IOL Technology – Is this a cyber war on Iran?.
Computers can go wrong, and everyone is used to it. But that’s at home. We assume that the machines controlling the infrastructure that makes everything tick – power stations, chemical works, water purification plants – have rock-solid defences to deal with crashes or virus attacks by malicious strangers.
Now a new online sabotage has reached its zenith with a self-replicating “worm” that started on a single USB drive and spread through industrial computer systems worldwide.
It is so sophisticated that analysts believe it can only be part of a state-sponsored attack, the Stuxnet worm – or “malware” – is the first programming creation designed to cause world damage. If experts are right, it could herald a new chapter in the history of cyber warfare.
The worm, designed to spy on and reprogram industrial systems running a specific piece of industrial control software produced by German company Siemens, has been detected on computers in Indonesia, India and Pakistan, but more significantly Iran; 60 percent of current infections have taken place there, with 30 000 internet-connected computers affected so far, including machines at the nuclear power plant in Bushehr, due to open in the next few weeks.
Hamid Alipour, deputy head of Iran’s Information Technology Company, warned that nearly four months after it was identified, “new versions of the virus are spreading”. Despite intense scrutiny of the code by malware experts, they have been unable to discover what the intended target of Stuxnet may be. But Alan Bentley, international vice-president at security firm Lumension, is in no doubt that it’s “the most refined piece of malware ever discovered”.
The motive is certainly not, as is usual with such attacks, financial gain or simple tomfoolery; Stuxnet is intelligent enough to target specific kinds of industrial computer systems, then if it finds what it’s looking for, seek new orders to disrupt them. Two potential targets of the worm may have been nuclear facilities within Iran at Bushehr and Natanz. A document on Wikileaks suggests that a nuclear accident may have occurred at Natanz in July last year, followed by the unexplained resignation of the head of Iran’s Atomic Energy Organisation.
But if that was Stuxnet’s intended target, it has continued to spread regardless. Melissa Hathaway, a former US national cybersecurity co-ordinator, said: “We have about 90 days to fix this before some hacker begins using it. Security software firm Symantec estimated that Stuxnet would have taken specialists around six months to compile – a resource not within the means of the average internet criminal.
One of the engineers working on unpicking the code was surprised with the sophistication of the project, adding: “This is what nation states build if their only other option would be to go to war.”
Iran’s controversial nuclear ambitions throw up any number of likely suspects, but a number of fingers have pointed at Israel, and in particular its intelligence corps, Unit 8200.
Last summer, Reuters reported on Israel’s cyber-warfare project, with a recently retired Israeli security cabinet member stating that Iran’s computer networks were very vulnerable.
Scott Borg, director of the US cyber consequences unit, added that “a contaminated USB stick would be enough” to commandeer the controls of sensitive sites such as uranium enrichment plants.
The ramifications of this incident are considerable. Not only are there worries about the effects of Stuxnet upon computers that are critical to people’s everyday lives, but there’s also concern over the poor level of computer security being used by those operating such machines. Stuxnet made its way into computer systems via vulnerabilities in Microsoft’s Windows operating system, before taking control of the Siemens software via its default password.
The fact that something as mundane as a password issue could have such a critical effect has also caused consternation among commentators and analysts – as has the unnerving announcement from Siemens to its customers not to change that password lest it “impact plant operations”. Siemens has offered a free download on its website to remove Stuxnet; while this is a common procedure for many viruses, it’s alarming that a nuclear facility would have to do such a thing to ensure its stability.
Stuxnet has kicked off an additional debate over exactly how prevalent this kind of cyber-attack may already be. This is far from the first incident where governments have found themselves under attack via computer.





Recent Comments