Stuxnet
MITREOther
Unknown
Unknown
[Stuxnet](https://attack.mitre.org/software/S0603) was the first publicly reported piece of malware to specifically target industrial control systems devices. [Stuxnet](https://attack.mitre.org/software/S0603) is a large and complex piece of malware that utilized multiple different behaviors including multiple zero-day vulnerabilities, a sophisticated Windows rootkit, and network infection routines.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011)(Citation: CISA ICS Advisory ICSA-10-272-01)(Citation: ESET Stuxnet Under the Microscope)(Citation: Langer Stuxnet) [Stuxnet](https://attack.mitre.org/software/S0603) was discovered in 2010, with some components being used as early as November 2008.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011)
Associated Techniques (44)
| ID | ATT&CK | Tactics |
|---|---|---|
| T1008 | Fallback Channels | - |
| T1012 | Query Registry | - |
| T1014 | Rootkit | - |
| T1016 | System Network Configuration Discovery | - |
| T1021 | Remote Services | - |
| T1021.002 | SMB/Windows Admin Shares | - |
| T1027.013 | Encrypted/Encoded File | - |
| T1041 | Exfiltration Over C2 Channel | - |
| T1047 | Windows Management Instrumentation | - |
| T1053.005 | Scheduled Task | - |
| T1055.001 | Dynamic-link Library Injection | - |
| T1068 | Exploitation for Privilege Escalation | - |
| T1070 | Indicator Removal | - |
| T1070.004 | File Deletion | - |
| T1070.006 | Timestomp | - |
Aliases (105)
Metadata
| ID: | 30 |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |