The breaking story of the computer virus that has attacked the Iranian nuclear program reads like a Le Carre spy thriller. A photograph that was inadvertently disseminated by the Iranians themselves last year showed a computer screen with a little red box clearly visible. A box that alerted every computer security hack in the world that the Iranian nuclear program was essentially unsecured.
I just can't for the life of me think of who might be responsible for the virus. I just hope that the perpetrator is brought to justice. Because who knows how long it will be before they can get this whole mess under control? How will the Iranians be able to arm themselves with nukes if they are sitting around waiting for their Mcafee update?
The virus apparently attacked the inner workings of a Siemens software system that had been appropriated from the russians. Unsuspecting engineers reportedly brought it in on their flash drives. As effective as a well placed missile aimed at a nuclear reactor like say, Osirak, but this time delivered in a bevy of 0's and 1's.
"We had anticipated that we could root out the virus within one to two months," Hamid Alipour, deputy head of Iran's Information Technology Co., a part of the ministry of communication and information technology, told the Islamic Republic News Agency. "But the virus is not stable, and since we started the cleanup process three new versions of it have been spreading," he said. Darn it, that's awful.
The worm reprograms the critical function software once it is inside the target system. Researchers still do not know which system it ultimately had in its sights or what type of sabotage was intended. Or even what future damage may occur as result of the breach.
Iranian officials said Saturday that they had been hit by "electronic warfare" and acknowledged that the worm had infected more than 30,000 computers, including personal computers owned by employees of the nuclear power plant near Bushehr. According to Israeli sources, the real target was the uranium enrichment facility at Natanz - where the centrifuge operational capacity has dropped over the past year by 30 percent after an unknown attack. The new analysis, based on the characteristic behavior of the Stuxnet worm, contradicts earlier assessments that the target was the nuclear reactor at Bushehr.
According to Haaretz Yossi Melman:
The Bushehr reactor, however, is considered less of a security threat than Natanz by the intelligence communities in both Israel and the United States. Because intelligence analysts believe Iran would have enough material for at least two nuclear bombs if it enriched the uranium held at Natanz from 3.5 percent to 90 percent, every scenario for an Israeli or American attack on Iran's nuclear facilities has put Natanz high on the list of potential targets.
There have been reports in the past of other alleged efforts by Israel and the West to undermine the Iranian nuclear project, some of which also targeted Natanz. These efforts included infiltrating the purchasing networks Iran set up to acquire parts and material for the centrifuges at Natanz and selling damaged equipment to the Iranians. The equipment would then be installed on site and sabotage the centrifuges' work.
The centrifuge - a drum with rotors, an air pump, valves and pressure gauges - is an extremely sensitive system. Generally, 164 centrifuges are linked into a cascade, and several cascades are then linked together. But the centrifuges need to operate in complete coordination to turn the uranium fluoride (UF6 ) they are fed into enriched uranium. Their sensitivity makes them particularly vulnerable to attacks, since damage to a single centrifuge can create a chain reaction that undermines the work of one or more entire cascades.
The International Atomic Energy Agency, whose inspectors regularly visit Natanz, has reported that of the more than 9,000 centrifuges installed on the site, less than 6,000 are operational. The agency did not provide an explanation of this 30 percent drop in capacity compared to a year ago, but experts speculated that the centrifuges were damaged by flawed equipment sold by Western intelligence agencies through straw companies.
The recent revelations about the Stuxnet worm might provide new insights into the problems encountered by the enrichment facility. German computer expert Frank Rieger wrote in Frankfurter Allgemeine Zeitung on Sunday that Wikileaks, a website specializing in information leaked from government agencies, reported in June on a mysterious accident at Natanz that paralyzed part of the facility. Rieger now thinks the Wikileaks report was connected to the Stuxnet worm. He noted that whoever developed the virus refined its programming to allow it to damage small, sensitive components like regulators, valves and pressure gauges, all of which are found in centrifuges.
The long term impact may be negligible. Iran has enough enriched uranium now in its possession for nuclear weapons. Russian security expert Eugene Kaspersky believes that this virus is a first strike in a new era in cyber warfare. This Computer World article deals how the worm spreads back to previously scrubbed pc's. And this one, also from Computer World that shows how the worm took advantage of spooler zero days, including one that was not known to the public at large. ZDNet notes that the password for the system was public knowledge. An interesting take from the NYT that takes the position that only a nation state could be capable of such a concerted attack, perhaps a nation like Israel. Our own pentagon will neither confirm or deny. Christian Science Monitor had an excellent article.
And another great CSM article where I found this snippet:
...A journalist's photo from inside the Bushehr plant in early 2009, which Langner found on a public news website, shows a computer-screen schematic diagram of a process control system – but also a small dialog box on the screen with a red warning symbol. Langner says the image on the computer screen is of a Siemens supervisory control and data acquisition (SCADA) industrial software control system called Simatic WinCC – and the little warning box reveals that the software was not installed or configured correctly, and was not licensed. That photo was a red flag that the nuclear plant was vulnerable to a cyberattack, he says.
"Bushehr has all kinds of missiles around it to protect it from an airstrike," Langner says. "But this little screen showed anyone that understood what that picture meant ... that these guys were just simply begging to be [cyber]attacked."
The picture was reportedly taken on Feb. 25, 2009, by which time the reactor should have had its cybersystems up and running and bulletproof, Langner says. The photo strongly suggests that they were not, he says. That increases the likelihood that Russian contractors unwittingly spread Stuxnet via their USB drives to Bushehr, he says.
It remains to be seen just how deep this cyber bomb has burrowed. And how would you like to be Microsoft, scurrying around trying to make security patches for software that just may have been damaged by their very own United States of America? Or is this another case of the zionist entity perfidiously making Achmadinejad their beehatch?
1 comment:
...that Achmad, he's a real piece of work...i love the George Blanda graphic, and the Marcus Aurelius quote.
Post a Comment