Skip to main content

10 years after Stuxnet, the most powerful cyberweapon is now social media

A decade ago, the landscape of war changed forever.

Recommended Videos

On July 15, 2010, researchers discovered a massive malware worm installed in the industrial control systems of Iran’s nuclear development sites, where uranium was being enriched. The worm, more complex than any malware seen before, came to be known as Stuxnet.

Please enable Javascript to view this content

But the prohibitive cost and manpower of developing dangerous targeted malware like Stuxnet means that many nation-states have started leaning on a new cyberweapon of choice: Social media.

A complex and dangerous tool

At the time, Stuxnet was revolutionary. It bridged the gap between the digital and physical worlds in a way that hadn’t been done up to that point, said Ryan Olson, vice president of threat intelligence at Palo Alto Networks. “This was a significant event,” he said.

Kim Zetter, a journalist and one of the foremost experts on the Stuxnet virus, said that it wasn’t just the virus’s complexity or sophistication that was impressive, it was what virus targeted and how. “It targeted systems that weren’t connected to the internet,” she told Digital Trends. “And it introduced to the security community, and the world, vulnerabilities that exist in critical infrastructure systems.”

Stuxnet was a totally new paradigm in terms of what could now be accomplished,” said Axel Wirth, chief security strategist at MedCrypt, a cybersecurity company specializing in medical devices. “The methodology used to penetrate its target environment was much better planned than any other piece of malware used before.”

It’s thought that the virus found its way into Iran nuclear facilities via a thumb drive. From there, the virus was able to make a copy of itself and hide in an encrypted folder. It then lay dormant, Wirth told Digital Trends. The worm would activate when a specific configuration of systems only found in Iran was turned on. Ultimately, experts believed the virus caused significant damage to the Natanz nuclear enrichment site in Iran.

Strong evidence points to Stuxnet’s development being a joint effort between the U.S. and Israel, according to the Washington Post, although neither country has ever claimed responsibility.

Cyberweapons, however, always have an unintended side effect when they’re discovered.

Zero Days - Official Trailer

“The difference between an offensive cyberweapon and, say, the Manhattan Project, is that a nuclear bomb doesn’t leave defensive schematics scattered all over the landscape,” said Chris Kennedy, former director of cyberdefense at both the Department of Defense and the U.S. Treasury. “Cyberweapons do.”

In other words, once Stuxnet was discovered, it was hard to contain. Experts and hackers could look at the code, dissect the worm, and take out parts of it to use for themselves. Many cyberweapons found since Stuxnet have had parts of the Stuxnet code in them, although these new tools aren’t nearly as sophisticated, Kennedy said.

“Billions of dollars went into creating Stuxnet and became publicly consumable information,” said Kennedy, who is currently the chief information security officer at cybersecurity firm AttackIQ. “That kind of screws with the value of the investment.”

A better return on investment

Social media manipulation can also be effective at destabilizing or attacking foes — and is much cheaper.

“Social media is a lower form of attack,” said Kennedy, “but it’s easier to do. You just get a bunch of not-as-smart people to pump false information into Facebook and the analytics take it away. Now, attacks like Stuxnet will be reserved for specialized goals because they’re so expensive and challenging to create.”

Kennedy said that whatever buzzword could be used to talk about the Russian influence in the 2016 elections, “that’s the new Stuxnet.”

“Rather than attacks on systems or on individual computers, these are attacks on societies and economies.”

“It’s easier, cheaper, and has a much more brand effect,” he said.

Wirth told Digital Trends that cyberattacks are now “broader” in scope.

“Rather than attacks on systems or on individual computers, these are attacks on societies and economies,” he said. “Traditional tools have been augmented by social media attacks and misinformation campaigns.”

“The future is combined,” said Kennedy, in terms of what cyber warfare could look like. “You use a social media campaign for propaganda and influence to shape local populations, then you use cyberweapons to affect specific targets. And if that doesn’t work, then we bring in the troops and start blowing stuff up.”

Maya Shwayder
I'm a multimedia journalist currently based in New England. I previously worked for DW News/Deutsche Welle as an anchor and…
Asus and Gigabyte fill in some gaps about RX 9000 series
Gigabyte's RX 9070 XT GPU.

AMD revealed its next-gen RX 9000 series graphics cards yesterday ... well, kind of. The cards were mostly a no-show, with nothing but a promise that we'd hear more soon. However, AMD's partners still showed off some of the upcoming RX 9070 XT and RX 9070 graphics cards during CES 2025, which is why we now know what they're going to look like -- though we still know very little about how they'll perform when matched up against some of the best graphics cards.

Despite the lack of specifics during the presentation, Asus announced four RDNA 4 graphics cards with undisclosed release dates. Unfortunately, the only specification we got out of all this is that both the RX 9070 and the RX 9070 XT feature 16GB of VRAM, which is a healthy amount that can rival Nvidia's $1,000 RTX 5080.

Read more
The Packers were targeted by hackers, putting credit cards in danger
Green Bay Packers helmet and logo.

The Green Bay Packers just fell victim to hackers -- or rather, the team's online store did. The bad news? That means your credit card information could be in danger if you've recently shopped at the NFL team's official online retail store. The Packers released a notice of a data breach, notifying its customers about the October hack. Here's what we know.

Hackers managed to access the store and insert a card skimmer script to steal payment and personal information. The data affected includes credit card types, expiration dates, numbers, and verification numbers, which could put customers at risk of credit card fraud. Hackers also got access to names, addresses, and email addresses, says Bleeping Computer.

Read more
Valve: ‘There will be no Z2 Steam Deck’
The Heroic Games Launcher for Steam Deck.

When AMD announced its Z2 chip during its CES 2025 keynote, many thought that we'd see it appear in a fresh version of the Steam Deck. However, a Valve programmer cut those rumors short, stating: "There is and will be no Z2 Steam Deck." This is especially surprising given that AMD itself implied that such a Steam Deck would one day become a reality.

AMD shared a slide that talks about its new Z2 range and shows three gaming handhelds that use AMD chips -- the Steam Deck, the Lenovo Legion Go, and the Asus ROG Ally. That alone would be enough to give people the idea that a Z2 Steam Deck (perhaps a Steam Deck 2) is in the works. However, AMD has actually said that the Ryzen Z2 is "coming to market from a number of partners -- the Legion Go, the ROG Ally, [and] the Steam Deck."

Read more