UPDATE:
Siemens are distributing SysClean by Trend Micro to their business customers who use their SCADA systems in an attempt to remove the Stuxnet rootkit.
Siemens has made a program available for detecting and disinfecting malware attacking its software used to control power grids, gas refineries, and factories but warned customers who use it could disrupt sensitive plant operations.
The Munich-based engineering company on Thursday began distributing Sysclean, a malware scanner made by Trend Micro. It has been updated to remove Stuxnet, a worm that spreads by exploiting two separate vulnerabilities in Siemens's SCADA, or supervisory control and data acquisition, software and every supported version of Microsoft Windows.
Story @ The RegisterUPDATE:
The Chymine-A Trojan and the Autorun-VB-RP worm have been found to be exploiting this vulnerability ITW.
Virus writers have begun using the unpatched shortcut flaw in Windows first exploited by the Stuxnet worm, which targets power plant control systems, to create malware that infects the general population of vulnerable Windows machines.
Slovakian security firm Eset reports the appearance of two malware strains that exploit security vulnerabilities in the way Windows handles .lnk (shortcut) files, first used by Stuxnet to swipe information from Windows-based SCADA systems from Siemens.
Story @ The RegisterBlog Post @ ESETFOR INFO:
Check out the Kaspersky blog linked below. They currently have a couple of articles up regarding the Realtek certificates now being revoked however a new varient is using a certificate assigned to JMicron Technology Corp.
Kaspersky Blog