:has_influence_on cybersecurity policies
subsequent cyber attacks
gptkbp:has_variants gptkb:Duqu
gptkb:Fire_Department
https://www.w3.org/2000/01/rdf-schema#label Stuxnet
gptkbp:is_a gptkb:virus
advanced persistent threat (APT)
targeted malware
gptkbp:is_aimed_at gptkb:Natanz_facility
Iranian nuclear facilities
gptkbp:is_analyzed_in gptkb:virus
cybersecurity research
cybersecurity conferences
cybersecurity experts
various cybersecurity firms
gptkbp:is_associated_with state-sponsored hacking
gptkbp:is_cited_in the first digital weapon
gptkbp:is_considered state-sponsored attack
set a precedent for future cyber attacks
gptkbp:is_considered_as gptkb:military_operation
a form of cyber warfare
a case study in cybersecurity
first cyber weapon
a landmark in cyber operations
a prototype for future cyber weapons
a significant event in cyber history
a turning point in cyber conflict
a warning for nations
gptkbp:is_designed_to disrupt industrial control systems
gptkbp:is_discussed_in academic literature
security experts
cybersecurity conferences
gptkbp:is_known_for infected over 1000 computers
its sophisticated design
highly sophisticated design
gptkbp:is_linked_to the U. S. and Israeli governments
the concept of cyber deterrence
gptkbp:is_part_of gptkb:Operation_Olympic_Games
gptkb:military_operation
cyber warfare
a larger geopolitical conflict
the Stuxnet attack
the digital arms race
the evolution of cyber warfare
gptkbp:is_referenced_in academic papers
gptkbp:is_related_to gptkb:Detective
gptkbp:is_vulnerable_to SCADA systems
programmable logic controllers (PL Cs)
gptkbp:led_to increased awareness of cyber threats
new cybersecurity measures
gptkbp:notable_for its complexity
its stealth capabilities
its targeted approach
gptkbp:outcome cybersecurity policy
gptkbp:religion caused physical damage
gptkbp:reports_to gptkb:Symantec
gptkb:The_New_York_Times
gptkbp:security_features gptkb:Siemens_software
gptkbp:series cyber attacks
gptkbp:significant_event cyber warfare history
gptkbp:social_responsibility Windows operating systems
gptkbp:subject gptkb:documentaries
gptkbp:targets gptkb:Siemens_Step_7_software
Siemens PL Cs
gptkbp:technique spear phishing
gptkbp:type_of cyber weapon
gptkbp:uses peer-to-peer communication
zero-day vulnerabilities
social engineering tactics
command and control servers
rootkit techniques
gptkbp:was_a_response_to Iran's nuclear program
gptkbp:written_in C and C++