Retired U.S. Marine Gen. James "Hoss" Cartwright has been informed he is under investigation as the source of leaks to the media regarding the sophisticated virus, NBC News reports.
The worm apparently was aimed at a power plant and other sites in southern Iran but was thwarted.
Sophisticated virus was intended to knock offline an Iranian nuclear enrichment facility but strayed from its intended target about two years ago.
Kaspersky Lab finds Gauss, a spying malware that collects financial information and resembles Flame. Components are named after famous mathematicians.
A new plug-and-play device for factories and power plants could stop malicious code from triggering a major malfunction, or worse.
Citing U.S. intelligence sources, ISSSource says an infected memory stick was used to hit the facility with the worm that severely damaged Iran's nuclear program.
Much-reported computer code interrupted Iran's nuclear program, but Gen. Mike Hayden tells "60 Minutes" the identity of its author remains unknown.
Former U.S. intelligence officials and computer security experts warn of the potential problems and consequences that accompany this relatively new type of weapon in cyberwarfare.
Symantec researchers report uncovering an earlier version of the computer virus -- one from 2005. The virus was later found to have inflicted damage on Iran's nuclear enrichment program.
Though the worm has apparently done no serious damage to systems at the Bushehr plant, its presence there emphasizes the Stuxnet threat and may fuel speculation about the identity of its creators.