Skip To Content
JEWISH. INDEPENDENT. NONPROFIT.
The Schmooze

Biblical Clue in Computer Worm?

It sounds like a high-tech thriller with DaVinci Code undertones: A file name inside a lethal computer worm might reference the Biblical Queen Esther — and could finger Israel as the source.

A report in today’s New York Times says a file inside the Stuxnet worm’s computer code was named “Myrtus,” possibly a “cross-linguistic wordplay” on Esther’s original Hebrew name of Hadassah. It’s one of what the New York Times calls “several murky clues that have emerged as computer experts try to trace the origin and purpose of the rogue Stuxnet program, which seeks out a specific kind of command module for industrial equipment.” Its exact target: Iran, where 30,000 computers have been infected, according to the Guardian. The worm “appears to have used contaminated hardware in an attempt to cripple Iran’s nuclear program,” the Guardian said, and “was a sophisticated attack almost certainly orchestrated by a state. It also appears that intelligence operatives were used to deliver the worm to its goal.”

The Guardian article continued: “Yesterday, Iran confirmed that the worm had been found on laptops at the Bushehr nuclear reactor, which had been due to go online next month but has now been delayed. It denied the worm had infected the main operating system or caused the delay.”

“There are many reasons to suspect Israel’s involvement in Stuxnet,” the New York Times reported. “Intelligence is the single largest section of its military and the unit devoted to signal, electronic and computer network intelligence, known as Unit 8200, is its largest group.”

Yossi Melman, who covers intelligence for Haaretz, told the Times he suspects Israel, but Shai Blitzblau, the technical director and head of the computer warfare laboratory at Maglan, an Israeli information-security company, told the Times he was “convinced that Israel had nothing to do with Stuxnet.”

I hope you appreciated this article. Before you go, I’d like to ask you to please support the Forward’s award-winning journalism this Passover.

In this age of misinformation, our work is needed like never before. We report on the news that matters most to American Jews, driven by truth, not ideology.

At a time when newsrooms are closing or cutting back, the Forward has removed its paywall. That means for the first time in our 126-year history, Forward journalism is free to everyone, everywhere. With an ongoing war, rising antisemitism, and a flood of disinformation that may affect the upcoming election, we believe that free and open access to Jewish journalism is imperative.

Readers like you make it all possible. Right now, we’re in the middle of our Passover Pledge Drive and we still need 300 people to step up and make a gift to sustain our trustworthy, independent journalism.

Make a gift of any size and become a Forward member today. You’ll support our mission to tell the American Jewish story fully and fairly. 

— Rachel Fishman Feddersen, Publisher and CEO

Join our mission to tell the Jewish story fully and fairly.

Only 300 more gifts needed by April 30

Republish This Story

Please read before republishing

We’re happy to make this story available to republish for free, unless it originated with JTA, Haaretz or another publication (as indicated on the article) and as long as you follow our guidelines. You must credit the Forward, retain our pixel and preserve our canonical link in Google search.  See our full guidelines for more information, and this guide for detail about canonical URLs.

To republish, copy the HTML by clicking on the yellow button to the right; it includes our tracking pixel, all paragraph styles and hyperlinks, the author byline and credit to the Forward. It does not include images; to avoid copyright violations, you must add them manually, following our guidelines. Please email us at [email protected], subject line “republish,” with any questions or to let us know what stories you’re picking up.

We don't support Internet Explorer

Please use Chrome, Safari, Firefox, or Edge to view this site.