Hi malware fighters,
Various av researchers are perplexeded by the organizational skills and the complexity behind the development of stuxnet worm after having analyzed this malware. Those behind it were on a mission to break in into as many corp. networks as they could and knew they weren't found out. The developers worked as a team of people of various backgrounds to create this half megabyte miscreation made up of many languages, like C, C+ and various object-oriented languages. Iran was the main target of the worm, because 60% of infections found place there, and the attacks must have been part of a big, big project, there was even a counter on the infected pendrive used to infect. Stuxnet makes use of five exploits, four of them are zero-days, together with legit certifications from Realtek and JMicron. About the SCADA-site of the malware "In most SCADA-networks there is no logging and there is minimal protection used and the patchcycle is very slow. Therefore the use of MS08-067 was just right,vaccording to Kaspersky Lab's Roel Schouwenberg, re:
http://news.idg.no/cw/art.cfm?id=1A47A9A1-1A64-6A71-CE9A3AA0B72636B7polonus