Back to Newsroom

10 October 2010

Standalone utility available for free download on Malwarecity

 Today BitDefender®, an award-winning provider of innovative internet security solutions, released a free removal tool targeting Win32.Worm.Stuxnet. This tool is capable of removing all known variants of Win32.Worm.Stuxnet, as well as the rootkit drivers that are used to conceal critical components of the worm.

Win32.Worm.Stuxnet is a new breed of e-threats that emerged around mid-July. Although it infects all Windows-based systems alike, it primarily targets supervisory control and data acquisition (SCADA) systems which run the Siemens WinCC software.

The worm spreads by taking advantage of a multitude of 0-day exploits in the current versions of Windows. Moreover, it can execute itself from an infected removable medium as soon as the .lnk file on the drive which has been read by the operating system. Successful exploitation of this vulnerability results in the injection of a backdoor, as well as the installation of two rootkits that will conceal both the .lnk files and the accompanying .tmp files.

“BitDefender added generic detection covering all variants of Stuxnet on July 19, thus protecting our customers since day zero. As part of our constant efforts to help worldwide users fight against e-threats, BitDefender has also created a Stuxnet Removal Tool. Computer users who are not protected by a BitDefender security solution can now eliminate Stuxnet from their infected systems as well,” said Catalin Cosoi, Head of the BitDefender Online Threats Lab.

The tool can be run on both 32- and 64-bit installations and it will eliminate both the rootkit drivers and the worm.

StuxnetRemoval Tool can be downloaded from the Removal Tools section of www.malwarecity.com, a BitDefender initiative for the software security community and a free resource for those interested in their online security.

All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of their respective owners.

Contacts