This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

'Iranian acting for Israel' planted Stuxnet virus

Share this article:
'Iranian acting for Israel' planted Stuxnet virus
'Iranian acting for Israel' planted Stuxnet virus

The Stuxnet virus was reportedly planted at an Iranian nuclear facility by an insider using a corrupt memory stick.

According to a report by Richard Sale at Industrial Safety and Security Source, the Iranian was "an Israeli proxy" as part of a plan to hold off the Iranian nuclear programme; it said he used a memory stick to infect the machines after "Iranian double agents" were used to target the most vulnerable spots in the system.

In October 2010, Iran's intelligence minister, Heydar Moslehi, said an unspecified number of "nuclear spies" were arrested in connection with the Stuxnet.33 virus. The report said that spies inside Iran had the access, contacts, positions and technical skill to do the job.

“Given the seriousness of the impact on Iran's [nuclear] programme, we believe it took a human agent to spread the virus,” said one former US intelligence source.

The report also claimed that current and former US intelligence sources have confirmed that Israel's intelligence agency, Mossad, was responsible for the worm's introduction to the plant's systems, with the worm believed to have been placed on a specially crafted USB memory stick and handed over to a Natanz worker; this worker was, by all accounts, an Iranian national belonging to a dissident group named Mujahideen-e Khalq (MEK), related to Mossad.

A Symantec report said Stuxnet was distributed far and wide, but the virus was so efficient that it could deliver its payload only to the designated target, and would not damage adjacent machines.

Sale said that in December 1991, just before Desert Storm, the CIA and GCHQ had experimented with using viruses to inject into Iraq's computers; once in place, NSA and GCHQ believed a virus would spread like a virulent cancer through the Iraqi Command & Control system, infecting every computer system it came across.

Share this article:
close

Next Article in News

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

4% of Googlebots are fake and can launch attacks

4% of Googlebots are fake and can ...

Admins' fear of damaging their SEO gives malicious search engine bots a 'VIP pass' into sites.

Brit Lauri Love faces more US hacking charges

Brit Lauri Love faces more US hacking charges

Lauri Love, a 29-year-old British man from Stradishall in Suffolk, has been charged by a US court with hacking into multiple US government computers and stealing more than 100,000 employee ...

More questions than answers as BBC outage fuels DDoS talk

More questions than answers as BBC outage fuels ...

The British Broadcasting Corporation was hit by a prolonged outage on its website and iPlayer video-on-demand service (VOD) last weekend, raising questions about the cause and whether it was subjected ...