Different variants of Stuxnet targeted five Iranian organizations,[9] with the probable target widely suspected to be uranium enrichment infrastructure in Iran;[10][11] Symantec noted in August 2010 that 60% of the infected computers worldwide were in Iran.[12]
Siemens stated on 29 November that the worm has not caused any damage to its customers,[13] but the Iran nuclear program, which uses embargoed Siemens equipment procured clandestinely, has been damaged by Stuxnet.[14][15][16][17] Russian computer security firm Kaspersky Lab concluded that the sophisticated attack could only have been conducted "with nation-state support".[18] This was further backed up by the Finnish computer security company F-Secure's chief researcher Mikko Hyppönen who commented in a Stuxnet FAQ, "That's what it would look like, yes".[19] It has been speculated that Israel[20] and the United States may have been involved.[21]
In May 2011, the PBS program Need To Know cited a statement by Gary Samore, White House Coordinator for Arms Control and Weapons of Mass Destruction, in which he said, "we're glad they [the Iranians] are having trouble with their centrifuge machine and that we – the US and its allies – are doing everything we can to make sure that we complicate matters for them", offering "winking acknowledgement" of US involvement in Stuxnet.[22] According to the British Daily Telegraph, a showreel that was played at a retirement party for the head of the Israel Defence Forces (IDF), Gabi Ashkenazi, included references to Stuxnet as one of his operational successes as the IDF chief of staff.[20]