Pages

25 sept. 2010

Electronics has launched a smart bomb to destroy the Iranian nuclear reactor

One expert stressed in an American company for the technology that a computer virus, attacking the software industry and is widely used, it seems aimed at Iran, but that force the virus refers to the possibility that a State has created, citing a newspaper report, "Middle East" Saudi Arabia on Saturday 25-9 - 2010.

Said Kevin Hogan, director of security response at the "Symantec", on Friday: that 60% of computers infected by the virus known as "net stakes" in the world are in Iran, indicating that the industrial facilities Iran is the goal. Hogan's comments were the latest in a series of specialized statements in relation to HIV, "stakes Net" has raised speculation that be Iran's first nuclear plant at Bushehr was targeted in an attempt to sabotage or espionage supported by the state.



He said Hogan of the virus that attacks the industrial control systems produced by "Siemens AG" wide use: "It is quite clear that, based on the behavior of an infection, the target of Iranian installations," according to a Reuters report.

He added that the number of infected computers is very large. He said, "Symantec" the places infected computers tracked the geographical spread of malicious code.

Remember, diplomatic and security sources that the Western governments and Israel considers vandalism and a means to delay the Iranian nuclear program, which the West suspects is aimed at making a nuclear bomb, while Tehran insists is aimed at generating electricity.

Hogan said: "It is impossible to speak definitively for the category of the target computers. The goal may be to plant an oil refinery or a sewage plant or desalination of drinking water or a factory, but it is clear that the makers of this virus have a lot of resources."

He added: "We can not exclude the possibility that a nation is behind this virus; because it is based largely on the resources and organization and in-depth knowledge in multiple areas, including specific information on the facilities in Iran, it is possible to be a state, or a not a state, but it does have this type of system. "

Participated "Siemens" in the original design for the Bushehr reactor in the seventies, when West Germany agreed, then, France to build a nuclear power plant in Iran during the reign of the Shah before he was toppled by the Islamic revolution in 1979.

In San Francisco, computer security experts said they were working on weapons is a new e-bomb is a smart virus may have been designed specifically to sabotage the Iranian nuclear facility, according to Agence France-Presse.

The virus can "Stokes Net" to recognize the network of control in a particular facility and destroyed after that, according to the German said Ralph Langner, a researcher in computer security.

Langner said on its website: "Welcome to the war in cyberspace .. This sabotage." Langner and is working on the analysis of the virus, "Stokes Net" since to find it in June (June). He said that the virus bears the hallmarks of technology to control system seeks to find the virus even if it is ready to operate automatically in the event found its target.

Said James Lewis, a fellow at the Center for Strategic and International Studies: "This is amazing .. It seems like more than a simple electronic spying operation."

The virus specifically designed to penetrate and control systems to obtain data from the production company "Siemens", which are usually used to manage the supply of water and oil rigs, power plants and other industrial facilities.

The virus has spread across memory cards and enable the transition from system to system without the need to the Internet, he said Hovenberg Rowell, a senior researcher at antivirus laboratories "Kaspersky Lab Omercaz."

This is a virus, "worm"; as it moves from device to device and multiplies during the transmission. Once logged on the PC that is running Windows programs and the virus, "Stokes Net" to search for any of the systems, "Siemens" programmed on the device, which operates facilities such as refrigeration or controlled speed turbines, as stated Hovenberg.

The virus has been found in systems in India, Indonesia, Pakistan and other countries! But it seems that the biggest breakthrough is, in Iran, according to researchers in the field of computer security.

Langner and assured that the virus is designed by a qualified team of experts have particular expertise in the controllers. He said: "This is not the work of a pirate sitting in the basement of his parent's house .. The resources needed for this stage of the attack pointed to the state and behind the virus."

According to the researchers, the pattern of spread of the virus intersects with the work carried out by the company that has been assigned the work in nuclear facilities.

Langner and is suspected to be in the goal of "Stokes Net" is the Bushehr nuclear power plant in Iran. The late start of work at the station for unspecified reasons.

On 31 August (August) said the IAEA's director of nuclear energy, Iran's Ali Akbar Salehi: "The heat of extreme weather" was the reason for delays in the transfer of fuel rods into nuclear facility built by Russia.

Hovenberg has warned that the "Stokes net" income of computers all over the world, it is impossible to know whether Iran is the target or not.

But Langner says that the virus designers left a lot of things that show them, which gives the impression that they are not afraid to get them.

0 commentaires:

Enregistrer un commentaire