Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Blogs
    • Security Watch

    Iran Rips-and-Replaces Centrifuges Post-Stuxnet

    Written by

    Fahmida Y. Rashid
    Published July 26, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A new report suggests Iran’s nuclear program has not recovered from the Stuxnet worm as previously believed. It appears Iran is still replacing thousands of expensive centrifuges that were damaged by the worm.

      Stuxnet was not entirely purged from Iran’s nuclear facilities and it resurfaced again to damage more systems, “Western intelligence sources” told DEBKAfile July 20. DEBKAfile claimed the government had replaced an estimated 5,000 centrifuges to remove the threat.

      “Iran finally resorted to the only sure-fire cure, scrapping all the tainted machines and replacing them with new ones,” according to the report, noting that a spokesperson from Iran’s foreign ministry said July 19 it was installing newer and faster centrifuges at its nuclear plants to speed up operations.

      Iran would “clearly not have undertaken” the complex and expensive task of replacing all its 5,000-6,000 centrifuges with new ones “if they were indeed functioning smoothly,” the report said.

      Iran may have had 8,700 centrifuges in operation at the Natanz facility when Stuxnet was released sometime in 2009. International Atomic Energy Agency officials claimed up to a quarter of those centrifuges were disabled as of January 2010.

      The Institute for Science and International Security released a report in February that claimed the damage caused to Iran’s uranium enrichment program was limited. Sources told DEBKAfile the opposite, that Iran’s nuclear operations will never return to “normal operation.”

      Stuxnet is widely believed to have been created specifically to disable Iran’s nuclear enrichment facilities, possibly with the involvement of the United States and Israel. When asked directly in a CNBC documentary that aired May 26 whether the United States was involved with creating Stuxnet, Deputy Defense Secretary William Lynn declined to deny or confirm the charge. “And this is not something that we’re going to be able to answer at this point,” Lynn said at the time.

      ESET researchers have analyzed Stuxnet, and have concluded a team of highly talented developers with very sophisticated skills worked on the worm, Randy Abrams, director of technical education at ESET, told eWEEK. The team most likely had some kind of nation-state backing to fund the development effort, which would have been very expensive, Abrams said.

      Countries around the world are beefing up their cyber-war capabilities and honing their tactics. There have been reports of North Korea’s cyber-warrior program and China’s elite cyber unit in its military.

      “Expect this new brand of ‘warfare’ to become front-and-center in the national defense stance of various countries,” said Cameron Camp, an ESET researcher.

      The worm was among the most sophisticated pieces of malware ever discovered in the wild. It exploited the AutoRun functionality on Windows to infect computers from USB drives. It then used a hardcoded default password for Siemens management application to compromise the machine before taking over the specialized industrial-control computers that ran a proprietary operating system from Siemens. The worm also hijacked the facility’s monitoring system to falsely show that the machines were functioning normally, preventing officials from catching on to what was really happening.

      While Stuxnet specifically targeted Siemens industrial process control computers used in nuclear centrifuge operations, ESET’s Camp noted there are “plenty other” industrial process automation and control systems being used on “modern critical infrastructure” and that network operators have to assess their threat exposure level and how to mitigate it.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×