Iran Nuclear NewsMalware was aimed at five sites in Iran, report...

Malware was aimed at five sites in Iran, report says

-

New York Times: The Stuxnet software worm repeatedly sought to infect five industrial facilities in Iran over a 10-month period, a new report says, in what could be a clue into how it might have infected the Iranian uranium enrichment complex at Natanz.

The New York Times

By JOHN MARKOFF

The Stuxnet software worm repeatedly sought to infect five industrial facilities in Iran over a 10-month period, a new report says, in what could be a clue into how it might have infected the Iranian uranium enrichment complex at Natanz.

The report, released Friday by Symantec, a computer security software firm, said there were three waves of attacks. Liam O Murchu, a security researcher at the firm, said his team was able to chart the path of the infection because of an unusual feature of the malware: Stuxnet recorded information on the location and type of each computer it infected.

Such information would allow the authors of Stuxnet to determine if they had successfully reached their intended target.By taking samples of Stuxnet they had collected from various computers, the researchers were able to build a model of the spread of the infection. They determined that 12,000 infections could be traced back to just five initial infection points.

Between June 2009 and May 2010, the program took aim at specific organizations in Iran on three occasions, Symantec research noted in an update of a research report the company published last year.

The Symantec team said they had collected five Internet domains that are linked to industrial organizations within Iran. They said because of the company’s privacy policies they would not disclose the domain names.

“All of the domains are involved in industrial processing,” Mr. O Murchu said in an interview.

It is likely that a classified site like Natanz is not connected directly to the Internet. Therefore, an attacker might try to infect industrial organizations that would be likely to share information, and the malware, with Natanz.

There were probably at least three and possibly four versions of the program written, and the researchers discovered that the first version had been completed just 12 hours before the first successful infection in June 2009. The researchers speculated that the first step in the infection was either an infected e-mail message sent to an intended victim or a hand carried USB disk that carried the attack code.

When international inspectors visited Natanz in late 2009, they found that almost 1,000 gas centrifuges had been taken off-line, leading to speculation that the attack may have disabled a portion of the complex.

In April 2010 the attackers again attempted to distribute the program. This time they found a new vulnerability in Windows-based computers to be infected with a USB device and most likely successfully inserted the program that way at an unknown location inside Iran.

The Symantec researchers also said they had determined that the malware program carried two different attack modules aimed at different centrifuge arrays, but that one of them had been disabled.

Stuxnet first infected Windows-based industrial control computers while it hunted for particular types of equipment made by the Siemens Corporation. It was programmed to then damage a uranium centrifuge array by repeatedly speeding it up, while at the same time hiding its attack from the control computers by sending false information to displays that monitored the system.

The New York Times reported in January that Israel had built an elaborate test facility at a classified nuclear weapons site that contained a replica array of the Iranian uranium enrichment plant. Such a test site would have been necessary for the design of the attack software.

“We know the exact configuration of the system they were looking for,” said Mr. O Murchu. “We know they were looking for a certain number of frequency converters. And each of those frequency converters controls a certain number of motors. And those numbers fit in with what you expect to see in an uranium enrichment facility.”

Latest news

Iran’s Regime Sentences Singer Toomaj Salehi to Death

Amir Reisian, Toomaj Salehi’s lawyer, says the so-called “Revolutionary Court” in an "unprecedented" move has sentenced this dissident singer...

Iran Faces Severe Medicine Shortage and Lack of Government Funding

The Health and Treatment Commission of Iranian regime’s Majlis (parliament) recently released a report highlighting the dire situation of...

U.S. House of Representatives and Senate Approve Measures Targeting Iran’s Regime

In a resolute move showcasing bipartisan unity towards addressing the Iranian regime's actions, the United States House of Representatives...

Grossi: Iran Weeks Away from Having Enough Enriched Uranium for Atomic Bomb

Rafael Grossi, the Director General of the International Atomic Energy Agency (IAEA), has stated that Iran is just weeks...

In the past two years, 8 million people added to Iran’s poor population

According to information analyzed by the state-run Etemad newspaper regarding poverty rate data, a 10% increase in the poverty...

Iran: 9 Prisoners Executed in One Day

The Iranian regime executed five prisoners in Kerman prison and two prisoners in Chabahar prison on April 21. At...

Must read

DaimlerChrysler Iran Truck Sale Faces German Probe

Bloomberg: DaimlerChrysler AG, the world's largest truckmaker, is being...

Soccer-Iran to complain to FIFA over women’s ban

Reuters: Iran will complain to world soccer's governing body...

You might also likeRELATED
Recommended to you