Don't miss

Replay


LATEST SHOWS

EYE ON AFRICA

Burundi's presidential election: our team follow incumbent Nkurunziza's campaign trail

Read more

MEDIAWATCH

Vote "No" for dignity and democracy ≠OXI

Read more

THE DEBATE

Turkey's Border Bother: Ankara wary of emboldened Kurds (part 2)

Read more

THE DEBATE

Turkey's Border Bother: Ankara wary of emboldened Kurds (part 1)

Read more

THE WORLD THIS WEEK

Tunisia Attack: UK ponders airstrike in Syria; Uber Popped: service suspended after French taxi revolt

Read more

THE WORLD THIS WEEK

Greece's Choice: Europe holds its breath over Sunday's referendum

Read more

#TECH 24

Testing robots to play, snuggle and learn

Read more

#THE 51%

Jordan: Where a rapist can marry his victim

Read more

Asia-pacific

Tehran slams foreign ‘cyber attack’ after mass malware infection

Text by Sébastian SEIBT

Latest update : 2010-09-27

Thousands of Iranian computers have been infected by the so-called Stuxnet virus in what Tehran is describing as an “electronic warfare” attack aimed at disrupting its Bushehr nuclear power plant.

Tehran has blamed the West Sunday for a massive computer virus attack after a complex malicious software infected tens of thousands of Iranian computers, potentially threatening major industrial facilities throughout the country.

The so-called Stuxnet worm (malware) utilises security holes in Microsoft Windows and industrial control systems to wreak havoc on infected computerised industrial equipment.

Although the malware reportedly first appeared more than three months ago, Iranian authorities only acknowledged the cyber attack on Sunday, with the secretary of the Information Technology Council of the Industries Ministry Mahmoud Liayi identifying some 30,000 personal computers that have been infected with the self-replicating malware.

Iranian officials said the virus had not been able to “cause serious damage to government systems”, underlining that it didn’t disrupt its Bushehr nuclear power station. The Iranian authorities’ reaction confirms what several Western computer security experts had earlier described as a malware specifically designed to hit Iranian industrial installations.

Complex cyber attack

Unlike most computer virus, Stuxnet targets computer systems used to monitor automated plants, with the potential to disrupt major industrial infrastructures such as chemical facilities or power generators. The malware has been designed to infiltrate computer systems developed by Siemens AG, a German engineering firm whose software is routinely used in several sensitive infrastructures in Iran.

The Stuxnet virus was first discovered in June 2010 by a small Belarusian computer security firm, VirusBlokAda. The malware’s complex code quickly raised questions over the identity of worm’s programmers, with most researchers concluding that Stuxnet’s conception had required a well-funded team of highly-sophisticated hackers.

US computer security firm Symantec pointed to a private group with “political, nationalist, or religious” motivations, or a state-sponsored attempt at espionage or sabotage of Iran nuclear facilities.

Natanz enrichment-facility targeted

Iranian officials are convinced that the Stuxnet virus was designed to target Iranian industrial facilities “in line with the West’s electronic warfare”. Indonesia and India seem to have been collateral victims of the initial Stuxnet onslaught, with 60,000 thousands there computers infected when the virus first appeared.

Although Iranian officials have insisted the Bushehr nuclear power plant had not been affected, some experts believe the virus’ actual target was the major uranium-enrichment site of Natanz in central Iran.

“The Bushehr plant is dedicated to civilian nuclear activities whereas the Natanz facility could have military implications”, German researcher Frank Riegern told Wired, a website specialised in new technologies.

While Iranian authorities have kept quiet regarding any infection of its Natanz site, the BBC and the Iranian press reported the sacking of a top Iranian nuclear official in July 2010, raising suspicions of some “serious incident” at the country’s top enrichment facility during Stuxnet’s first wave of infection.

A YouTube video from SophosLabs showing how Stuxnet infection occurs

Photo credit: DonHankins (sur Flickr)

Date created : 2010-09-26

  • IRAN

    World powers press Iran for new round of nuclear talks

    Read more

  • SAUDI ARABIA

    Largest-ever US arms deal aimed at countering Iran threat

    Read more

  • NUCLEAR IRAN

    Tehran pursuing atomic programme despite tougher sanctions, IAEA says

    Read more

COMMENT(S)