Iran reported a spree of new cyberattacks Tuesday, saying foreign enemy hackers tried in recent months to disrupt computer systems at a power plant and other industries in a strategically important southern coastal province as well as a Culture Ministry information centre.
Accounts of the attacks in the official media did not specify who was responsible, when they were carried out or how they were thwarted. But they strongly suggested that the attacks had originated in the United States and Israel, which have been engaged in a shadowy struggle of computer sabotage with Iran in a broader dispute over whether Iran’s nuclear energy program is for peaceful or military use.
Iran has been on heightened alert against such sabotage since a computer worm known as Stuxnet was used to attack its uranium enrichment centrifuges more than two years ago, which U.S. intelligence officials believe caused many of the machines to spin out of control and self-destruct, slowing the Iranian program’s progress.
Stuxnet and other forms of computer malware have also been used in attacks on Iran’s oil industry and Science Ministry under a covert U.S. effort, first revealed in January, 2009, that was meant to subvert Iran’s nuclear program because of suspicions that the Iranians were using it to develop the ability to make atomic bombs. Iran has repeatedly denied these suspicions.
The latest Iranian sabotage reports raised the possibility that the attacks had been carried out in retaliation for assaults that crippled computers in the Saudi Arabian oil industry and some U.S. financial institutions a few months ago. U.S. intelligence officials have said they believe that Iranian specialists in cybersabotage were responsible for those assaults, which erased thousands of Saudi files and temporarily prevented some U.S. banking customers from accessing their accounts.
Defense Secretary Leon Panetta cited those attacks in an Oct. 11 speech in which he warned of the United States’ vulnerability to a co-ordinated computer warfare attack, calling such a possibility a “cyber-Pearl Harbor.”
The Iranian Students’ News Agency said the country’s Passive Defense Organization, the military unit responsible for guarding against cyberattacks, had battled a computer virus infection of an electric utility and other unspecified manufacturing industries in southern Hormozgan province, home to a large oil refinery and container port in the provincial capital of Bandar Abbas.
The news agency quoted Ali Akbar Akhavan, the head of the Passive Defense Organization’s provincial branch, as saying that “with timely measures and the cooperation of skilled hackers in the province, the progress of this virus was halted.” It was unclear from the account whether any Iranian targets had been damaged.
Iran’s Fars News Agency said a cyberattack had also been made against the information centre of the Culture Ministry’s Headquarters for Supporting and Protecting Works of Art and Culture, and that the attack had been “repelled by the headquarters’ experts.”
The Fars account said the attack had originated in Dallas and was routed to Iran via Malaysia and Vietnam. It did not elaborate on the significance of that information but noted that a broad array of Iranian targets had recently come under cyberattacks that were “widely believed to be designed and staged by the U.S. and Israel.”
News of the latest cyberattacks came as Western economic sanctions on Iran have been tightening while diplomatic negotiations aimed at resolving the nuclear dispute have remained basically stalled since June. There are expectations that a resumption of those negotiations will be announced soon, possibly next month.
Incoming search terms:
- Igor Panarin 2013 (14)