http://homelandsecuritynewswire.com/irans-control-systems-attacked-another-v
irus

 


Iran's control systems attacked by another virus


Published 26 April 2011

Iran admitted it has been attacked by another virus aiming to disrupt its
industrial control systems; the commander of Iran civil defense said,
though, that the virus has been caught in time and neutralized by Iran's
"young experts"; Gholamreza Jalali described the virus as "congruous and
harmonious with the (computer) system and in the initial phase it does minor
damage and might be mistaken for some executive files of government
organizations"; in the summer, nearly 42,000 computers and servers in Iran's
industrial control systems -- many of them in Iran's nuclear weapons program
-- were infected; the damage to uranium enrichment centrifuges was
especially great, causing Iran in mid-November to halt enrichment
operations; Stuxnet has also infected the Bushehr nuclear reactor; the
reactor was supposed to come on line in August, but it is still not
operational, and has missed several start-up deadlines

http://homelandsecuritynewswire.com/sites/default/files/imagecache/standard/
jalali.jpg

Gholamreza Jalali at a press conference // Source: iraniandefence.com

Iran's civil defense commander, Gholamreza Jalali said Iran has been under
sustained cyber attack, saying on Monday that yet another piece of malware -
called "Stars" - was about to infect computers and servers used in Iran's
industrial control systems.

Haaretz reports
<http://www.haaretz.com/news/international/iran-says-its-computers-targeted-
by-second-cyber-virus-stars-1.357997>  that Jalali was quoted as saying that
"Fortunately, our young experts have been able to discover this virus and
the Stars virus is now in the laboratory for more investigations." He did
not specify the target of Stars or its intended impact. "The particular
characteristics of the Stars virus have been discovered," Jalali told Mehr
<http://www.mehrnews.com/en/newsdetail.aspx?NewsID=1297506> , the
semi-official Iranian news agency. "The virus is congruous and harmonious
with the (computer) system and in the initial phase it does minor damage and
might be mistaken for some executive files of government organizations."

EWeek reports
<http://www.eweek.com/c/a/Security/Iran-Claims-Stars-Virus-a-Second-CyberAtt
ack-726573/>  - based on analysis by Graham Cluley, senior technology
consultant at Sophos, on the Naked Security blog
<http://nakedsecurity.sophos.com/2011/04/25/stars-virus-iran-second-cyberwar
fare-attack/>  - that this description by Jalali suggests the attack was
disguised as a legitimate Word, PDF, or other similar document types in
order to trick unsuspecting victims into infecting government computers.
EWeek notes that several organizations, including federal research facility
Oak Ridge National Laboratory, have disclosed that attackers breached their
systems by tricking employees into opening a malicious Word or Excel
document.

Cluley said that there is no proof at this point whether Stars is "really
specifically targeting Iranian systems," said, noting that Sophos
researchers see over 100,000 new unique malware samples every day, and many
of them are designed to spy on victims' computers.

"Presumably the Iranian authorities have reason to believe that the Stars
virus they have intercepted was specifically written to steal information
from their computers and is not just yet another piece of spyware," Cluley
said.

Stars is the second known virus to have targeted Iran's industrial control
systems. During the early early summer months of last year, the malware
Stuxnet, widely believed to have been created by Israeli military
programmers with the assistance of the United States, infected around 42,000
computers and servers used in Iran's nuclear weapons program. The infection
disabled about 20 percent of Iran's uranium enrichment centrifuges, leading
Iran, in mid-November last year, to halt enrichment activities (Iran said
that enrichment has been resumed since then).

The Stuxnet virus also infected the Bushehr nuclear reactor, which was
supposed to go on line in August. A Russian delegate to NATO said the
Stuxnet created a situation in which if the Bushehr reactor were to go on
line, it would become "another Chernobyl."

This assertion may have been an exaggeration, but the fact remains that
Bushehr is still not operational, having missed several start-up deadlines.

Haaretz quoted Jalali to say that Stuxnet might still pose a risk. "We
should know that fighting the Stuxnet virus does not mean the threat has
been completely tackled, because viruses have a certain life span and they
might continue their activities in another way."

Jalali expressed his frustration with what he described as foot-dragging by
the Iranian government in the face of the continuing cyber attacks on Iran.
"Perhaps the Foreign Ministry had overlooked the options to legally pursue
the case, and it seems our diplomatic apparatus should pay more attention to
follow up the cyber wars staged against Iran," Jalali said.

"The country should prepare itself to tackle future worms since future
worms, which may infect our systems, could be more dangerous than the first
ones," the Mehr news agency quoted Jalali as saying.

 



[Non-text portions of this message have been removed]



------------------------------------

--------------------------
Want to discuss this topic?  Head on over to our discussion list, 
discuss-os...@yahoogroups.com.
--------------------------
Brooks Isoldi, editor
biso...@intellnet.org

http://www.intellnet.org

  Post message: osint@yahoogroups.com
  Subscribe:    osint-subscr...@yahoogroups.com
  Unsubscribe:  osint-unsubscr...@yahoogroups.com


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    osint-dig...@yahoogroups.com 
    osint-fullfeatu...@yahoogroups.com

<*> To unsubscribe from this group, send an email to:
    osint-unsubscr...@yahoogroups.com

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/

Reply via email to