# **Stuxnet**
---
**Who / What**
**Stuxnet** is a malicious cyberweapon discovered in 2010 that targets industrial control systems, particularly **Supervisory Control and Data Acquisition (SCADA)** networks. It was designed to sabotage specific industrial processes, with documented effects on critical infrastructure such as nuclear facilities.
---
**Background & History**
Developed over at least a decade prior to its discovery, Stuxnet emerged in 2010 after being first detected in June of that year. Its origins trace back to at least **2005**, with initial deployment observed in **2009** at the **Natanz Nuclear Facility** in Iran. The worm was engineered to exploit vulnerabilities in industrial automation software, specifically targeting Siemens’ SCADA systems used for uranium enrichment processes.
---
**Why Notable**
Stuxnet stands out as one of the first confirmed examples of a **state-sponsored cyberweapon**, designed to cause physical damage rather than purely digital disruption. Its success in sabotaging Iran’s nuclear program—by disrupting centrifuges at Natanz—demonstrated the potential for cyberattacks to impact critical infrastructure, raising concerns about escalating cyber warfare. The incident also highlighted vulnerabilities in industrial control systems and spurred global discussions on cybersecurity and arms control.
---
**In the News**
While neither the U.S. nor Israel has officially acknowledged authorship, multiple independent investigations (including by news organizations like *The New York Times* and *The Guardian*) have linked Stuxnet to a joint effort between these two nations under the codename **"Operation Olympic Games."** Its legacy continues to influence cybersecurity policies, prompting stricter regulations on industrial control systems and international debates over cyber warfare ethics.
---
**Key Facts**
---