Categories Air Defence ATC/ATM ATM Border Control Border Security C4ISR Contracts Customs and Border Protection Cyber Security DHS Export Control Homeland Security ITA MoD NATO Piracy / Antipiracy Policy sensor site protection training TSA UK MoD Uncat US Coast Guard US DoD VTS / VTM
Israeli cyber unit responsible for Iran computer worm – claim
An elite Israeli military unit responsible for cyberwarfare has been accused of creating a virus that has crippled Iran’s computer systems and stopped work at its newest nuclear power station.
The code contains the word “myrtus”, which is the Latin biological term for the myrtle tree. The Hebrew word for myrtle, Hadassah, was the birth name of Esther, the Jewish queen of Persia.
In the Bible, The Book of Esther tells how the queen pre-empted an attack on the country’s Jewish population and then persuaded her husband to launch an attack before being attacked themselves.
Israel has threatened to launch a pre-emptive attack on Iran’s facilities to ensure that the Islamic state does not gain the ability to threaten its existence.
Ralf Langner, a German researcher, claims that Unit 8200, the signals intelligence arm of the Israeli defence forces, perpetrated the computer virus attack by infiltrating the software into the Bushehr nuclear power station
Mr Langer said: “If you read the Bible you can make a guess.”
Computer experts have spent months tracing the origin of the Stuxnet worm, a sophisticated piece of malicious software, or malware, that has infected industrial operating systems made by the German firm Siemens across the globe.
Programmers following Stuxnet believe it was most likely introduced to Iran on a memory stick, possibly by one of the Russian firms helping to build Bushehr. The same firm has projects in Asia, including India and Indonesia which were also attacked. Iran is thought to have suffered 60 per cent of the attacks.
Mr Langner said: “It would be an absolute no-brainer to leave an infected USB stick near one of these guys and there would be more than a 50 per cent chance of him pick it up and infect his computer.”
Cyber security experts said that Israel was the most likely perpetrator of the attack and had been targeting Iran but that it had not acknowledged a role to its allies.
“Nobody is willing to accept responsibility for this particular piece of malicious software which is a curious, complex and powerful weapon,” said one Whitehall expert.
The Iranian authorities acknowledged the worm had struck Bushehr and a statement conceded that the plant would come into operation in January, two months later than planned.
Elizabeth Katina, a researcher at the Royal United Services Institute, said the possibility of a copycat attack on British or American electricity networks or water supplies had been elevated by the release of Stuxnet.
“Critical national infrastructure is at greater risk because this shows groups on the outside of governments how to do it,” she said. “It’s more likely now that the northeast of England power grid can be shut down until someone decides to start it up again.”
Richard Spencer and Damien McElroy – Telegraph (UK)