Iran Fights Off Oil Ministry Attack

Wednesday, May 27, 2015 @ 02:05 PM gHale

Iran said it was able to stop a cyber attack on its oil ministry, and that those behind the hacking attempt were based in the United States, according to a report on the France Press Agency (AFP).

In the AFP report, the Fars news agency cited Brigadier General Kamal Hadianfar, head of the cyber police, as saying the unit had thwarted “the hackers’ attack on the oil ministry.”

Complexity Halts Security: Report
Cyber Insurance Debate Heating Up
Breach: Subsea Cable Operator’s IT Network
Oil Industry Under Attack

He said the source of the attempt was in the United States, and U.S. authorities know of the attack.

“The IP address for these hackers was in America,” he said, adding “an international judicial order” had went to the United States, without elaborating.

Hadianfar said the hacking attempt took place over a four-day period at the start of the new Iranian year which began on March 20.

Iran’s controversial nuclear program was the target of a 2010 cyber-attack by the Stuxnet virus, which ISSSource reported the U.S. and Israel were behind the attack. The Stuxnet campaign, as ISSSource reported, ended up conducted by the United States and Israel to disable the uranium enrichment plant outside Natanz, Iran, by causing the control system to run wildly out of control causing severe damage to centrifuges.

A February report by Russian security firm Kaspersky Lab spoke of a powerful cyber-spying tool that can tap into millions of computers worldwide through secretly installed malware, with many signs pointing to a U.S.-led effort.

Iran has also been developing its own cyber espionage capability.

U.S. National Intelligence Director James Clapper in February blamed Iran for a cyber attack on Sands Casino in Las Vegas that stole confidential data and shut down many of the casino’s operations.

The assault came after the billionaire owner of Sands, Sheldon Adelson, said in 2013 that “Iran should be nuked.”

And last December, U.S. cyber-security firm Cylance said Iran-based hackers worked for two years in an operation dubbed “Cleaver.”

Cylance researchers said the effort has “conducted a significant global surveillance and infiltration campaign.”

Leave a Reply

You must be logged in to post a comment.