Iran Nuclear NewsWorm can deal double blow to nuclear program

Worm can deal double blow to nuclear program

-

New York Times: The German software engineer who in September was the first to report that a computer worm was apparently designed to sabotage targets in Iran said Friday that the program contained two separate “digital warheads.”

The New York Times

By JOHN MARKOFF

The German software engineer who in September was the first to report that a computer worm was apparently designed to sabotage targets in Iran said Friday that the program contained two separate “digital warheads.”

The malicious program, known as Stuxnet, is designed to disable both Iranian centrifuges used to enrich uranium and steam turbines at the Bushehr nuclear power plant, which is scheduled to begin operation next year, said the engineer, Ralph Langner, an industrial control systems specialist based in Hamburg, Germany.

His analysis adds further detail to a report by researchers at the Symantec Corporation, an American computer security company, which concluded that the software code was intended to induce fluctuations in the rotational speed of motors, by taking over a power device known as a frequency converter.

“It’s an awful complex code that we are looking at,” said Mr. Langner, who has spent several months studying the program, which was discovered by a Russian antivirus company in June, after the company received complaints from Iranian customers. The link between the worm and an Iranian target was first made at an industrial systems cybersecurity conference in the Washington area on Sept. 20 by Mr. Langner.

In a statement Friday on his Web site, he described two different attack modules that are designed to run on different industrial controllers made by Siemens, the German industrial equipment maker. “It appears that warhead one and warhead two were deployed in combination as an all-out cyberstrike against the Iranian nuclear program,” he wrote.

In testimony before the Senate on Wednesday, federal and private industry officials said that the Iranian nuclear program was a probable target, but they stopped short of saying they had confirming evidence. Mr. Langner said, however, that he had found enough evidence within the programs to pinpoint the intended targets. He described his research process as being akin to being at a crime scene and examining a weapon but lacking a body.

The second code module — aimed at the nuclear power plant — was written with remarkable sophistication, he said. The worm moves from personal computers to Siemens computers that control industrial processes. It then inserts fake data, fooling the computers into thinking that the system is running normally while the sabotage of the frequency converters is taking place. “It is obvious that several years of preparation went into the design of this attack,” he wrote.

When asked about Mr. Langner’s new analysis, Eric Chien of Symantec said the company’s researchers had also seen evidence of a second attack module, but that the module was disabled in the version of Stuxnet they studied.

Mr. Langner is among a small group of industrial control specialists who warned that the widespread distribution of the Stuxnet code could lead to disaster. Equipment made by Siemens and its competitors is used around the globe to manage virtually all of the world’s transportation, power distribution and communications systems.

Joe Weiss, managing partner at Applied Control Systems, a consulting firm based in the Silicon Valley that organized the conference in September, said he was concerned that computer security organizations were not adequately conveying the potential for serious industrial sabotage that Stuxnet foretells.

“I just want the lights to stay on and water flowing, and people not dying,” he said.

Latest news

The Iranian regime lacks nuclear transparency

Iran has not acted as expected in terms of transparency regarding its nuclear program, said the head of the...

Iran has sold $1 million in ammo to Russia

The Iranian regime has sold ammunition to Russia worth more than one million dollars in the ongoing conflict in...

Forecasting a “difficult year” for Iran

The official website of the Iranian regime’s presidency was taken over by Iranian dissidents in a significant security breach...

US Sanctions IRGC’s Foreign Terrorism, Intel Unit Chief

The US government has imposed sanctions targeting the Chief of the Intelligence Unit of Iran’s Islamic Revolutionary Guard Corps...

Iran’s Fruit Production: Exports High, Consumption Low, Prices Soar

Iran's diverse climate, topography, and altitude give rise to a wide variety of fruits, ranging from tropical dates to...

Iran’s impoverished population has skyrocketed

Over the course of a decade, 11 million people (about twice the population of Arizona) have been added to...

Must read

Report casts doubt on Iran’s nuclear claims

Financial Times: Nuclear inspectors have cast doubt on Iran's...

50 Women Infected with Coronavirus in Iran Prison 

By Jubin Katiraie There are shocking reports from Sepidar Prison in...

You might also likeRELATED
Recommended to you