Move Over China, Iran May Have Been Source of Latest Cyberattacks on the U.S.
October 16, 2012 4:25 AM
comment(s) - last by
It appears Iran may have reverse engineered U.S.-made malware and turn it back on the U.S. and its ally
When it comes to cyberaggression against the U.S., the
typical culprit is China
. But growing evidence suggests that a recent round of malware cyberattacks on the U.S. and its Middle Eastern ally Saudi Arabia may have been the work of Iran. Further, the evidence hints that the Iranians may have cleverly turned malware that the U.S. used on it in cybersabotage attempts back on the attackers.
I. Def. Secretary Implies Iran is Behind New Malware Attacks
The attacks in question revolved around a piece of malware
dubbed Shamoon or Disttrack
by security researchers. This particular malware -- which resembles the sophisticated Flame package the U.S.
used to spy on Iran
to attack its oil industry
hit the Saudi Arabian Oil Comp. (Aramco)
, the world's largest oil producer and privately held company.
The New York Times
acknowledge that there has been no formal announcement from Defense Secretary Leon E. Panetta that the attacks originated in Iran, but they say the evidence points to Tehran. One unnamed consultant is quoted as saying, "What the Iranians want to do now is make it clear they can disrupt our economy, just as we are disrupting theirs. And they are quite serious about it."
In a recent speech Sec. Panetta did seem to implicate Iran in a roundabout way, stating, "Iran... [has] undertaken a concerted effort to use cyberspace to its advantage."
DoD Secretary Leon Panetta implied that Iran was behind the latest cyberattacks.
[Image Source: The New York Times]
James A. Lewis, a senior fellow at the
Center for Strategic and International Studies
, comments in an
, "His speech laid the dots alongside each other without connecting them. Iran has discovered a new way to harass much sooner than expected, and the United States is ill-prepared to deal with it."
In addition to causing maintenance headaches for Aramco, the malware attack also lashed out at top U.S. financial institutions, creating difficulties -- in some cases -- for customers accessing accounts. Experts say this is possibly the first time Iran has used malware against its foes; Iran's past cyberwar efforts have focused on crude brute-force methods, such as distributed denial of service (DDoS) strikes.
II. Iran -- More Feisty Than Expected
The attacks show that Iran is proving a more savvy foe technologically than the U.S. anticipated. Much like Iran's
clever spoofing effort
down a U.S. spy drone in early Dec. 2011
, the new attacks show Iran's so-called Passive Defense Organization (PDO) indeed acting in a reactionary manner as its name implies.
In both cases, the U.S. appears to have initiated the first strike, but Iran proved savvy enough to offer a substantial response. That's a big victory for Gholamreza Jalali, a veteran of Iran's Revolutionary Guard, who now leads Irans PDO,
who vowed to
"to fight [Iran's] enemies" in "cyberspace and Internet warfare".
Iran has vowed to defend itself against U.S. cyberagression.
[Image Source: Interplay (cover art for
For the U.S. it represents the entrance into a shadowy and uncertain world in which the playing field is somewhat leveled between the strong and the weak in terms of traditional military. Long outlined by science fiction visionaries like William Gibson, this war is quite different from conventional warfare in that its most powerful weapons may be used without the general public ever knowing.
III. U.S. Sees Its Own Weapons Turned Against it
U.S. Department of Defense
officials reportedly disagreed recently on whether we should announced our cyber-weapons as a deterrent, similar to how America flaunts its nuclear arsenal. However, the prevailing sentiment is that cyberweapons are best kept secret, as there's no tactical gain to mentioning them. Comments one defense official speaking to
, "The countries who need to know we have [cyber-weapons] already know."
Sec. Panetta in his comments suggests that the U.S. needs to up its counter-offensive capabilities in cyberspace to protect itself and its allies. He opines, "We won’t succeed in preventing a cyber attack through improved defenses alone. If we detect an imminent threat of attack that will cause significant, physical destruction in the United States or kill American citizens, we need to have the option to take action against those who would attack us to defend this nation when directed by the president. For these kinds of scenarios, the department has developed that capability to conduct effective operations to counter threats to our national interests in cyberspace."
Some have said that
increased cooperating between the government and private sector firms
(e.g. in this case, the bank industry) in order to protect the market. But such efforts bring thorny issues of
privacy and market meddling
The idea of pre-emptive cyberstrikes is also controversial. That appears to be what the U.S. did against Iran, and it's now apparent that there may have been some reprecussions, when the foe proved less weak and susceptible than expected. The U.S. did
set back Tehran's economy and nuclear ambitions
. But now, as they say, the worm has turned, and it's seeing its own weapons reverse-engineered and turned back at it and its allies.
The U.S. has seen its own cyber-weapons turned against it. [Image Source: TechTear]
Of course such a phenomena isn't unique to the cyber realm, it's important to remember -- after all the U.S. funneled conventional weapons to Saddam Hussein and the Taliban only to see the weapons later turned against it in the hands of terrorists, insurgents, and hostile regimes.
The New York Times
Foreign Policy [blog]
This article is over a month old, voting and posting comments is disabled
Hey Brandon, let's do away with subjects, shall we?
10/16/2012 2:43:22 PM
"If we detect an imminent threat of attack... we need to have the option to take action against those who would attack us..."
How can they possibly detect an imminent threat, before some guy presses the Enter key? My understanding is that an electronic attack is either [launched] or [not launched]. There is no opening of the missile tubes or 'fueling the birds'... IMO, this whole preemptive warfare concept is nothing more than justification for attacking anyone, anywhere and for any reason.
"Some have said that increased cooperating between the government and private sector firms (e.g. in this case, the bank industry) in order to protect the market."
I can't imagine a perfect a more perfect example of inbred cousins than government and banking.
"Folks that want porn can buy an Android phone." -- Steve Jobs
Iran Accuses U.S., Israel of Causing "Unwanted Slowness" on its Internet
October 4, 2012, 4:34 PM
Saudi Oil Giant Spills Details on How 30,000 of Its Systems Were Hacked
August 27, 2012, 2:32 PM
Oil Exporters Attacked by Malware Similar to That Used to Attack Iran
August 17, 2012, 12:30 PM
Following Defeat, Obama to Reportedly Push Cybersecurity Bill With Executive Orders
August 7, 2012, 7:26 PM
President Obama Scolds Businesses, Urges Passage of Cybersecurity Act
July 20, 2012, 5:16 PM
Dutch Gov. to Google: Don't Spy on Us
December 2, 2013, 1:21 PM
Quick Note: Amazon to Use Unmanned Drones for 30 Minute Package Deliveries
December 2, 2013, 11:51 AM
Quick Note: Wi-Fi Hack Prompts European Parliament to Eliminate Access
November 29, 2013, 11:05 AM
NYT: NSA May Have Spied on Google, Yahoo Data Centers Via Fiber-Optic Cables
November 26, 2013, 3:35 PM
Quick Note: Intel Wants to Sell OnCue Internet TV Service for $500M
November 26, 2013, 12:40 PM
Facebook CEO Says Government "Blew It" with NSA Spying
November 25, 2013, 11:23 AM
Most Popular Articles
NSA Snares Americans' Porn Viewing Histories in Effort to Target Muslims
December 1, 2013, 9:00 PM
Coalition of 20+ Tech Firms Backs MRAM as Potential DRAM, NAND Replacement
November 29, 2013, 11:59 PM
Dow Chemical to NYC City Council: You Don't Even Know What Styrofoam is!
December 2, 2013, 8:30 PM
Fed Up With Cheating OEMs, Microsoft Trolls Chromebooks in New Ad
November 27, 2013, 4:09 PM
OCZ Goes Bankrupt, SSD Assets are Targeted by Toshiba
December 1, 2013, 9:58 PM
Latest Blog Posts
Global Cyber Espionage Concerns Reveal Growing Cyber Armies
Nov 29, 2013, 11:04 AM
Is The Period Becoming an Expression of Anger?
Nov 26, 2013, 2:02 PM
NSA and Congress -- You Will Never Kill the Constitution, It's an Idea
Nov 10, 2013, 2:00 PM
AT&T Explores $100B+ USD Deal to Acquire Vodafone's European Operations
Nov 4, 2013, 7:34 AM
U.S. Army Developing Cyber, Electronic War Arsenal
Oct 31, 2013, 4:49 PM
More Blog Posts
Copyright 2013 DailyTech LLC. -
Terms, Conditions & Privacy Information