Tehran admits Stuxnet hit industrial computers
Mahmoud Alyaee, secretary-general of Iran's industrial computer servers, including its nuclear facilities control systems, confirmed Saturday, Sept. 25, that30,000 computers belonging to classified industrial units had been infected and disabled bythemalicious Stuxnet virus.
This followed debkafile's exclusive report Thursday, Sept. 23, from its Washington and defense sources that a clandestine cyber war is being fought against Iran by the United States with elite cyber war units established by Israel. Stuxnet is believed to be the most destructive virus ever devised for attacking major industrial complexes, reactors and infrastructure. The experts say it is beyond the capabilities of private or individual hackers and could have been produced by a high-tech state like America or Israel, or its military cyber specialists.
The Iranian official said Stuxnet had been designed to strike the industrial control systems in Iran manufactured by the German Siemens and transfer classified data abroad.
The head of the Pentagon's cyber war department, Vice Adm. Bernard McCullough said Thursday, Sept. 22, that Stuxnet had capabilities never seen before. In a briefing to the Armed Forces Committee of US Congress, he testified that it was regarded as the most advanced and sophisticated piece of Malware to date.
According to Alyaee, the virus began attacking Iranian industrial systems two months ago. He had no doubt that Iran was the victim of a cyber attack which its anti-terror computer experts had so far failed to fight. Stuxnet is powerful enough to change an entire environment, he said without elaborating. Not only has it taken control of automatic industrial systems, but has raided them for classified information and transferred the date abroad.
This was the first time an Iranian official has explained how the United States and Israel intelligence agencies have been able to keep pace step by step of progress made in Iran's nuclear program. Until now, Tehran attributed the leaks to Western spies using Iranian double agents.
Last Thursday, debkafile first reported from its Washington sources that US president Barack Obama had resolved to deal with the nuclear impasse with Iran by going after the Islamic republic on two tracks: UN and unilateral sanctions for biting deep into the financial resources Iran has earmarked for its nuclear program, and a secret cyber war with Israel to cripple its nuclear facilities.
In New York, the US offer to go back to the negotiating table was made against this background.
Leaks by American security sources to US media referred to the recruitment by Israel military and security agencies of cyber raiders with the technical knowhow and mental toughness for operating in difficult and hazardous circumstances, such as assignments for stealing or destroying enemy technology, according to one report.
debkafile's sources disclose that Israel has had special elite units carrying out such assignments for some time. Three years ago, for instance, cyber raiders played a role in the destruction of the plutonium reactor North Korea was building at A-Zur in northern Syria.
Some computer security specialists reported speculated that the virus was devised specifically to target part of the Iranian nuclear infrastructure, either the Bushehr nuclear plant activated last month – which has not been confirmed – or the centrifuge facility in Natanz.
debkafile's sources add: Since August, American and UN nuclear watchdog sources have been reporting a slowdown in Iran's enrichment processing due to technical problems which have knocked out a large number of centrifuges and which its nuclear technicians have been unable to repair. It is estimated that at Natanz alone, 3,000 centrifuges have been idled.