Showing posts with label Stuxnet. Show all posts
Showing posts with label Stuxnet. Show all posts

Stuxnet Virus Driving Iranian Nuclear Program Right Into the Ground

Stuxnet 'running wild' at vital Bashehr and Nanantz facilities... may be all but unstoppable

Iran's nuclear program is still in chaos despite its leaders' adamant claim that they have contained the computer worm that attacked their facilities, cybersecurity experts in the United States and Europe say. 

The American and European experts say their security websites, which deal with the computer worm known as Stuxnet, continue to be swamped with traffic from Tehran and other places in the Islamic Republic, an indication that the worm continues to infect the computers at Iran's two nuclear sites. 

The Stuxnet worm, named after initials found in its code, is the most sophisticated cyberweapon ever created. Examination of the worm shows it was a cybermissile designed to penetrate advanced security systems. It was equipped with a warhead that targeted and took over the controls of the centrifuge systems at Iran’s uranium processing center in Natanz, and it had a second warhead that targeted the massive turbine at the nuclear reactor in Bashehr. Stuxnet was designed to take over the control systems and evade detection, and it apparently was very successful. 

Last week President Mahmoud Ahmadinejad, after months of denials, admitted that the worm had penetrated Iran's nuclear sites, but he said it was detected and controlled. 

The second part of that claim, experts say, doesn’t ring true. Eric Byres, a computer expert who has studied the worm, said his site was hit with a surge in traffic from Iran, meaning that efforts to get the two nuclear plants to function normally have failed. 

The web traffic, he says, shows Iran still hasn’t come to grips with the complexity of the malware that appears to be still infecting the systems at both Bashehr and Natanz. “The effort has been stunning," Byres said. 

"Two years ago American users on my site outnumbered Iranians by 100 to 1. Today we are close to a majority of Iranian users.” He said that while there may be some individual computer owners from Iran looking for information about the virus, it was unlikely that they were responsible for the vast majority of the inquiries because the worm targeted only the two nuclear sites and did no damage to the thousands of other computers it infiltrated. 

At one of the larger American web companies offering advice on how to eliminate the worm, traffic from Iran has swamped that of its largest user: the United States. “Our traffic from Iran has really spiked”...

Ralph Langner, the German expert who was among the first to study and raise alarms about Stuxnet, said he was not surprised by the development. “The Iranians don’t have the depth of knowledge to handle the worm or understand its complexity,” he said, raising the possibility that they may never succeed in eliminating it. 

“Here is their problem. They should throw out every personal computer involved with the nuclear program and start over, but they can’t do that. Moreover, they are completely dependent on outside companies for the construction and maintenance of their nuclear facilities. They should throw out their computers as well. But they can’t,“ he explained. “They will just continually re-infect themselves.” 

“With the best of expertise and equipment it would take another year for the plants to function normally again because it is so hard to get the worm out. It even hides in the back-up systems. But they can’t do it,” he said. 

And Iran’s anti-worm effort may have had another setback. In Tehran, men on motorcycles attacked two leading nuclear scientists on their way to work. Using magnetic bombs, the motorcyclists pulled alongside their cars and attached the devices. One scientist was wounded and the other killed. Confirmed reports say that the murdered scientist was in charge of dealing with the Stuxnet virus at the nuclear plants...


WikiLeaks: Israel Ready to Strike Iran

The IDF can handle the job without any US military help...


According to documents made public by the suicidally-wreckless WikiLeaks, Israel told US politicians 18 mos ago that 2010 was to be the "critical year" for attacking Iran's illicit nuclear weapons program. They've been warning us for a half decade that time is running out, and now-leaked diplomatic cables from Ehud Barak had set a deadline for military action. 

The files also betrayed the fact that Israel already has taken delivery of the GBU-28 bunker-busting bomb, and that efforts where made to conceal this from the public:
Ehud Barak, Israel's defence minister, told American congressmen in June 2009 there was a window of "between six and 18 months from now in which stopping Iran from acquiring nuclear weapons might still be viable". After that, Barak said – in a striking admission recorded in a confidential state department document – "any military solution would result in unacceptable collateral damage". 

Barak's comments were one of many occasions in the last five years when Israeli leaders and officials have hammered home the message to the US that Iran's nuclear ambitions pose an existential threat to Israel... 

Israel saw 2010 as a pivotal year. "If the Iranians continue to protect and harden their nuclear sites it will be more difficult to target and damage them," the US embassy reported Israeli defence officials as saying in November 2009. 

In a discussion of the upcoming delivery of GBU-28 bunker-busting bombs to Israel it was noted that the transfer "should be handled quietly to avoid allegations that the US government was helping Israel prepare for a strike against Iran". 

Secret cables originating from the US embassy in Tel Aviv record the head of the Mossad secret service, Meir Dagan – along with senior military men and diplomats – repeatedly explaining to US visitors Israel's concerns and strategy for confronting Iran, including a readiness to take military action.

By late 2009 the Mossad's view was that "there is no reason to believe Iran will do anything but use negotiations to stall for time so that by 2010-2011, Iran will have the technological capability to build a nuclear weapon – essentially reducing the question of weaponising to a political decision". 

Dagan told a US politician in March 2005: "Iran has decided to go nuclear and nothing will stop it." Israel and the US sometimes differed in their analysis, the Mossad chief conceded, but the facts themselves were "not in dispute".  -The Guardian-  -WikiLeaks-


Perhaps Israel will feel their hand is now forced by the WikiLeaks disclosures... now that the Iranians know they won't do it later.  One hope is that the "weaponized" Stuxnet virus already has them a year or so behind schedule in Iran. That ongoing cyber-attack seems to have done some pretty serious damage, and in the most amazing ways...
Stuxnet acted like computer cruise missile rather than a computer virus. The computers it targeted were not connected to the Internet, so it had to be secretly introduced into the Iranian system and hop through a set of unconnected computers, growing and adapting to security measures and other changes until it reached a computer that could bring it into the nuclear facility. 

And when it reached its target, the worm would have to secretly manipulate the computers running the Iranian nuclear program until its damage was done and then finally it would have to destroy itself without leaving a trace. That's exactly what happened both at Natanz, which houses the centrifuges Iran used for processing uranium into nuclear fuel, and at Bushehr, Iran's nuclear power plant...

This went on for over a year, the worms causing havoc in the Iranian Nuclear Program. And as it did, the worm grew and adapted throughout the system. As new worms entered the system, they would "get together" with the old ones adapt and become increasingly sophisticated... -Yid With Lid-


But the day would still be drawing close where they are an existential threat to Israel... one that must be confronted... this also from the WikiLeaks dump:
The United States has told France that Israel could strike Iran without US military support but the operation might not be successful, according to a leaked document published on the WikiLeaks website. 

US Defense Secretary Robert Gates gave his assessment at a meeting on February 8 in Paris with former French defense minister Herve Morin, according to a secret summary of the session that was posted on WikiLeaks, part of a massive document dump of classified cables. -Breitbart-


The Israeli Defense Forces also possess advanced Heron drones capable of reaching Iran... impressive piece of kit -here-


WikiLeaks: Chinese Government Organized 2009 Cyber-Attack on Google

Effort gathered Chinese government agents, 
online security experts... even outlaw hackers


Items in the latest WikiLeaks document dump reveal that the 2009 hacking attack on Google, Adobe, and others -which led to the withdrawal of Google Search from the Chinese market-  was conducted Chinese government cyber-operatives, private security experts, and even Internet criminal hackers recruited directly by the Chinese government...
A global computer hacking effort: China’s Politburo directed the intrusion into Google’s computer systems in that country, a Chinese contact told the American Embassy in Beijing in January, one cable reported. 

The Google hacking was part of a coordinated campaign of computer sabotage carried out by government operatives, private security experts and Internet outlaws recruited by the Chinese government. They have broken into American government computers and those of Western allies, the Dalai Lama and American businesses since 2002, cables said. -NYT


The attacks on Google servers had come in the wake of differences over the communist Chinese forcing Google to filter/censor results. Subsequently, Google email accounts were hacked, IP theft was carried-out, and trojan-horse malware attacks arrived to Chinese dissidents and others in a Pdf file:
The "highly sophisticated and targeted attacks" - which Google said also affected 20 other large firms across a wide range of businesses - were traced to Chinese IP addresses. These hacking attacks also involved attempts to steal the search giant's intellectual property but the primary target appears to have been webmail accounts of Chinese human rights activists.
-The Register (UK)


And the Chinese have BIG plans in the area of cyber-warfare, too.  As they get better at breaking into our most secure systems, they are aggressively reinforcing complex defenses of their own. 

Israel's Stuxnet has not only hit Iran hard, but arrived in China as well.  This provides a lesson in the viability of "weaponized" computer viruses, and Beijing sees this as an opportunity to leapfrog the West's massive military advantages by implementing it on a grand scale -here-

Stuxnet Hitting China Now

A most unwelcome visitor...

Breitbart:
A computer virus dubbed the world's "first cyber superweapon" by experts and which may have been designed to attack Iran's nuclear facilities has found a new target -- China. 

The Stuxnet computer worm has wreaked havoc in China, infecting millions of computers around the country, state media reported this week. Stuxnet is feared by experts around the globe as it can break into computers that control machinery at the heart of industry, allowing an attacker to assume control of critical systems like pumps, motors, alarms and valves. It could, technically, make factory boilers explode, destroy gas pipelines or even cause a nuclear plant to malfunction. 

The virus targets control systems made by German industrial giant Siemens commonly used to manage water supplies, oil rigs, power plants and other industrial facilities. "This malware is specially designed to sabotage plants and damage industrial systems, instead of stealing personal data," an engineer surnamed Wang at antivirus service provider Rising International Software told the Global Times. "Once Stuxnet successfully penetrates factory computers in China, those industries may collapse, which would damage China's national security," he added. 

Another unnamed expert at Rising International said the attacks had so far infected more than six million individual accounts and nearly 1,000 corporate accounts around the country, the official Xinhua news agency reported. 

The Stuxnet computer worm -- a piece of malicious software (malware) which copies itself and sends itself on to other computers in a network -- was first publicly identified in June. It was found lurking on Siemens systems in India, Indonesia, Pakistan and elsewhere, but the heaviest infiltration appears to be in Iran, according to software security researchers.
Rumored origin of course is an Israeli-CIA collaboration of some sort. DebkaFile reported that Israel has had special elite units carrying out such assignments for some time. Three years ago, for instance, cyber raiders played a role in the destruction of the plutonium reactor North Korea was building at A-Zur in northern Syria. Now reportedly 3000 centrifuges are down at Nanantz... and these 7th-century savages had no idea what hit them... but they've started to figure it out

Israel is probably more than 10 years ahead of the Iranians in this field, and I doubt this is the last of it- not by a long shot. Cyberwarfare presents a battlefield of Israel's choosing: it's fairly deniable, and far preferable for a country smaller than Lake Michigan taking on Syria, Iran, Hezbollah, and Hamas all at once... and with tepid US support.

Sophisticated CIA and/or Israeli Cyber Attack on Iran Already Well Underway...?

Stuxnet is believed to be the most destructive virus ever devised for attacking major industrial complexes, reactors and infrastructure... and it's hitting Tehran hard


The Islamic Republic of Iran looks to be in the midst of a major ongoing cyber attack upon it's most vital computer systems by the unprecedentedly menacing Stuxnet virus... including nuclear  reactors and other sensitive facilities:
Mahmoud Alyaee, secretary-general of Iran's industrial computer servers, including its nuclear facilities control systems, confirmed Saturday, Sept. 25, that 30,000 computers belonging to classified industrial units had been infected and disabled by the malicious Stuxnet virus. 

This followed DEBKAfile's exclusive report Thursday, Sept. 23, from its Washington and defense sources that a clandestine cyber war is being fought against Iran by the United States with elite cyber war units established by Israel. Stuxnet is believed to be the most destructive virus ever devised for attacking major industrial complexes, reactors and infrastructure. 

The experts say it is beyond the capabilities of private or individual hackers and could have been produced by a high-tech state like America or Israel, or its military cyber specialists. The Iranian official said Stuxnet had been designed to strike the industrial control systems in Iran manufactured by the German Siemens and transfer classified data abroad. 

The head of the Pentagon's cyber war department, Vice Adm. Bernard McCullough said Thursday, Sept. 22, that Stuxnet had capabilities never seen before. In a briefing to the Armed Forces Committee of US Congress, he testified that it was regarded as the most advanced and sophisticated piece of Malware to date. 

According to Alyaee, the virus began attacking Iranian industrial systems two months ago. He had no doubt that Iran was the victim of a cyber attack which its anti-terror computer experts had so far failed to fight. Stuxnet is powerful enough to change an entire environment, he said without elaborating. 

Not only has it taken control of automatic industrial systems, but has raided them for classified information and transferred the date abroad. This was the first time an Iranian official has explained how the United States and Israel intelligence agencies have been able to keep pace step by step of progress made in Iran's nuclear program. Until now, Tehran attributed the leaks to Western spies using Iranian double agents...
__________________________________________

Leaks by American security sources to US media referred to the recruitment by Israel military and security agencies of cyber raiders with the technical knowhow and mental toughness for operating in difficult and hazardous circumstances, such as assignments for stealing or destroying enemy technology, according to one report.

DEBKAfile's sources disclose that Israel has had special elite units carrying out such assignments for some time. Three years ago, for instance, cyber raiders played a role in the destruction of the plutonium reactor North Korea was building at A-Zur in northern Syria.

Some computer security specialists reported speculated that the virus was devised specifically to target part of the Iranian nuclear infrastructure, either the Bushehr nuclear plant activated last month - which has not been confirmed - or the centrifuge facility in Natanz.

DEBKAfile's sources add: Since August, American and UN nuclear watchdog sources have been reporting a slowdown in Iran's enrichment processing due to technical problems which have knocked out a large number of centrifuges and which its nuclear technicians have been unable to repair. It is estimated that at Natanz alone, 3,000 centrifuges have been idled...
About time we started employing our nation's dramatic technological advantages over these medieval savages... why we wouldn't throw all we got at 'em is beyond me. At minimum, buys us time until we are forced to go with John Bolton's more traditional approach...