Retired U.S. Marine Gen. James "Hoss" Cartwright has been informed he is under investigation as the source of leaks to the media regarding the sophisticated virus, NBC News reports.
Symantec researchers report uncovering an earlier version of the computer virus -- one from 2005. The virus was later found to have inflicted damage on Iran's nuclear enrichment program.
The U.S. Department of Homeland Security is probing Siemens' technology that may allow hackers to attack critical infrastructure, such as power plants.
Citing U.S. intelligence sources, ISSSource says an infected memory stick was used to hit the facility with the worm that severely damaged Iran's nuclear program.
Customers advised not to change the default passwords hard-coded into its WinCC Scada product, even though the malware is circulating.
Symantec says threat could be precursor to attacks on industrial control systems much like Stuxnet was.
Researcher opens "can of worms" about security weaknesses in systems running critical infrastructure environments, expert says.
What do Stuxnet, Duqu, Gauss, Mahdi, Flame, Wiper, and Shamoon have in common?
FireEye Malware Intelligence Lab researchers say they made a mistake in saying Gauss-infected machines were being directed to servers used by Flame.
Researchers had planned to demonstrate how to break into critical infrastructure systems.