Iran blames Stuxnet worm on Western plot
Steps up blame campaign, denies that malware has delayed nuclear reactor startup
Computerworld - Iran today made its strongest statement yet that it believes a Western plot is behind the Stuxnet worm that has infected tens of thousands of computers in the country, including some at its sole nuclear power plant.
In a Tuesday press briefing, Iran's foreign ministry spokesman, Ramin Mehmanparast, blamed unnamed Western countries for creating and distributing the worm.
"It is hard for the Western states to tolerate the progress of Iran's peaceful nuclear program," said Mehmanparast in a summary of the briefing posted to the Ministry of Foreign Affairs Web site.
"Western states are trying to stop Iran's (nuclear) activities by embarking on psychological warfare and aggrandizing, but Iran would by no means give up its rights by such measures," Mehmanparast said, reacting to reports that Stuxnet had caused delays at the Bushehr nuclear reactor.
"Nothing would cause a delay in Iran's nuclear activities," Mehmanparast added.
In the last two weeks, Iranian officials have acknowledged that Stuxnet infected at least 30,000 Windows PCs in the country, among them some used by workers at the Bushehr nuclear power plant. Iran has repeatedly denied that the worm had infiltrated the industrial control systems at Bushehr, damaged the facility or caused any delay in its completion.
On Monday, Ali Akbar Salehi, who heads Iran's Atomic Energy Organization, said that although Bushehr would not reach full generating capacity until 2011, it would hit the 40% mark in December, according to the semi-official Fars News Agency.
A leak in a containment pool, which has since been fixed, was the cause of the most recent delay, Salehi claimed.
Western countries, including the U.S., suspect that other aspects of Iran's nuclear program are cover for enriching uranium into weapons-grade fuel. The Bushehr plant is not considered a proliferation risk by the U.S. Department of State, however, in large part because the reactor is Russian-operated.
Iran has steadily stepped up its campaign to pin blame for Stuxnet on a deliberate plot aimed at the country's nuclear plans. Last weekend, Heydar Moslehi, the government's minister of intelligence, said that "enemy spy services" were responsible for Stuxnet.
It's unlikely that the makers of Stuxnet were based in Iran; malware authors do not have to be in physical proximity to their targets.
Security experts have said that Stuxnet's complex design and its intent to hijack SCADA industrial control systems indicates that it was almost certainly the work of a state-backed group of programmers, while the large number of infections in Iran hinted that it was the most likely target.
None of those suspicions have been confirmed by researchers who have poured over Stuxnet's code, although some have spotted clues that either point to Israel or to an attempt by the hackers to pin blame on the country.
Stuxnet, which was first launched in June 2009 but didn't pop into public view until a year later, has been described as "groundbreaking" for its ability to infiltrate networks, sniff out SCADA systems and reprogram the hardware controllers that monitor and manage machinery in factories, power plants, pipelines and military installations.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is email@example.com.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts