RadiumFox Logo
RADIUMFOXSecurity

The Kill Chain

A chronological reconstruction of the attack vectors used to compromise the target.

Impact Assessment

Financial LossN/A (Sabotage)
Operational ImpactDestruction of Iranian Nuclear Centrifuges
Day 0

Air Gap Crossed

Malware is introduced to the Natanz facility via an infected USB drive.

Day 5

PLC Infection

Stuxnet hunts for specific Siemens PLCs controlling centrifuges.

Day 30

Sabotage

The malware alters the speed of the centrifuges to tear them apart while reporting normal data to monitors.

Day 60

Spread

Due to a programming error, Stuxnet escapes the facility and spreads worldwide.

Evidence Board

CONFIDENTIAL // EYES ONLY

RANSOM_NOTE.TXT

N/A

WALLET ADDRESS

N/A

SHA-256 HASH

Stuxnet.A

EXPLOITED VULNERABILITIES

4 Zero-DaysLNK Exploit
Retrospective Analysis

How We Would Have Stopped It

Mapping the specific security failures to RadiumFox's preventative services.

The Failure

USB Security

The Solution

Disable USB ports on critical systems and use data diodes for file transfer.

Explore ICS/SCADA Security

The Failure

Air Gap Reliance

The Solution

Assume air gaps are breached; implement defense-in-depth within the OT network.

Explore Industrial Security Assessment

The Failure

Lack of Integrity Checks

The Solution

Monitor PLC logic and firmware for unauthorized changes.

Explore OT Monitoring

Join Us. Cut Costs.
Focus on What Matters.

Unlock high-impact penetration testing that drives real security gains. Led by experts, tailored for results, and designed to stay budget-friendly.

1

Submit Info

Share your environment, scope, or compliance needs via our quick form.

2

Senior Review

A lead RadiumFox engineer reviews and tailors your assessment—no junior handoffs.

3

Optional Scoping Call

We'll clarify priorities and technical details if needed.

4

Clear Quote

Expect a fixed-cost proposal—no hidden fees or fluff.

5

Fast Kickoff

Once approved, most projects launch within 5–7 business days with full support.