Кибернетски напад врз Иран (апдејт:нов вирус со AC/DC :)

  • Креатор на темата Креатор на темата Misirkov
  • Време на започнување Време на започнување
Член од
17 март 2005
Мислења
11.493
Поени од реакции
1.592
Високо софистициран вирус е раширен во Иран, Индонезија и Индија со цел, се смета, уништување на Иранскиот нуклеарен реактор но и останатите ирански командни системи.


http://www.pcworld.com/businesscent...et_built_to_attack_irans_nuclear_program.html


A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran's Bushehr nuclear reactor.

That's the emerging consensus of security experts who have examined the Stuxnet worm. In recent weeks, they've broken the cryptographic code behind the software and taken a look at how the worm operates in test environments. Researchers studying the worm all agree that Stuxnet was built by a very sophisticated and capable attacker -- possibly a nation state -- and it was designed to destroy something big.

Though it was first developed more than a year ago, Stuxnet was discovered in July 2010, when a Belarus-based security company discovered the worm on computers belonging to an Iranian client.

Since then it has been the subject of ongoing study by security researchers who say they've never seen anything like it before. Now, after months of private speculation, some of the researchers who know Stuxnet best say that it may have been built to sabotage Iran's nukes.

Last week Ralph Langner, a well-respected expert on industrial systems security, published an analysis of the worm, which targets Siemens software systems, and suggested that it may have been used to sabotage Iran's Bushehr nuclear reactor. A Siemens expert, Langner simulated a Siemens industrial network and then analyzed the worm's attack.

Experts had first thought that Stuxnet was written to steal industrial secrets -- factory formulas that could be used to build counterfeit products. But Langner found something quite different. The worm actually looks for very specific Siemens settings -- a kind of fingerprint that tells it that it has been installed on a very specific Programmable Logic Controller (PLC) device -- and then it injects its own code into that system.

Because of the complexity of the attack, the target "must be of extremely high value to the attacker," Langner wrote in his analysis.

Langner is set to present his findings at a closed-door security conference in Maryland this week, which will also feature a technical discussion from Siemens engineers.

Langner said he wasn't yet ready to speak to a reporter at length ("the fact of the matter is this stuff is so bizarre that I have to make up my mind how to explain this to the public," he said via e-mail) but others who have examined his data say that it shows that whoever wrote Stuxnet clearly had a specific target in mind.

"It's looking for specific things in specific places in these PLC devices. And that would really mean that it's designed to look for a specific plant," said Dale Peterson, CEO of Digital Bond.

This specific target may well have been Iran's Bushehr reactor, now under construction, Langner said in a blog posting. Bushehr reportedly experienced delays last year, several months after Stuxnet is thought to have been created, and according to screen shots of the plant posted by UPI, it uses the Windows-based Siemens PLC software targeted by Stuxnet.

Peterson believes that Bushehr was possibly the target. "If I had to guess what it was, yes that's a logical target," he said. "But that's just speculation."

Langner thinks that it's possible that Bushehr may have been infected through the Russian contractor that is now building the facility, JSC AtomStroyExport. Recently AtomStroyExport had its Web site hacked, and some of its Web pages are still blocked by security vendors because they are known to host malware. This is not an auspicious sign for a company contracted with handling nuclear secrets.

Tofino Security Chief Technology Officer Eric Byres is an industrial systems security expert who has tracked Stuxnet since it was discovered. Initially he thought it was designed for espionage, but after reading Langner's analysis, he's changed his mind. "I guessed wrong, I really did," he said. "After looking at the code that Ralph hauled out of this thing, he's right on."

One of the things that Langner discovered is that when Stuxnet finally identifies its target, it makes changes to a piece of Siemens code called Organizational Block 35. This Siemens component monitors critical factory operations -- things that need a response within 100 milliseconds. By messing with Operational Block 35, Stuxnet could easily cause a refinery's centrifuge to malfunction, but it could be used to hit other targets too, Byres said. "The only thing I can say is that it is something designed to go bang," he said.

Whoever created Stuxnet developed four previously unknown zero-day attacks and a peer-to-peer communications system, compromised digital certificates belonging to Realtek Semiconductor and JMicron Technology, and displayed extensive knowledge of industrial systems. This is not something that your run-of-the-mill hacker can pull off. Many security researchers think that it would take the resources of a nation state to accomplish.

Last year, rumors began surfacing that Israel might be contemplating a cyber attack on Iran's nuclear facilities.

Bushehr is a plausible target, but there could easily be other facilities -- refineries, chemical plants or factories that could also make valuable targets, said Scott Borg, CEO of the U.S. Cyber Consequences Unit, a security advisory group.

"It's not obvious that it has to be the nuclear program," he said. "Iran has other control systems that could be targeted."

Iranian government representatives did not return messages seeking comment for this story, but sources within the country say that Iran has been hit hard by the worm. When it was first discovered, 60 percent of the infected Stuxnet computers were located in Iran, according to Symantec.

Now that the Stuxnet attack is public, the industrial control systems industry has come of age in an uncomfortable way. And clearly it will have more things to worry about

"The problem is not Stuxnet. Stuxnet is history," said Langner in an e-mail message. "The problem is the next generation of malware that will follow."
 
Па 21 век сме, ако неможе со real life војна, тогаш идеме со виртуелна........:jaj:
 
Абе нека ги напаѓаат виртуелно ама еден ден коа ќе снема америка од планетава ќе си помислиме дали сме требале да праиме така...јас искрено не би си играл со Иран опасно е...а и плус и Иран има луѓе кои можат да и наштетат на америка виртуелно...и штом е пуштено во земјите од Мала Азија тогаш е за Иран од каде излезе Сименс како можна жртва иако има совпаѓања со неговите начини на работа...
 
Никој не рече дека е Американски вирусот.

Го гледав интервјуто со Ахмадинеџад во Њу Јорк, целосно е убеден дека Израел е “готов’’ и дека Иран е регионална ако не и светска сила.
 
едно е да си убеден да си јак, друго е да си. кај што има сила нема правдина, па затоа америве се курчат, а иран се курчи на израел, мисли дека може да се носи со нив, мислам и да неможе мора што да прави Ахмадинеџад, да им каже на неродот ќе не потепа америка или израел ќе не срамни?
пропаганда е се тоа
неверуем ништо ни на америте, ни на евреите а богами ни на иран, у политика и пропаганда треба да си глуп да веруеш, поготово на изјави кои не ги разбираме...(бар јас не ги разбирам, едно е што е кажано и што слушам јас и цел свет, друго е која е пораката која ја праќаат). додека не научам така да комуницирам нема да веруем на ништо, никакви изјави и слично... абе ја невероватен сум бил бе...:pos2:
 
Сеуште не е касно САД да преземат мерки сепак нуклеарниот пенетратор е опција каде нема промашај иако сеуште се спори длабочината на пенетрацијата ама сепак температура од 4 милиони степени и јачина на експлозија колку 20 000 тони ТНТ мислам дека ќе го решат проблемот бидејќи со санкции ќе страдаат невини,ќе умираат цивили глад нешто слично како Ирак каде се препишува смрт на минимум милион лица од кои 10% деца баш поради санкциите....ама САД моментално немаат решителен лидер чиј единствен успех е саботаѓата на една долгорочна политика истата есенцијална за безбедноста на Европа и САД.

Што се до хакерскиве напади-целта е очигледна некој сака да знае до каде е напредокот...во правење нуклеарни бомби.
 
Изгледа Русија дефинитивно го испали Иран, нема да им испорачаат С-300 ракети.
 
Тврдат кибернетиката сега зазема централно место во Израелската воена доктрина:

Cyber takes centre stage in Israel's war strategy

Reuters Africa 09/28/2010



Cyber warfare has quietly grown into a central pillar of Israel's strategic planning, with a new military intelligence unit set up to incorporate high-tech hacking tactics, Israeli security sources said on Tuesday.

http://www.nextgov.com/web_headlines/wh_20100928_9041.php
 
Се повлекуваат нафтените гиганти од Иран


Четирите најголеми нафтени компании, меѓу нив британско – холандски “Шел“ најавиле повлекување од Иран. Ова во четвртокот го соопштил американскиот Стејт Департмент.
Со овој потег нафтените гиганти се заштитиле од американските санкции изјавил Џејмс Стајберг.
“Задоволство ми е да соопштам дека четирите меѓународни енергетски претпријатија се обврзале на прекинување на инвестирањето во енергетскиот сектор на Иран“, рекол помошникот на државниот секретар на САД.
Покрај “Шел“ од Иран се повлекуваат и француски “Тотал“, “Статоил“ од Норвешка и италијански “Ени“.




Извор

Економски тешкотии за Иран во кои ќе следат демонстрации или се спрема напад?
 
Па 21 век сме, ако неможе со real life војна, тогаш идеме со виртуелна........:jaj:

Не е само виртуелна. Многу зачестија експлозии. Вчера, во базата на Револуционерната гарда крај Корамабад имаше 18 мртви и 14 ранети од експлозија. Минатиот месец, баш на воената парада експлодира бомба - 12 мртви.


Iran puts Guard death toll at 18 in base blast

http://www.ap.org/
 
Изгледа Русија дефинитивно го испали Иран, нема да им испорачаат С-300 ракети.

Ако-ќе направат сами мод-како што направи и кина хкју-то.

А најавија и тест.

Tehran: Iran is to test its own homemade S-300 ground-to-air missiles, built in defiance of ally Russia which backed out of a deal to supply the device, a top Iranian military commander said on Wednesday.
"Very soon we will test long-range aerial defence missiles, including Iranian S-300s," Brigadier General Mohammad Hassan Mansourian told the state news agency IRNA.
In September, Russian President Dmitry Medvedev signed a decree banning supplies of S-300 missiles and other arms to Iran.
Russia came under strong US and Israeli pressure not to go ahead with the sale of the weapons system which was seen as complicating any military action against Iran over its controversial nuclear programme.
Both Israel and the United States have refused to rule out resorting to military action to prevent Iran acquiring what they suspect is nuclear weapons capability, an ambition Tehran strongly denies.
Mansourian hit out at Russia for succumbing under the pressure of "American and Zionist regime."
"In order to provide for part of our security needs ... we wanted to buy S-300 from Russia," the general said.
"But this country (Russia) used the (UN sanctions) Resolution 1929 as a pretext in order to refuse the handing over of this defence weapon to us," he said.
The UN Security Council adopted Resolution 1929 on June 9, in a fourth set of sanctions against Iran for pursuing its nuclear programme.
Top Iranian officials, including President Mahmoud Ahmadinejad, have lashed out at Russia for cancelling the S-300 deal. Russia had "sold out" Iran to its arch-foe, the United States, the president charged last week.
Russia, which has been a strong ally of Iran and built the Islamic republic's first nuclear power plant in the southern city of Bushehr, said it would reimburse Tehran for its downpayments on the deal.
The contract was estimated to be worth a total of 800 million dollars (572 million euros).

Додека пак Иран не е во поволна позиција


NATO Defense Shield In Turkey May Threaten Iran, Russia

oscow: Possible deployment of the elements of NATO missile defense shield in Turkey is targeted against Iran and may pose a threat to Russia's security, Russian experts said on Saturday.
Earlier on Saturday Turkish media said Ankara would agree to deploy a missile-defense system on its territory if its three conditions were accepted.
First, the Turkish authorities insist on building NATO, but not the U.S. missile defense system. Second, the anti-missile shield should be deployed in the all alliance's states-members. And third, Turkey would not allow NATO to turn it into the alliance's frontline state as it was during the Cold War.
"Turkey wants to be equally respected both in the West and in the East...Turkey wants to entrench itself as a key empire of the entire continent," Sergei Demidenko of the Institute of Strategic Studies and Analysis said.
"Geographically Turkey is the closest to Iran, while politically it is one of Iran's enemies," another Russian leading political expert, the head of the Institute of Political Studies, Sergei Markov said. "It is Iran's enemy because Turkey is the ally of the United States...but first of all they both [Turkey and Iran] compete for the leadership in the Islamic world."
The President of the Academy on Geopolitical Affairs, Leonid Ivashov said the ongoing deployment of the anti-missile defense shield in Europe is aimed to "neutralize Russia's nuclear missile potential."
"We do not have other powers, except of the nuclear missile potential, to protect even the single parts of our territories," Ivashov said.
Meanwhile, the Turkish Foreign Minister, Ahmet Davutoglu, while commenting on Turkey's plans to deploy anti-missile shield said that NATO should exclude any formula that confronts Turkey with a group of countries in its threat definitions and planning.
"We do not want a Cold War zone or psychology around us," Davutoglu added.
Turkey's decision over missile defense system on its soil will be announced at the upcoming NATO summit in Lisbon due to be held on November 18-19.


А моментално јапонците тестираат и модифицираат-веќе докажаниот Патриот

Tewksbury MA: The Japanese Air Self Defense Forces (JASDF) successfully concluded its annual training exercise at Fort Bliss, Texas.
The exercise included target engagement and successful test firings of the Patriot Air and Missile Defense System in tactical mission configurations. Raytheon provided operational support for JASDF's Annual Service Practice (ASP).
"It's a great team effort by JASDF, Mitsubishi Heavy Industry (MHI) and Raytheon, focused on mission success," said Sanjay Kapoor, vice president for Patriot Programs at Raytheon Integrated Defense Systems (IDS). "The success of this year's exercise speaks volumes to the results this team delivers."
Patriot fire unit crews operating Raytheon's Configuration-3 systems conducted numerous missions against various targets during the course of the ASP, which took place from September through November.
Approximately 375 JASDF personnel participated in this year's missions.
Japan is one of the 12 nations that have selected the combat-proven Patriot as a key component of their air and missile defense program.
Raytheon IDS is the prime contractor for both domestic and international Patriot Air and Missile Defense Systems and system integrator for Patriot Advanced Capability-3 missiles.
MHI is the prime contractor for Patriot in Japan and manufactures the Guidance Enhanced Missile and related ground equipment for Japan under a license agreement with Raytheon.

Па и јасно е зошто-психите во С-кореа се непресметливи.

Повеќе
 
Ептен им направиле саботажа, ги успориле во времетраење од 2 години.

'Stuxnet virus set back Iran’s nuclear program by 2 years'

By YAAKOV KATZ
12/15/2010 05:15

Top German computer consultant tells 'Post' virus was as effective as military strike, a huge success; expert speculates IDF creator of virus.

http://www.jpost.com/IranianThreat/News/Article.aspx?id=199475


.
 
Купуваат време и со тоа им се овозможува да најдат друг начин да ја сопрат Иранската нуклеарна програма.
 

Kajgana Shop

Back
На врв Bottom