Showing posts with label Stuxnet. Show all posts
Showing posts with label Stuxnet. Show all posts

Friday, September 26, 2014

‘Is this Iranian the most powerful man in Iraq?’- BBC Newsnight

 

Below: Gabriel Gatehouse reports for BBC Newsnight on IRGC-QF Commander Maj. Gen. Qasem Soleimani, "described as the most powerful man in Iraq" (Video first aired on television 23SEP14):


Also of interest, the PBS Nova documentary "Rise of the Hackers" which details Stuxnet as the "world's first cyberweapon," targeting the Natanz Nuclear Facility in Iran. Video below first aired on television 24SEP14, segment on Natanz begins at 09:50 mark:

Monday, November 14, 2011

Duqu Infecting Systems in Iran

Iran announced today that the new computer worm Duqu has infected a number of systems in the country, but a software program to “control” it has already been developed and distributed to affected installations [IRNA, 14 November]. The Duqu malware is believed to share code base with the Stuxnet. The latter is believed to have caused major damages at the country’s nuclear facilities. It was not known if the new worm was also targeting those same installations. Duqu was discovered on 1 September at a University of Budapest laboratory.

Tuesday, June 14, 2011

Iran Calls for IAEA Investigation of Stuxnet Attack

In an address to a government-sponsored nuclear disarmament conference in Tehran on Monday, Ali Bagheri, the deputy director of Iran’s national security council, called on IAEA to open an investigation on the Stuxnet attack on the country’s nuclear facilities and the people behind the attack. Bagheri called the attackers “nuclear terrorists.” [Xinhua, 14 June].

Bagheri’s request was in effect the highest-level official announcement that the Stuxnet worm had infected the computers at Iran’s nuclear facilities. Iran’s Ministry of Foreign Affairs had previously denied reports that Stuxnet had affected the nuclear computer systems. The computer worm is specifically written to attack Windows-based SCADA systems which are used to control and monitor industrial processes, including those used in nuclear facilities.

Tuesday, April 26, 2011

Computer Security Firms Unable to Verify Claims of New Worm

Computer security software company Symantec today said it could not verify Iran’s claims of new worm, dubbed ‘Stars’ by the commander of civil defense force of Iran. The company’s security response group has not found an example of the worm.

"Generally, samples of malware do get traded among security vendors," said Kevin Haley, the director of Symantec's security response group. ”Iran makes this a little more difficult, because we have no direct relationships there," added Haley. "But perhaps someone else does" [Computerworld, 26 April].

No other security vendor, including Helsinki-based F-Secure and UK’s Sophos, has stepped forward to say it has a copy of Stars. It's possible that Stars was not a targeted attack aimed at Iran, but simply part of a more traditional broad-based assault, said Haley.

"It could be a mass attack that got through their defenses," Haley said. "That could have raised the alarm. They're already paranoid about attacks."

"We can't tie this case to any particular sample we might already have," said Mikko Hypponen, F-Secure's chief research officer. "We don't know if Iran officials have just found some ordinary Windows worm and announced it to be a cyber war attack." [Computerworld, 26 April].

Graham Cluley, a senior security technology consultant at Sophos, also said his company had not been able to identify the malware.

Monday, April 25, 2011

Computer Virus ‘Stars’ Hits Iran

Iran has been hit with new computer virus named ‘Stars.’ Mehr News Agency quoted commander of Iran’s civil defense force Qolam Reza Jalali that the experts were still investigating the scope of the malware’s capabilities and damages caused. Jalali did not disclose the targets and the dates of the attack.

"Certain characteristics about the 'Stars' virus have been identified, including that it is compatible with the system," Jalali said. "In the initial stage, the damage is low and it is likely to be mistaken for governmental executable files," he added [Mehr News Agency, 25 April].

In December, Iran admitted the country’s uranium enrichment plant in Natanz had been the victim of the computer worm Stuxnet.

"Confronting the Stuxnet virus does not mean that the threat has been fully removed, since viruses have a certain life span and it is possible that they continue their activity in a different form," Jalali commented.

Saturday, April 16, 2011

Iran Official Links Stuxnet to US and Israel

The Commander of Civil Defense Organization of Iran Qolam Reza Jalili today said in Tehran that the US and Israel were behind the computer worm Stuxnet attacks on the nuclear facilities in the country.

Jalili becomes the first Iranian official to accuse the US and Israel over the Stuxnet attacks. The Bushehr nuclear power plant was reportedly among the targets, where several technical problems have been blamed for delays in getting the facility fully operational.

Jalali said once the worm mounts on a system, it begins to gather information and then sends reports from the infected machines to designated Internet addresses.

"Investigations and studies show that the source of Stuxnet originates from America and the Zionist (Israel) regime," Jalali, said. "After following up the (Stuxnet-generated) reports that were sent out, it became clear that the final destinations were the Zionist regime and the American state of Texas," he added [IRNA, 16 April].

Saturday, February 26, 2011

Iran to Remove Fuel from Bushehr Reactor – A Setback; Stuxnet Suspected

Iran’s Atomic Energy Organization (AEOI) today confirmed reports that it would be removing fuel from the Bushehr nuclear reactor, signaling a serious problem developing in the plant, delaying its startup. Iran's ambassador to IAEA, Ali Asghar Soltanieh, told the Iranian news agency ISNA that Russian engineers who build the plant had advised that the fuel be unloaded for test.

"Based on Russia's request to run tests and technical measures, the fuel will be unloaded from the core of the reactor and will be returned to it after completion of the tests," Soltanieh said [ISNA, 26 February].

Last month, citing the adverse affects of Stuxnet computer worm on Bushehr’s safety, the Russians raised serious concerns over starting up the power plant in April as scheduled. The removal of the fuel indicates that Stuxnet may have caused serious harm to the 1,000-megawatt reactor.

IAEA, which mentioned the fuel problem in its report on Friday, would now supervise the fuel unloading procedure, Soltanieh said.

Friday, January 28, 2011

Salehi: Bushehr To Go Online – No Safety Fears

Iran’s acting foreign minister and atomic energy chief said in Tehran on Thursday that the Bushehr nuclear reactor will go online on 9 April.


”We hope that on Farvardin 20 (April 9) we will witness the connection of the plant to the national grid,” Salehi said. “We have said before that due to some tests, we may have face delays but these delays are around a week or two,” he added. 


Salehi again reiterated that the computer worm Stuxnet had not entered the “main systems” at Bushehr and that Iranian engineers are “pursing work with the Russians while observing all the safety issues.”

Salehi’s comments on safety issues and cooperation with the Russians was apparently in response to a strong warning by Russia that Stuxnet attack on Bushehr could have triggered a nuclear disaster on the scale of Chernobyl.

"This virus, which is very toxic, very dangerous, could have very serious implications," said Dmitry Rogozin, Russia's ambassador to NATO on Thursday [AFP, 27 January].

Rogozin described the virus's impact as being like explosive mines. “These 'mines' could lead to a new Chernobyl,” he added.

Iranian officials have confirmed the Stuxnet virus hit staff computers at the Bushehr plant but have said it had not affected major systems.

Tuesday, January 18, 2011

Stuxnet Not As Effective as Reported – Iran Nuclear Negotitaor

Iran's chief nuclear negotiator Saeed Jalili accused the US for cyberattack on his country’s nuclear facilities. In an interview with NBC News on Monday, Jalili said the Stuxnet did not wreak as much damage as the media (The New York Times) have reported.

"Those who have done that could see now that they were not successful in that and we are following our success," Jalili said.

Jalili’s comments came after The New York Times reported that US and Israeli intelligence services collaborated to develop the destructive computer worm in a bid to sabotage Iran's nuclear program.

Jalili expressed optimism that despite the differences with the West, progress could be made at the talks between Tehran and six world powers due to get underway on Saturday in Istanbul. But he added that Iran will not bow to demands to halt its uranium enrichment activities and repeated Iran’s position that the country was not planning to build a bomb.

"We frankly and bluntly mentioned that nuclear weapons are illegitimate and inefficient and they could not help those countries that have the nuclear weapons," Jalili said.

Sunday, January 16, 2011

Stuxnet Crucial in Iran Nuclear Delay – New York Times

According to a report published in today’s issue of The New York Times, Israel tested the effectiveness of Stuxnet worm on centrifuges virtually identical to those used at Iran’s uranium enrichment facility in Natanz and the destructive worm has since wiped out a fifth of Natanz centrifuges, delaying Iran’s nuclear program and its ability to build a bomb. The report strongly suggests that the virus was designed as an Israeli-American project to sabotage the Iranian program.

The worm itself was designed to send the Iranian centrifuges “spinning widely out of control,” the report says. The worm was also designed to “secretly record” Natanz normal operations and plays back the readings to Natanz operators so it would appear that “everything was operating normally” while the centrifuges were spinning out of control.

To read the entire Times article, click here.

Saturday, October 2, 2010

Iran Confirms Cyber Attacks on Nuclear Facilities - UPDATE

The Iranian Minister of Intelligence Heydar Moslehi said in Tehran today that the authorities have arrested several “nuclear spies” engaged in cyber attack on Iranian nuclear facilities [IRIB, 3 October]. Moslehi added that the authorities had prevented them to cause destruction in those facilities. He did not name the facilities.

“The intelligence agents have discovered the destructive activities of the arrogance (US/the West) in cyberspace, and different ways to confront them have been designed and implemented," Moslehi said.

"I assure all citizens that the intelligence apparatus currently has complete supervision on cyberspace and will not allow any leak or destruction of our country's nuclear activities."

"We have always faced the destructive action of these (spy) services and a number of nuclear spies have been arrested," Moslehi added.

The announcement by the intelligence minister confirms reports that the malicious software code Stuxnet has infected computers in Iran, and the attackers were probably aiming to gain access to controller systems at Bushehr nuclear reactor and probably at Natanz uranium enrichment unit. By saying that the authorities have “currently” complete supervision on cyberspace, Moslehi comes close to confirming the reports that the attackers had indeed gained access to controllers at the nuclear facilities.

UPDATE (Tue 5 October): The Iranian Foreign Ministry Spokesman Ramin Mehmanparast told reporters in Tehran on Tuesday that the Stuxnet worm found on the laptops of several employees at Bushehr nuclear power plant is part of a covert Western plot to derail Iran’ nuclear program. The comments were the strongest indication yet that the Iranian leaders believe that a Western sabotage against the country’s nuclear facilities is at work.

More on Stuxnet

Stuxnet is a malicious software code that is attacking industrial control systems, altering their codes, and allowing the attacker(s) to gain control of the physical machinery and equipment within a plant. Microsoft has estimated that Stuxnet has infected 45,000 computers by August.

The worm specifically targets an industrial controller made by Germany’s Siemens and used in nuclear reactors. The researchers at Symantec, a leading IT company, estimate that 60 percent of all infected computers are located in Iran, causing suspicion that the attackers are targeting Iran’s nuclear facilities (Financial Times, 3 October).

A project manager at Bushehr nuclear reactor had confirmed last week that Stuxnet had infected some of the computers at the facility, although he had emphasized that no serious damage was done. But Iran’s Bushehr nuclear reactor as well as Natanz uranium enrichment plant is detached from the Internet. The attackers are suspected to place infected USB sticks at Bushehr through Russian engineers building the plant.

The Financial Times quotes Hamid Alipour of Iran’s state-owned Information Technology Company that the attack is still ongoing and new versions are spreading.

There are some clues linking the attackers to Israel. Researchers have found references buried inside the Stuxnet code, such as the word “Myrtus,” used in the Old Testament in a story on Jewish-Persian relations. Also within the cryptic messages is the date 9 May 1979, that could point to the day the Islamic Republic executed the famous Jewish Iranian businessman Habib Elghanian. The Financial Times reports that some point the finger at Israel’s Unit 8200, its secretive cyberwarfare operations.

Tuesday, September 28, 2010

Iran Denies “Stuxnet” Attack on Bushehr Nuclear Facility

The Iranian government has denied published reports that the advanced cyber worm “Stuxnet” has compromised the computers at the country’s first nuclear reactor in Bushehr. Iranian Foreign Ministry Spokesman Ramin Mehmanparast told reporters in Tehran today that the report was part of propaganda against Iran.

On Sunday, the project manager at Bushehr plant had told Iranian news agency IRNA that the facility was indeed infected by “Stuxnet” but no significant harm had been done.

The computer worm surfaced more than a year ago. It exploited gaps in Windows operating systems to attack very specific Siemens software used to operate industrial machinery. The Siemens system and the Windows-based software are used at Bushehr, and more importantly at Natanz uranium enrichment plant. Experts now suspect that the worm was not aimed at Siemens machineries in general but it was created specifically to target the nuclear facility at Natanz.