Stuxnet & Flame

According to a media report, the Israeli and U.S. governments had jointly developed the highly sophisticated Flame malware in preparation for a cybersabotage campaign. It was done to break nuclear fuel enrichment efforts of Iran.
The goal of Flame was to collect the data about Iran's computer networks. This would forward future cyberattacks. As the New York Times reported on June 1, Stuxnet as a part of a joint operation code-named Olympic Games was created by Israel and U.S. governments. It is a sophisticated malware that caused the destruction of about 1.000 gas centrifuges at Natanz uranium enrichment facility in Iran.
According to unnamed official sources the beacons, cyberespionage software programs, were secretly inserted into computers made by an Iranian company and German hardware manufacturer Siemens.
These beacons were purposed to collect the data about how the uranium enrichment centrifuges interoperated with the computer from the Natanz facility. This data was as well sent back for analysis.
Little later Kaspersky Lab’s security researchers being one of the first who discovered and analyzed the Flame malware notified about the connection found between Stuxnet and Flame. Shared computer code was the common thing.
This fact predicated that Flame malware and Stuxnet were designed by the same group of attackers. Stuxnet was created for sabotage while Flame for espionage.
Mysterious data loss incidents at Iran's Oil Ministry came next to an investigation when the Flame was discovered back in May. The Israeli part carried out those attacks without knowledge from the U.S. side in April.
Kaspersky Lab’s security researches claimed Flame was created in the first half of 2008. The first variant of Stuxnet malware dated to June 2009 being discovered only in June 2010.
Duqu, another cyberespionage malware, was discovered in September 2011. Its code and architecture are very familiar with that of Stuxnet. Nevertheless, these threats are considered to be created on the same development platform according to leading security researchers.