Update: Iran says it was targeted with second worm, 'Stars'
Few details available about targeted worm attack
IDG News Service - The general responsible for investigating the Stuxnet attack on Iran's nuclear program says the country was also hit by a second targeted attack, called Stars.
Few details on the reported attack are available, except that it appears to have been directed at specific computer systems within the country. "Certain characteristics about the Stars worm have been identified, including that it is compatible with the (targeted) system," said Brigadier General Gholam-Reza Jalali, director of Iran's Passive Defense Organization, in a report Monday by the country's Mehr News Agency.
Iran has been attempting to shore up its cyberdefenses since it was hit by the Stuxnet worm last year. Stuxnet is widely believed to have been written in order to sabotage the country's Natanz nuclear facility. Thought to be one of the most sophisticated cyber-attacks ever written, Stuxnet seeks out and sabotages specific industrial systems by making them operate in an unsafe way.
Just last week Jalali blamed Siemens, the company whose industrial systems were targeted by Stuxnet, saying that the German company should "explain why and how it provided the enemies with the information about the codes of the SCADA software and prepared the ground for a cyber attack against us."
Siemens responded to that accusation Monday.
"Siemens was not involved in the creation of Stuxnet. The accusation is unfounded," Siemens spokesman Michael Krampe said via e-mail. He added that Iran has not brought any legal action against Siemens.
Iranian computer experts are still studying the Stars malware, Mehr reported, and Western cyber-experts say they're not sure whether Iran has identified a new attack. "We don't know if Iran officials have just found some ordinary Windows worm and announced it to be a cyber war attack," wrote F-Secure researcher Mikko Hypponen in a Monday blog post.
"This one sounds more like cyber espionage than cyber sabotage," he said in an instant message interview. "We see cyber espionage all the time. We've only seen one attack like Stuxnet, ever."
- Cyberattacks could paralyze U.S., former defense chief warns
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
- South Korea cyberattacks hold lessons for U.S.
- U.S. military networks not prepared for cyberthreats, report warns
- Return of CISPA: Cybersecurity boon or privacy threat?
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Malware and Vulnerabilities White Papers | Webcasts