ANALYTICAL BRIEFREF: OOG-0313-CW|SOURCE: OSINT / ACADEMIC LITERATURE / GOVERNMENT REPORTING
UPDATED 13 MAR 2026
OPERATION OLYMPIC GAMES

THE FIRST CYBER WEAPON

Stuxnet, Natanz, and the Code That Crossed the Air Gap to Destroy a Thousand Centrifuges

SUBJECT US-Israel Cyber-Physical Attack on Iran Nuclear Program
REGION Iran / United States / Israel / Netherlands
PRIORITY CRITICAL
ANALYST OPEN SOURCE
STATUS HISTORICAL — DOCTRINE-DEFINING
NATANZ 2007–2010 — ~1,000 IR-1 centrifuges destroyed by malicious code — first cyber weapon to cause physical destruction ///Operation Olympic Games: authorized by Bush, accelerated by Obama — joint NSA/CIA and Israeli Unit 8200/Mossad operation ///Stuxnet exploited 4 Windows zero-day vulnerabilities — unprecedented in a single weapon ///~500KB of code manipulated Siemens PLCs to spin centrifuges to destruction while reporting normal readings to operators ///Dutch AIVD mole Erik van Sabben planted malware inside air-gapped Natanz facility via water pump installation ///Accidentally escaped Natanz in 2010 — discovered by Sergey Ulasen at VirusBlokAda in Belarus ///200,000+ computers infected globally after containment failure — programming error allowed internet spread ///Cyber formally recognized as "fifth domain" of warfare alongside land, sea, air, and space ///NATANZ 2007–2010 — ~1,000 IR-1 centrifuges destroyed by malicious code — first cyber weapon to cause physical destruction ///Operation Olympic Games: authorized by Bush, accelerated by Obama — joint NSA/CIA and Israeli Unit 8200/Mossad operation ///Stuxnet exploited 4 Windows zero-day vulnerabilities — unprecedented in a single weapon ///~500KB of code manipulated Siemens PLCs to spin centrifuges to destruction while reporting normal readings to operators ///Dutch AIVD mole Erik van Sabben planted malware inside air-gapped Natanz facility via water pump installation ///Accidentally escaped Natanz in 2010 — discovered by Sergey Ulasen at VirusBlokAda in Belarus ///200,000+ computers infected globally after containment failure — programming error allowed internet spread ///Cyber formally recognized as "fifth domain" of warfare alongside land, sea, air, and space ///

CROSSING THE AIR GAP

NATANZ, IRAN — 2007–2010 | OPERATION OLYMPIC GAMES

The First Cyber Weapon That Caused Physical Destruction

Sometime in 2007, a piece of malicious code roughly the size of a photograph — ~500 kilobytes — was introduced into the air-gapped computer network controlling Iran's uranium enrichment centrifuges at the Natanz Nuclear Facility.[1] The code targeted Siemens Step 7 software running on S7-315 and S7-417 programmable logic controllers (PLCs) — the industrial computers that commanded the variable-frequency drives spinning thousands of IR-1 gas centrifuges.[2] It would take three years, multiple iterations, and an accidental escape before the world learned what had happened.

The program was codenamed Operation Olympic Games. Started under President George W. Bush in 2006 and rapidly accelerated under President Barack Obama, it was a joint operation between the NSA, CIA, and Israel's Unit 8200 and Mossad.[3] Bush believed it was the only way to prevent an Israeli conventional military strike on Iranian nuclear facilities — a strike that would have destabilized the entire Middle East.[4] The result was Stuxnet: the first known cyber weapon designed to cause physical destruction in the real world.[5]

CENTRIFUGES DESTROYED
~1,000
Approximately 20% of Iran's operational IR-1 centrifuges at Natanz — physically degraded by software[5]
ZERO-DAY EXPLOITS
4
Unprecedented: four unpatched Windows vulnerabilities weaponized in a single piece of malware[6]
GLOBAL INFECTIONS
200,000+
Computers infected worldwide after accidental escape — 60% in Iran[7]

We're glad they are having trouble with their centrifuge machine and that we — the U.S. and its allies — are doing everything we can to make sure that we complicate matters for them.

— Gary Samore, White House Coordinator for Arms Control, PBS, May 2011[8]

ANATOMY OF A CYBER WEAPON

FINDING 01 // SEQUENCE A — THE SPEED ATTACK (S7-315)

The earlier and better-understood attack targeted the Siemens S7-315 PLCs controlling the frequency converters that drove centrifuge motors. After confirming it had found the correct configuration — Vacon or Fararo Paya drives, specific cascade layout matching Natanz — Stuxnet would periodically alter the output frequency of the drives.[10] It raised the frequency to 1,410 Hz for 15 minutes — pushing the aluminum rotors to a tangential wall speed of ~443 meters per second, at the structural limit of the material.[9] Then it would drop the frequency to 2 Hz, essentially stalling the centrifuge, before returning to the nominal 1,064 Hz.[11] This cycle repeated roughly every 27 days. The rapid acceleration and deceleration induced excessive vibrations, bearing wear, and mechanical fatigue that gradually tore the centrifuges apart.

FINDING 02 // SEQUENCE B — THE CASCADE ATTACK (S7-417)

The later variant (versions 1.x, compiled 2009–2010) targeted the Siemens S7-417 PLCs implementing the Cascade Protection System — the safety mechanism that isolates centrifuges when pressure or vibration anomalies are detected.[12] By compromising this controller, Stuxnet could suppress the automatic safety shutdowns that would normally protect damaged centrifuges, allowing the speed attack to inflict maximum destruction before operators noticed.

FINDING 03 // THE MAN-IN-THE-MIDDLE

The most elegant element of Stuxnet was its concealment. While manipulating the PLCs, the worm recorded normal operating telemetry and replayed it to the operators' monitoring screens.[2] Engineers watching their SCADA displays saw nominal centrifuge speeds, normal pressures, expected temperatures. Meanwhile, the centrifuges were tearing themselves apart in the next room. This "man-in-the-middle" attack on physical reality — showing operators a false world while destroying the real one — had never been achieved before in any known cyber operation.

HOW YOU BREACH AN AIR GAP

PROPAGATION METHODS

Seven Attack Vectors in One Weapon

Stuxnet used an unprecedented combination of propagation methods, each designed to maximize spread within industrial environments while minimizing detection:

Zero-Day 1: Windows Shell LNK vulnerability (CVE-2010-2568) — automatic code execution when a USB drive was merely browsed in Windows Explorer.[6] Zero-Day 2: Windows Print Spooler vulnerability (CVE-2010-2729) — spread across networks via shared printers.[6] Zero-Day 3: Windows Task Scheduler privilege escalation (CVE-2010-3338) — gained SYSTEM-level access on Windows Vista/7.[6] Zero-Day 4: Windows Server Service vulnerability — similar to the vector used by the Conficker worm.[6]

Additionally, Stuxnet exploited the CPLINK vulnerability, a Siemens WinCC default database credential (hardcoded username "WinCCConnect," password "2WSXcder"), and network shares using two stolen digital certificates from Realtek Semiconductor and JMicron Technology — legitimate Taiwanese hardware companies whose signing keys had been compromised.[16]

HOW THE WORLD'S MOST CLASSIFIED WEAPON WENT PUBLIC

In the summer of 2010, something went wrong. A programming error introduced in an update caused Stuxnet to spread beyond its intended target.[3] An engineer's laptop, connected to the centrifuge network at Natanz, later connected to the internet — and the weapon escaped into the wild. Despite the breach, Obama ordered the program to continue.[4]

On 17 June 2010, Sergey Ulasen, a researcher at VirusBlokAda — a small antivirus company in Minsk, Belarus — was investigating a customer's computer in Iran that had entered an inexplicable reboot loop.[17] What he found was unlike anything the cybersecurity community had ever seen. The worm used a Windows shortcut (LNK) vulnerability that executed code merely by being displayed in a file browser — no click required. Ulasen reported it to Microsoft on 12 July 2010. Brian Krebs's blog post on 15 July became the first widely-read public report.[17]

Over the following months, researchers at Symantec, Kaspersky Lab, and ESET progressively decoded the malware's payload. When they realized what Stuxnet actually did — manipulate physical industrial equipment at a specific nuclear facility — they were, by their own accounts, terrified.[18] Kaspersky concluded it "could only have been conducted with nation-state support."[7] F-Secure's chief researcher Mikko Hyppönen agreed: "That's what it would look like, yes."[7]

On 1 June 2012, David Sanger of the New York Times published the definitive account, naming Operation Olympic Games and confirming U.S.-Israeli authorship based on interviews with current and former officials.[3] Neither government has ever officially acknowledged responsibility.

WHAT AI CANNOT REPLICATE

The popular narrative frames Stuxnet as a triumph of offensive hacking. It was. But the operation's true bottleneck was never the code — it was intelligence that could only be gathered by a human being physically present inside a denied-access facility.

To write Stuxnet, the developers needed to know:

COULD AI WRITE STUXNET TODAY?

FINDING 01 // WHAT AI COULD DO

A modern LLM could plausibly generate the software components of Stuxnet: the Windows propagation code, the rootkit, the zero-day exploit chains (given vulnerability descriptions), the PLC payload injection logic, and the man-in-the-middle telemetry replay system. AI excels at code generation from specification. The cyber half of the cyber-physical equation is increasingly automatable — and Stuxnet's Windows-side code, while sophisticated for 2007, is pedestrian by 2026 standards.

FINDING 02 // WHAT AI CANNOT DO

AI cannot determine that Natanz uses Vacon frequency converters. It cannot discover that the IR-1 rotor fails at 1,410 Hz. It cannot map the cascade layout of a classified nuclear facility. It cannot recruit a Dutch engineer, create a front company, get him hired at Natanz, have him install a water pump containing malicious firmware, and extract him safely. The target-specific intelligence requirement — the "last mile" of a cyber-physical weapon — remains entirely a HUMINT problem. No training dataset contains the classified configuration of an adversary's industrial control systems.

FINDING 03 // THE REAL RISK

The danger isn't AI writing Stuxnet. It's AI lowering the barrier for the software components so dramatically that the human intelligence requirement becomes the only constraint — and therefore the primary investment target. If code generation is free, nations will pour resources into the espionage infrastructure needed to gather targeting data. The 2027 prediction from Goldilock envisions AI malware that autonomously identifies and adapts to new targets — eliminating the need for pre-collected intelligence by discovering configurations in real-time.[19] That would change everything.

THE FAMILY TREE

AGENT.BTZ → CYBERCOM (2008)
In October 2008, a USB flash drive containing the Agent.btz worm was plugged into a laptop at a U.S. military base in the Middle East — likely dropped in a parking lot by a foreign intelligence service.[20] The worm spread to classified and unclassified networks across U.S. Central Command, which was running the wars in Iraq and Afghanistan. The 14-month cleanup operation — Operation Buckshot Yankee — was the worst breach in the history of the Department of Defense.[21] The institutional shock directly catalyzed the creation of United States Cyber Command (CYBERCOM) in 2009.[22] The organization born from that defensive humiliation would become the offensive force that, working with the NSA, built and deployed Stuxnet. The same USB-based attack vector that breached the Pentagon became the delivery mechanism for the weapon the Pentagon built in response.
DUQU — THE SPY (2011)
In October 2011, Hungary's CrySyS Lab discovered Duqu — malware with striking code-level similarities to Stuxnet but a fundamentally different mission.[23] Where Stuxnet destroyed, Duqu collected intelligence — keylogging, network mapping, document exfiltration. Both were built on the same coding platform, identified by Kaspersky Lab as "Tilded" (named for the ~d prefix in its temporary files), originating as early as 2007.[24] The "GOSSIP GIRL" umbrella — identified from leaked classified CSE slides — encompasses Equation Group, Flame, Duqu, and Flowershop as cooperative elements of the same state-sponsored development ecosystem.[25] Duqu's existence confirms that Stuxnet was not a one-off weapon but part of a persistent intelligence platform with both espionage and sabotage capabilities.
EPIC FURY — THE HEIR (2026)
Fifteen years after Stuxnet covertly destroyed centrifuges inside Iran, Operation Epic Fury overtly struck the same country with AI-generated target lists, autonomous kill chains, and electronic warfare at a scale Stuxnet's architects could not have imagined. The Maven Smart System generated 1,000+ targets in 24 hours. Claude ran inside classified Palantir networks. Anduril's Lattice mesh coordinated autonomous systems across the battlespace. The evolution is stark: Olympic Games required years of development, a human mole, and physical testing infrastructure to destroy 1,000 centrifuges. Epic Fury compressed the kill chain from hours to seconds using AI. From a USB drive in a water pump to an AI generating targets faster than humans can review them — that is the arc of fifteen years.

CHRONOLOGY

2003–2005
Iran begins installing IR-1 centrifuges at the Natanz Fuel Enrichment Plant (FEP). U.S. and Israeli intelligence assess that Iran is pursuing uranium enrichment capability that could lead to a nuclear weapon. The earliest Stuxnet development begins.[17]
2006
President Bush authorizes Operation Olympic Games after being presented with options by General James Cartwright and intelligence officials. The program aims to sabotage Iranian centrifuges through cyber means as an alternative to Israeli military strikes.[4]
2007
Stuxnet 0.5 — the first variant — is deployed. It spreads only via infected Step 7 project files and targets the S7-417 PLCs running the Cascade Protection System. The variant uses a man-in-the-middle attack to suppress safety interlocks.[26] The Tilded platform that underlies both Stuxnet and Duqu is active.[24]
OCTOBER 2008
Agent.btz breaches U.S. Central Command via USB drive. Operation Buckshot Yankee takes 14 months to remediate. The breach catalyzes the creation of CYBERCOM.[20]
JANUARY 2009
Obama takes office. Bush personally urges him to continue Olympic Games. Obama not only continues — he accelerates the program.[3]
JUNE 2009
Stuxnet 1.0 appears — a major evolution with the aggressive S7-315 frequency manipulation payload and four zero-day Windows exploits. The speed attack cycle begins: 1,410 Hz → 2 Hz → 1,064 Hz, every ~27 days.[11]
MARCH 2010
Stuxnet 1.1 deployed with improvements to propagation speed. A programming error in this update causes the worm to spread beyond Natanz when an engineer's laptop connects to the internet.[3]
17 JUNE 2010
Sergey Ulasen at VirusBlokAda (Minsk, Belarus) discovers the worm while investigating an Iranian customer's computer caught in a reboot loop.[17]
15 JULY 2010
Brian Krebs publishes the first widely-read report. The security research community begins reverse-engineering what will become the most analyzed malware in history.[17]
SEPTEMBER 2010
Symantec reports 60% of Stuxnet infections are in Iran. Researchers identify the frequency converter targeting code — Vacon and Fararo Paya — and publicly link Stuxnet to the Iranian nuclear program.[10]
NOVEMBER 2010
Iran's President Ahmadinejad acknowledges that a cyber attack "created problems for a limited number of our centrifuges." IAEA reports document unusual centrifuge replacement rates at Natanz consistent with ~1,000 units destroyed.[5]
OCTOBER 2011
Duqu discovered by CrySyS Lab in Budapest. Code analysis reveals shared Tilded platform with Stuxnet — confirming a persistent state-sponsored development ecosystem.[23]
1 JUNE 2012
David Sanger's New York Times exposé names Operation Olympic Games, confirms U.S.-Israeli authorship, and reveals the accidental escape that led to public discovery.[3]
SEPTEMBER 2019
Kim Zetter and Huib Modderkolk reveal the Dutch AIVD mole — recruited by Dutch intelligence at CIA/Mossad request — who planted the initial malware inside Natanz.[13]
JANUARY 2024
De Volkskrant identifies the mole as Erik van Sabben, a Dutch engineer who infiltrated Natanz via a front company and reportedly planted Stuxnet on a water pump he installed at the facility.[15]

BOTTOM LINE

Operation Olympic Games proved three things that remain true in 2026:

First: software can destroy hardware. A ~500KB worm — smaller than a single smartphone photograph — physically shattered a thousand centrifuges spinning at the speed of sound. The boundary between the digital and physical worlds is not a wall; it is a membrane, and Stuxnet punctured it permanently.[5]

Second: the hardest part of a cyber-physical weapon is not the code but the intelligence. Four zero-day exploits, a PLC rootkit, a man-in-the-middle telemetry replay — all of these were extraordinary engineering achievements. But none of them mattered without a Dutch engineer standing inside a classified Iranian nuclear facility, mapping the exact configuration of equipment that appears in no public database.[13] The HUMINT requirement is the irreducible core of cyber-physical warfare. AI can generate exploit code; it cannot recruit a mole.

Third: cyber weapons do not stay where you put them. The accidental escape of Stuxnet — a weapon designed for a single building in a single country — infected 200,000 computers in 115 countries.[7] Obama ordered the program to continue anyway, because the strategic value of delaying Iran's nuclear program outweighed the risks of exposure.[3] But the proliferation lesson was clear: once a capability exists as code, containment is a matter of time, not certainty.

The arc from Olympic Games (2007) to Epic Fury (2026) traces the full evolution: from a covert cyber weapon requiring years of development, human agents, and physical testing infrastructure to destroy 1,000 machines — to an AI-driven kill chain that generates a thousand targets in a single day against the same country. The doctrine Stuxnet established — that code is a weapon, that cyber is a domain of warfare, that physical destruction can be delivered through a USB port — is no longer controversial. It is operational reality.

Stuxnet is the Hiroshima of cyber war. The world now knows that a piece of code can wreak havoc on the physical world — and there is no putting that knowledge back.

— Adapted from multiple strategic assessments of the operation's doctrinal significance

References & Source Material

  1. [1]David E. Sanger, "Obama Order Sped Up Wave of Cyberattacks Against Iran," The New York Times, 1 Jun 2012
  2. [2]Falco, "Stuxnet Facts Report," NATO CCDCOE, 2012
  3. [3]David E. Sanger, "Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power," Crown Publishers, 2012
  4. [4]"Operation Olympic Games," Wikipedia (accessed 13 Mar 2026)
  5. [5]"Stuxnet," Wikipedia — citing IAEA reports and Albright et al. analysis of centrifuge destruction (accessed 13 Mar 2026)
  6. [6]"Stuxnet attackers used 4 Windows zero-day exploits," ZDNet, 14 Sep 2010
  7. [7]Symantec, "W32.Stuxnet Dossier," Version 1.4, Feb 2011; Kaspersky Lab analysis cited in Wikipedia
  8. [8]PBS "Need To Know," Gary Samore statement, May 2011 — cited in Wikipedia
  9. [9]David Albright, "Stuxnet Worm Targets Automated Systems for Frequency Converters," Institute for Science and International Security (ISIS), Nov 2010
  10. [10]"Stuxnet targets Vacon inverters," Drives & Controls, 15 Nov 2010
  11. [11]"Stuxnet — Dangerous World," UC Santa Cruz, 12 Mar 2018 — documenting 1410 Hz / 2 Hz attack cycle
  12. [12]"The Stuxnet Virus — Cyber-security in Industrial Measurement and Control Systems," Control.com, Dec 2019
  13. [13]Kim Zetter & Huib Modderkolk, "Revealed: How a secret Dutch mole aided the U.S.-Israeli Stuxnet cyberattack on Iran," Yahoo News, 2 Sep 2019
  14. [14]"Dutch Insider Deployed Stuxnet: Report," Infosecurity Magazine, 2019
  15. [15]"Dutch Engineer Used Water Pump to Get Billion-Dollar Stuxnet Malware Into Iranian Nuclear Facility: Report," SecurityWeek, 16 Jan 2024
  16. [16]Symantec, "W32.Stuxnet Dossier" — documenting stolen Realtek and JMicron digital certificates
  17. [17]Kim Zetter, "How digital detectives deciphered Stuxnet, the most menacing malware in history," Ars Technica, 11 Jul 2011; Eugene Kaspersky blog interview with Sergey Ulasen, Nov 2011
  18. [18]Michael Joseph Gross, "A Declaration of Cyber-War," Vanity Fair, Mar 2011
  19. [19]"The emerging danger of AI-powered malware: 2025 threat forecast," Goldilock / Axios, Jan 2025
  20. [20]"2008 malware infection of the United States Department of Defense," Wikipedia (accessed 13 Mar 2026)
  21. [21]"The Return of the Worm That Ate the Pentagon," WIRED, 9 Dec 2011 — Operation Buckshot Yankee and CYBERCOM creation
  22. [22]"Operation Buckshot Yankee — the Breach That Shook the Pentagon and Shaped Cybersecurity," Gigamon Blog, 5 Mar 2025
  23. [23]Boldizsár Bencsáth et al., "Duqu: A Stuxnet-like malware found in the wild," CrySyS Lab, Budapest University of Technology, Oct 2011
  24. [24]"Stuxnet/Duqu: The Evolution of Drivers" — Kaspersky Securelist, documenting Tilded platform origin in 2007
  25. [25]Juan Andres Guerrero-Saade & Silas Cutler, "GOSSIP GIRL" research, Chronicle, 2019 — documenting Equation Group, Flame, Duqu, Flowershop cooperative umbrella
  26. [26]Symantec, "Stuxnet 0.5: The Missing Link," Feb 2013 — earliest variant analysis
CONNECTIONS
ZOOM OUT