Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management

    Iran Arrests Nuclear Spies, Talks Cyber-security

    By
    Brian Prince
    -
    October 2, 2010
    Share
    Facebook
    Twitter
    Linkedin

      Iranian Intelligence Minister Heydar Moslehi announced today the arrests of multiple people he described as “nuclear spies.”

      Moslehi told the Mehr News Agency of the arrests, but offered no further details. The arrests follow reports that the Stuxnet worm infected computers belonging to staff at the Bushehr nuclear power plant, where it reportedly did no damage.

      It is unclear if the arrests are related to the worm, but Moslehi expressed confidence the country could repel cyber-attacks by foreign intelligence agencies.

      “We are always facing destructive activities by these [espionage] services, and, of course, we have arrested a number of nuclear spies to block the enemy’s destructive moves,” Moslehi reportedly said.

      Iran has been the site of many of the infections of Stuxnet, which has been traced as far back as June 2009. The worm was discovered a year later by security vendor VirusBlokAda when it was seen exploiting a Windows zero-day vulnerability. In the ensuing months, details of its functionality have continued to emerge, prompting some to call it one of the most sophisticated pieces of malware in the wild.

      The worm targets industrial control systems, a fact Eric Chien, technical director of Symantec Security Response, said Thursday raises its threat level.

      “Everything that we’ve looked at in the past … really is nothing compared to Stuxnet, because the things that we look at are attacking virtual assets, like someone posting [something] to your Facebook wall that you didn’t want them to, or things like someone stealing an individual’s credit card number,” said Chien, who co-authored a paper on Stuxnet. “When we’re talking about Stuxnet, we’re talking about national critical infrastructure. … The code to actually sabotage the industrial control systems is actually in Stuxnet.”

      Though no definite link to an author has been established, speculation has abounded that the worm was created by a government for the purpose of sabotage.

      Some have speculated that the worm’s code provides clues to its origin. Contained within the code is the word “myrtus,” which is considered by some to be an allusion to the Old Testament Book of Esther, which contains a story of a thwarted attempt to destroy the Jews. Myrtus is also known as myrtle, the Hebrew word for which is Hadassah-the birth name of Esther.

      Also contained within the code, however, is the word guava, and Myrtus is the botanical family of the guava plant.

      Other potential evidence rests with Stuxnet’s main installer, which among other things checks the date and version number of the compromised computer; decrypts, creates and installs the rootkit files and registry keys; and injects itself into the services.exe process to infect removable devices.

      According to a paper (PDF) on Stuxnet by Symantec: “Export 16 [main installer] first checks that the configuration data is valid, after that it checks the value ‘NTVDM TRACE’ in the following registry key: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionMS-DOS Emulation.

      “If this value is equal to 19790509 the threat will exit,” the paper states. “This is thought to be an infection marker or a ‘do not in??ífect’ marker. If this is set correctly infection will not occur. The value appears to be a date of May 9, 1979. … According to Wikipedia, Habib Elghanian was executed by a firing squad in Tehran, sending shock waves through the closely knit Iranian Jewish community. He was the first Jew and one of the first civilians to be executed by the new Islamic government.”

      Chien cautioned, however, against reading too much into the findings, as the worm’s author may have simply placed those things there to throw researchers off course.

      Brian Prince

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×