Posted on 09/29/2010 11:41:25 AM PDT by dselig
Iran admitted it was under full-scale cyber terror attack. The official IRNA news agency quoted Hamid Alipour, deputy head of Iran's government Information Technology Company, as saying that the Stuxnet computer worm "is mutating and wreaking further havoc on computerized industrial equipment."
Stuxnet was no normal worm, he said: "The attack is still ongoing and new versions of this virus are spreading."
Revolutionary Guards deputy commander Hossein Salami declared his force had all the defensive structures for fighting a long-term war against "the biggest and most powerful enemies" and was ready to defend the revolution with more advanced weapons than the past. He stressed that defense systems have been designed for all points of the country, and a special plan devised for the Bushehr nuclear power plant. Military sources report that this indicates that the plant - and probably other nuclear facilities too - had been infected, although Iranian officials have insisted it has not, only the personal computers of its staff.
The Stuxnet spy worm has been created in line with the West's electronic warfare against Iran," said Mahmoud Liayi, secretary of the information technology council of the Industries Minister.
As for the origin of the Stuxnet attack, Hamid Alipour said: The hackers who enjoy "huge investments" from a series of foreign countries or organizations, designed the worm, which has affected at least 30,000 Iranian addresses, to exploit five different security vulnerabilities. This confirmed the impressions of Western experts that Stuxnet invaded Iran's Supervisory Control and Data Acquisition systems through "zero-day" access.
Alipour added the malware, the first known worm to target large-scale systems and industrial complexes control systems, is also a serious threat to personal computers.
Iranian and intelligence sources report that these statements are preparing the ground for Tehran to go beyond condemning the states or intelligence bodies alleged to have sponsored the cyber attack on Iranian infrastructure and military industries and retaliate against them militarily. Iran is acting in the role of victim of unprovoked, full-scale, cyber terror aggression.
They wanted to run with the big dogs so now let them pay the price
I think I read that many Iranian PCs are running pirated copies of Windows. Let them reap the benefits.
Good post. lol
Wow, Iran eaten by a worm. I think I saw this movie. I think Kevin Bacon was in it. But then, isn’t he in every movie?
My Gawd.
Islam has a Super Cat.
Onos, onos.
LOL!!
Hopefully it will spread onto North Korea’s systems.
Probably chuckling in Tel Aviv too.
Don’t they have to identify them before they can “retaliate against them militarily”?
I’ll bet Gama-Sec helped to develop the attack, since it’s work is to “prevent” zero day attacks. hahahahaha.
I’ll bet Gama-Sec helped to develop the attack, since it’s work is to “prevent” zero day attacks. hahahahaha.
There is no abacus version of the worm as of yet.
Hopefully it penetrates their ally networks, Syria , Pawk e stan and Koreea. Particularly pok e stawn.
Wait until they find it was an inside job.
Pretty brilliant if you ask me. In fact, this might be the most brilliant thing the Israelis ever did. You know it was going to be near impossible to drop nuclear bombs on their nuke facilities so what better way to mess things up without even having to fire a shot.
What I find most hilarious about this is that Siemens is warning users not to change the default passwords their SCADA systems shipped with. Stuxnet uses these default passwords to take over the SCADA systems.
Much of this could have been avoided by Siemens simply using beginner-level security practices.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.