Iran's Nuclear Chiefs Battle Cyber Attack

Status
Not open for further replies.

Matt Damon

Player Valuation: £60m
http://uk.news.yahoo.com/5/20100926/twl-iran-s-nuclear-chiefs-battle-cyber-a-3fd0ae9.html

Iran's nuclear agency is battling to contain a computer worm that experts say was probably designed by a hostile government and has the capacity to shut down industrial plants.

Iran has confirmed that 30,000 computers in the country's power stations, including the nuclear reactor in Bushehr, have been attacked by the Stuxnet worm.

It said experts from the Atomic Energy Organisation of Iran met last week to discuss how to deal with the infection.

"An electronic war has been launched against Iran," said Mahmoud Liaii, director of the country's Information Technology Council.

"This computer worm is designed to transfer data about production lines from our industrial plants to (locations) outside of the country."

Iranian media reported there had been no significant damage.

The Stuxnet worm is described by experts as the most complex piece of malware ever designed.

Once it gains access to a plant's computers, it hunts out specific software that controls operations such as the opening and closing of valves or temperature regulation.

By halting those processes it can cause extensive damage to nuclear power stations, power grids or other industrial facilities.

Alan Bentley, senior vice president of IT security company Lumension, told Sky News Online: "The worrying thing about Stuxnet is that mischief or financial reward wasn't its purpose, it was aimed right at the heart of a critical infrastructure.

"Stuxnet isn't just another piece of malware. It is the most refined piece of malware ever discovered."

The worm was discovered in July and attacks were reported primarily in Iran but other countries such as Pakistan and Indonesia have been affected.

The high the number of infections in Iran have led some to conclude that the worm may have been designed in the US or Israel to disable Iran's controversial nuclear facilities.

Technology security provider Symantec told the Financial Times it would have taken a team of 10 specialised programmers about six months of full-time work to design Stuxnet.

"Government organisations across the world need to think carefully about how they are protecting their power stations, water plants and industrial units, from malicious attack," Mr Bentley added.




Recall my previous post:

http://www.grandoldteam.com/forum/t...ry-reveals-2008-attack-by-foreign-spy-service

US Military reveals 2008 attack by foreign spy service
Secret US military computers 'cyber attacked' in 2008


http://www.bbc.co.uk/news/world-us-canada-11088658

"The US military operates 15,000 networks and seven million computers across the world that are probed by attackers thousands of times a day, Mr Lynn said."

"The Pentagon has consolidated its cyber defence operations into a single command structure, which began operations in May."



Is this the first case of the new Cyber Defence Command conducting a retaliatory strike on a foreign power? One to send a message to the regime following last week's comments at the UN ?

I'd speculate yes it is. One in which other allied nations had either knowledge of and participated in.



The ethics of this? Given that the US had already suffered an attack on its military network infrastructure in 2008. - understandable. And preventative of further attacks by Iran.
 
Last edited:

Dont worry, iv just been on the phone to the Iranian Government.

Everything sorted.

There going to build a Rapid Rail system, so disaster averted.


Few that was close.......

Wipes sweat from brow**
 
attention-seeker.jpg
 
Hopefully it will set them back a few years.
I applaud who ever planted that worm into there computers.
Tin pot countries like this who fund, train and supply equipment to terrorists should never be allowed a threat like this.
 

Hopefully it will set them back a few years.
I applaud who ever planted that worm into there computers.
Tin pot countries like this who fund, train and supply equipment to terrorists should never be allowed a threat like this.

Its targeting Industrial equipment software particularly.

It's definitely a targeted attack.


And its funny - they reckon it's sophistication means it may have taken 6 months to develop for a team of engineers.

It was May this Cyber Command took over, and it's funny they detailed a previous attack by Iran (in Iraq) too on them.


By how specific the attack is. Looks like the US is flexing its muscles using a tactic employed against it.

Ingenious really. The speed of how they've adapted is impressive. 6 months and they've severely hindered if not cripped the Iranian software infrastructure for their Atomic agency.

Without a shot fired or bomb dropped.


This is set piece warfare this. By revealing the previous attack on the US military in 2008, they've effectively given a casus belli. Thus legal ramifications are minimum.

And its the hindrance and pressure this puts on the Iranians after last week comments.
 
Last edited:
Why couldnt they make it go in to meltdown and blow them all up. Americans only doing half the job again.
 

Status
Not open for further replies.

Welcome

Join Grand Old Team to get involved in the Everton discussion. Signing up is quick, easy, and completely free.

Shop

Back
Top