Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Networking

    Iran Claims Stars Virus a Second Cyber-Attack

    By
    Fahmida Y. Rashid
    -
    April 25, 2011
    Share
    Facebook
    Twitter
    Linkedin

      Iran has uncovered another computer virus targeting the country as part of an ongoing cyber-attack campaign, according to a senior military official. Its capabilities and actual target are still unknown.

      Iranian experts discovered the “espionage virus,” code-named “Stars,” Gholam Reza Jalali, the head of Passive Defense, an Iranian military unit in charge of combating sabotage, said in a report posted April 25 on the Passive Defense Website. The report did not indicate whether the malware targeted sensitive equipment or facilities or random computers across the country.

      “Fortunately, our young scientists were able to discover the virus, and now the virus Stars is presented to the laboratory,” Jalali wrote in the report, posted on paydarymelli.ir (Google Translate).

      While downplaying the impact of Stars, Jalali noted that it is “harmonious” with computer systems and that it “inflicts minor damage” in the initial stage. Stars can be mistaken for executive files of governmental organizations, according to Jalali.

      This suggests the attack was disguised as a legitimate Word, PDF or other similar document type to trick unsuspecting victims into infecting government computers, Graham Cluley, senior technology consultant at Sophos, speculated on the Naked Security blog. Several organizations, including federal research facility Oak Ridge National Laboratory, have disclosed that attackers breached their systems by tricking employees into opening malicious Word or Excel documents.

      There are currently no details on whether Stars has any destructive capabilities or if it steals sensitive information. It’s also unclear as to when it was first detected.

      Experts were still investigating the full scope of the malware’s abilities in order to determine the necessary steps to “counter” the virus. “No definite and final conclusions have been reached,” Jalali told Mehr, the country’s semi-official news agency.

      A unit set up by the Ministry of Information Technology and Telecommunications will be decoding the virus, the report said.

      Jalali blamed the United States and Israel for creating the Stars virus, claiming it was part of the nations’ alleged cyber-attack against Iran. Iranian officials blame the U.S. and Israel for last year’s Stuxnet worm, which targeted specific Siemens SCADA (supervisory control and data acquisition) systems and effectively disabled the country’s nuclear facilities. Jalali claimed in an April 16 report that Iranian experts have determined that Stuxnet-infected systems sent back reports of its activities to a server located in Texas.

      There is no proof at this point whether Stars is “really specifically targeting Iranian systems,” Cluley said, noting that Sophos researchers see over 100,000 new unique malware samples every day, and many of them are designed to spy on victims’ computers.

      “Presumably the Iranian authorities have reason to believe that the Stars virus they have intercepted was specifically written to steal information from their computers and is not just yet another piece of spyware,” Cluley said.

      Stuxnet, which was publicly identified last June, was spread primarily by USB drives. The worm reportedly mutated and infected at least 30,000 industrial systems over the course of the year. Nearly half the IT executives in the electric industry sector around the world said they had found Stuxnet on their systems in a recent McAfee report looking at cyber-attacks on critical infrastructure.

      Iranian officials acknowledged in December that Stuxnet affected a number of centrifuges at its main uranium enrichment facility in Natanz, but claimed scientists had discovered and neutralized the worm before it caused serious damage.

      Despite the efforts to contain Stuxnet, it remains an active threat for Iran. It “does not mean the threat has been completely resolved, because viruses have a specific lifetime and may continue their activities,” Jalali said in the same report.

      Stuxnet is still on various machines in the wild and hasn’t gone away, Randy Abrams, director of technical education at ESET told eWEEK. “We don’t know if the authors accomplished their objective” in developing Stuxnet, and it was reasonable to assume that the worm could be updated with new instructions to launch further attacks, Abrams said.

      “The country should prepare itself to tackle future worms since future worms, which may infect our systems, could be more dangerous than the first ones,” the Mehr news agency quoted Jalali as saying.

      Fahmida Y. Rashid
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×