'''Stuxnet''' merupakan [[cacing komputer]] (worm) yang diketahui keberadaannya di bulan [[Juli]] [[2010]]. [[Perangkat perusak]] ini memiliki sasaran [[peranti lunak]] [[Siemens]] dan perangkat yang berjalan dalam sistem operasi [[Microsoft Windows]].<ref>{{cite web|url=http://www.msnbc.msn.com/id/41097319/ns/us_news-the_new_york_times|publisher=msnbc.com|title=Israel tests on worm called crucial in Iran nuclear delay}}</ref>. Ini bukan pertama kalinya [[Hacker|cracker]] menargetkan sistem [[industri]].<ref name="Siemans-Cyber">{{cite web|url=http://www.totallyintegratedautomation.com/2010/09/building-a-cyber-secure-plant/|publisher=Siemens|title=Building a Cyber Secure Plant|accessdate=5 December 2010 | date=30 September 2010}}</ref>. Namun, ini adalah perangkat perusak pertama yang ditemukan mengintai dan mengganggu sistem industri,<ref name=compworld>{{Cite web
| url=http://www.computerworld.com/s/article/print/9185419/Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyName=Network+Security&taxonomyId=142
| author=Robert McMillan
| accessdate=16 September 2010
| title=Siemens: Stuxnet worm hit industrial systems
}}</ref>, dan yang pertama menyertakan [[rootkit]] ''[[Programmable logic controller|programmable logic controller (PLC)]]'' .<ref>{{cite web|url=http://www.virusbtn.com/conference/vb2010/abstracts/LastMinute7.xml|title=Last-minute paper: An indepth look into Stuxnet|publisher=Virus Bulletin}}</ref><ref>{{cite news|url=http://www.bbc.co.uk/news/world-middle-east-11414483|title=Stuxnet worm hits Iran nuclear plant staff computers|publisher=BBC News|date=26 September 2010}}</ref>.
Cacing ini awalnya menyebar secara membabi buta, tetapi memuat muatan [[perangkat perusak]] yang sangat khusus yang dirancang hanya mengincar sistem Kontrol Pengawas Dan Akuisisi Data Siemens ([[SCADA]], ''Siemens Supervisory Control And Data Acquisition'') yang diatur untuk mengendalikan dan memantau proses industri tertentu. Stuxnet menginfeksi PLC dengan mengubah aplikasi perangkat lunak [[WinCC|Step-7]] yang digunakan untuk memprogram ulang perangkat tersebut.
Varian yang berbeda dari Stuxnet miliki target lima organisasi [[Iran]],<ref>{{cite news
|url=http://www.bbc.co.uk/news/technology-12465688
|title=Stuxnet Virus Targets and Spread Revealed
|accessdate=17 February 2011
|publisher=[[BBC News]]
}}</ref>, kemungkinan target luas diduga adalah [[infrastruktur]] pengayaan [[uranium]] di Iran.<ref name=BBC>{{Cite news|url=http://www.bbc.co.uk/news/technology-11388018|title=Stuxnet worm 'targeted high-value Iranian assets'|publisher=[[BBC News]]|date=23 September 2010|accessdate=23 September 2010|last=Fildes|first=Jonathan}}</ref><ref>{{cite news|url=http://www.telegraph.co.uk/technology/news/8021102/Stuxnet-virus-worm-could-be-aimed-at-high-profile-Iranian-targets.html|title=Stuxnet virus: worm 'could be aimed at high-profile Iranian targets'|publisher=The Daily Telegraph|date=23 September 2010|accessdate=28 September 2010|location=London|first=Claudine|last=Beaumont}}</ref>. Symantec mencatat pada [[Agustus]] [[2010]] bahwa 60% dari komputer yang terinfeksi di seluruh dunia berada di Iran.<ref>{{cite news|url=http://www.reuters.com/article/idUSLDE68N1OI20100924|work=Reuters|first=William|last=MacLean|title=UPDATE 2-Cyber attack appears to target Iran-tech firms|date=24 September 2010}}</ref>. Siemens menyatakan pada [[29 November]] cacing tidak menyebabkan kerusakan pada [[pelanggan]],<ref>{{cite web |url=http://www.computerworld.com/s/article/9185419/Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyId=142&pageNumber=1|title=Siemens: Stuxnet worm hit industrial systems|author=ComputerWorld|date=September 14, 2010|work=|publisher=Computerworld|accessdate=3 October 2010}}</ref>, kecuali [[program nuklir Iran]], yang menggunakan peralatan [[Embargo|terembargo]] Siemens yang diperoleh secara rahasia, telah mengalami kerusakan karena Stuxnet.<ref>{{cite news|url=http://www.cbsnews.com/stories/2010/11/29/world/main7100197.shtml|work=CBS News|title=Iran Confirms Stuxnet Worm Halted Centrifuges|date=29 November 2010}}</ref><ref name="NYTimes20100929">{{cite web|url=http://www.nytimes.com/2010/09/30/world/middleeast/30worm.html?_r=2&pagewanted=2&hpw|title=In a Computer Worm, a Possible Biblical Clue |first1=Ethan |last1=Bronner |authorlink1=Ethan Bronner |first2=William J. |last2=Broad |authorlink2=William Broad |date=29 September 2010|publisher=[[NYTimes]]|language=English|accessdate=2 October 2010}}</ref><ref name=rsilverstein20100925>{{cite web|url=http://www.richardsilverstein.com/tikun_olam/2010/09/25/iran-confirms-stuxnet-damage-to-nuclear-facilities/ |title=Iran Confirms Stuxnet Damage to Nuclear Facilities |publisher=[[Tikun Olam (blog)|Tikun Olam]] |date=25 September 2010 |accessdate=28 September 2010}}</ref><ref>{{cite news
|url=http://economictimes.indiatimes.com/news/news-by-industry/et-cetera/Software-smart-bomb-fired-at-Iranian-nuclear-plant-Experts/articleshow/6617686.cms
|title=Software smart bomb fired at Iranian nuclear plant: Experts
|date=24 September 2010
|accessdate=28 September 2010
}}</ref>. Perusahaan keamanan komputer [[Rusia]] [[Kaspersky Lab]] menyimpulkan bahwa serangan canggih tersebut bisa dilakukan "dengan dukungan [[negara]]" dan telah diduga bahwa [[Israel]] dan [[Amerika Serikat]] mungkin telah terlibat.<ref>Markoff, John, "[http://www.nytimes.com/2011/02/13/science/13stuxnet.html?scp=1&sq=Malware%20Aimed%20At%20Iran%20Hit%20Five%20Sites,%20Report%20Says&st=cse Malware Aimed at Iran Hit Five Sites, Report Says]", ''[[New York Times]]'', 13 February 2011, p. 15.</ref>.
== Rujukan ==
|