Stuxnet

MITRE
Malware Type:
Other
First seen:
Unknown
Last seen:
Unknown
Details:

[Stuxnet](https://attack.mitre.org/software/S0603) was the first publicly reported piece of malware to specifically target industrial control systems devices. [Stuxnet](https://attack.mitre.org/software/S0603) is a large and complex piece of malware that utilized multiple different behaviors including multiple zero-day vulnerabilities, a sophisticated Windows rootkit, and network infection routines.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011)(Citation: CISA ICS Advisory ICSA-10-272-01)(Citation: ESET Stuxnet Under the Microscope)(Citation: Langer Stuxnet) [Stuxnet](https://attack.mitre.org/software/S0603) was discovered in 2010, with some components being used as early as November 2008.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011)

Associated Techniques (44)
ID ATT&CK Tactics
T1008 Fallback Channels -
T1012 Query Registry -
T1014 Rootkit -
T1016 System Network Configuration Discovery -
T1021 Remote Services -
T1021.002 SMB/Windows Admin Shares -
T1027.013 Encrypted/Encoded File -
T1041 Exfiltration Over C2 Channel -
T1047 Windows Management Instrumentation -
T1053.005 Scheduled Task -
T1055.001 Dynamic-link Library Injection -
T1068 Exploitation for Privilege Escalation -
T1070 Indicator Removal -
T1070.004 File Deletion -
T1070.006 Timestomp -
Aliases (105)
W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet W32.Stuxnet
Metadata
ID: 30
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00