Iran Offshore Platforms Targeted

Thursday, March 7, 2013 @ 06:03 PM gHale


Iran fought off attacks against its offshore oil and gas platforms as they ended up targeted in an effort to cripple the country.

The attacks ended up stymied and the head of IT at the Iranian Offshore Oil Company, Mohammad Reza Golshani said Israel was behind the attacks, according to a Reuters report.

RELATED STORIES
Stuxnet Older than We Think
Cyber War Stakes Rising
U.S., Israel behind New Iran Attack
Flame: ‘20 Times Larger than Stuxnet’
Shamoon Target: Aramco Production
Stuxnet Hit 4 Oil Companies
Iran behind Shamoon Attack

Golshani said the attack happened over the past couple of weeks. The attack routed through China and affected only the communications systems of the network.

It is almost two weeks since the managing director of the National Iranian Offshore Oil Company Mahmoud Zirakchianzadeh announced his company’s negotiations on deals worth $14 billion.

Iran is currently under pressure from the international sanctions, mainly in oil exports, imposed by the UN Security council, the U.S., and the European Union.

On Saturday, the EU threatened to ban Iran’s natural gas export to put pressure on the country’s nuclear program. Iran’s now exporting to Turkey and has swap deals with Armenia and Azerbaijan.

Oil ministry spokesman, Alireza Nikzad-Rahbar, said the possible ban was a “propaganda campaign” because “right now no EU member imports Iranian gas supply.”

The UN Security Council imposed four rounds of sanctions in efforts to pressure Tehran to give up its nuclear program, which the West fears is about creating a nuclear weapon. Iran insists its nuclear ambitions are peaceful. The sanctions targeted Iran’s oil exports and cut off access to international banking networks.

Tehran faces pressure with sanctions, but also various forms of cyber attack, such as Stuxnet, Flame and Gauss, three viruses that gathered information on sensitive Iranian equipment and slowed down its nuclear centrifuges.



Leave a Reply

You must be logged in to post a comment.