Saturday, September 25, 2010

Protecting Bushehr against nuclear reactions

Hi! We are a group of 14 European, non-Jewish high school students who decided to write a nice worm. It's called Stuxnet. We have spent one year working one it.

We have collected 4 unreported bugs of Windows and 2 stolen certificates from our friends on the IRC. With these tools, it's simple to write a code that controls Siemens WinCC plants, especially in Iran. The WinCC software is pretty cute.

Our Russian friend brought the first USB stick with the executable files because his dad works for the Iranians. We will stop or make the Bushehr power plant explode when we need it.

But we like peace so we hope that if we inform the Iranian leaders about their risks and the Bushehr's citizens' risks in time, they will recognize Israel and donate a part of Iran to Israel, too.

10 comments:

  1. This comment has been removed by a blog administrator.

    ReplyDelete
  2. Iran arrests 'spies' after Stuxnet attacks on nuclear program

    ... from Computerworld.com

    ReplyDelete
  3. Bushehr project manager Jafari claims that only a few personal computers at the plant have been infected by Stuxnet

    ... from World Tribune.com

    ReplyDelete
  4. Replies
    1. It is! This comment is a test of the nested structure of comments.

      Delete
  5. if you are true gives us parts of the source code

    amr.thabet[at]student.alx.edu.eg

    ReplyDelete
  6. Why are you trying to attack another state's Nuclear power plant?

    ReplyDelete
  7. My ass you even saw the code dude i saw its code its now openly available and it doesn't use windows bugs and it uses certificates and direct authentication of realtek sound stop junking around you could get your ass busted for this

    ReplyDelete
  8. It didn't work with Blogger nested structure's import. What about now? This comment was added after the Blogger comments were imported to DISQUS.

    ReplyDelete