Ars Technica, May 3, 2013 (h/t Anonymous tip): Internet Explorer zero-day exploit targets nuclear weapons researchers [...] Attackers exploited a previously unknown and currently unpatched security bug in Microsoft’s Internet Explorer browser to surreptitiously install malware on the computers of federal government workers involved in nuclear weapons research, researchers said on Friday. [...]
Ars Technica, May 6, 2013: Internet Explorer 0-day attacks on US nuke workers hit 9 other sites [...] The revelation, from a blog post published Sunday by security firm AlienVault, means an attack campaign that surreptitiously installed malware on the computers of federal government workers involved in nuclear weapons research was broader and more ambitious than previously thought. [...] A separate blog post from security firm CrowdStrike said its researchers unearthed evidence suggesting that the campaign began in mid-March. [...] Malicious links embedded in the Department of Labor website focused on webpages that dealt with illnesses suffered by employees and contractors developing atomic weapons for the Department of Energy. But they went on to say the campaign could be much broader. [...]
See also: Homeland Security: 2 U.S. power plants victim of cyber attack -- Reports: Occurring at alarming rate... "Reminiscent of Stuxnet"
Published: May 6th, 2013 at 7:16 pm ET