Posted on 09/29/2010 5:52:44 AM PDT by Errant
Tehran this week secretly appealed to a number of computer security experts in West and East Europe with offers of handsome fees for consultations on ways to exorcize the Stuxnet worm spreading havoc through the computer networks and administrative software of its most important industrial complexes and military command centers. debkafile's intelligence and Iranian sources report Iran turned for outside help after local computer experts failed to remove the destructive virus. None of the foreign experts has so far come forward because Tehran refuses to provide precise information on the sensitive centers and systems under attack and give the visiting specialists the locations where they would need to work. They were not told whether they would be called on to work outside Tehran or given access to affected sites to study how they function and how the malworm managed to disable them. Iran also refuses to give out data on the changes its engineers have made to imported SCADA (Supervisory Control and Data Acquisition) systems, mostly from Germany. The impression debkafile sources gained Wednesday, Sept. 29 from talking to European computer experts approached for aid was that the Iranians are getting desperate. Not only have their own attempts to defeat the invading worm failed, but they made matters worse: The malworm became more aggressive and returned to the attack on parts of the systems damaged in the initial attack.
One expert said: "The Iranians have been forced to realize that they would be better off not 'irritating' the invader because it hits back with a bigger punch."
Looking beyond Iran's predicament, he wondered whether the people responsible for planting Stuxnet in Iran - and apparently continuing to offload information from its sensitive systems - have the technology for stopping its rampage. "My impression," he said, "is that somebody outside Iran has partial control at least on its spread. Can this body stop malworm in its tracks or kill it? We don't have that information at present, he said.
As it is, the Iranian officials who turned outside for help were described by another of the experts they approached as alarmed and frustrated. It has dawned on them that the trouble cannot be waved away overnight but is around for the long haul. Finding a credible specialist with the magic code for ridding them of the cyber enemy could take several months. After their own attempts to defeat Stuxnet backfired, all the Iranians can do now is to sit back and hope for the best, helpless to predict the worm's next target and which other of their strategic industries will go down or be robbed of its secrets next.
While Tehran has given out several conflicting figures on the systems and networks struck by the malworm - 30,000 to 45,000 industrial units - debkafile's sources cite security experts as putting the figure much higher, in the region of millions. If this is true, then this cyber weapon attack on Iran would be the greatest ever.
Now let's see, what country in that area has a motive to have released this malworm? What country has the intellectual manpower to create something this powerful yet effective?
Maybe that's why Israel never planned to bomb Iran. Maybe they planned on having Iran bomb itself.
The best thing that could happen would be to have this reactor go online and then have the cooling plant fail. I'm hoping that the Iranians put the reactor close to a major city. That would be Schadenfreude of the highest order.
Read: Siemens
Jeez! It’s simple! All they have to do is replace all of their equipment and shoot or hang everyone who was ever in a position to possibly be able to plant such a thing. Then they can start over. Of course they will lose a couple of weeks of development progress but hey, that’s the breaks.
Not "closed loop" but "isolated" is what I think you meant. (Very different things.) But yes, if the virus were so written it could be conveyed by a memory card/stick.
Interesting that it appears designed to specifically attack Siemens SCADA systems. This was no accident.
I think Israel has launched its attack. And Israel may have largely decapitated Hizbullah and Hamas with the same bomb. And this is the new "militarily."
I think Israel has launched its attack. And Israel may have largely decapitated Hizbullah and Hamas with the same bomb. And this is the new "militarily."
Well, a worm infested Russia and China would be nice.
I also read something earlier that the worm attacked PLC (Programmable Logic Controller) programs. Don't know if you're familiar with PLCs. They probably control 90% of automated systems, worldwide. Of course, Siemens is one of many manufacturers of PLCs.
Lots a speculation...
It is a worm with specific addresses on it. Something like it is in the future for all of us and surely our IT elite are furiously working on defenses even now.I expect my AVG to have a stuxnet update any time now, any time, come on you guys!
It's what I use though it failed me while researching Martin Armstrong.
Possibly Israel, or even the US made a deal with a Siemens engineer who never left the home office. We kind of did it to the Russians in the 80s. We banned export of American computer equipment to the USSR then made sure the USSR got preloaded American computer equipment from illegal channels in “neutral” Sweden. The Russians them spent vast quantities of rubles barking up wrong trees. I guess we didn’t virus them, just sold them some special programs.
I paid for McAffee for several years and only had a few virus attacks. Then I got AVG Free and have not had that problem in 9 years.
“Why wouldnt Russia do this? They can come in and save the day. (For a small fee of course)”
Because if they do, they’re next.
Pipelines blow up for real funny reasons, Putin.
Help, and enjoy sitting in the dark.
I hope they are next, anyway.
I remember that being process control chips that actually led to some pipeline explosions.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.