Retired U.S. Marine Gen. James "Hoss" Cartwright has been informed he is under investigation as the source of leaks to the media regarding the sophisticated virus, NBC News reports.
Customers advised not to change the default passwords hard-coded into its WinCC Scada product, even though the malware is circulating.
Citing U.S. intelligence sources, ISSSource says an infected memory stick was used to hit the facility with the worm that severely damaged Iran's nuclear program.
The U.S. Department of Homeland Security is probing Siemens' technology that may allow hackers to attack critical infrastructure, such as power plants.
Symantec researchers report uncovering an earlier version of the computer virus -- one from 2005. The virus was later found to have inflicted damage on Iran's nuclear enrichment program.
Though the worm has apparently done no serious damage to systems at the Bushehr plant, its presence there emphasizes the Stuxnet threat and may fuel speculation about the identity of its creators.
Speculation abounds about the worm, ostensibly designed to disrupt power grids and other such industrial facilities. Was it, in fact, aimed at Iran's nuclear industry? And if so, who's behind it? The U.S.? Israel? What's known and what's not? CNET takes a look.
The security expert who first identified Iran as the target for Stuxnet talks about why he thinks the U.S. and Israel are behind it and why we should fear copycats.
Symantec says threat could be precursor to attacks on industrial control systems much like Stuxnet was.
There has never been malware like Stuxnet that targets critical infrastructure and is so sophisticated, Symantec warns Senate committee.