- FrontPage Magazine - http://www.frontpagemag.com -
Second Cyber Attack on Iran?
Posted By Ryan Mauro On October 21, 2011 @ 12:16 am In Daily Mailer,FrontPage | 22 Comments
The Stuxnet cyber attack on Iran’s nuclear program was a defining moment in the history of war, and now, the “Son of Stuxnet” has been discovered. Cyber security experts say  the creator of the original worm, widely believed to be Israel and probably the U.S., also designed this one and “there is nothing out there available to stop it.”
The Stuxnet cyber attack rendered thousands of Iran’s centrifuges, around a fifth of all of them, useless. Over 1,000 damaged units were replaced at the Natanz centrifuge farm, and damaged  the steam turbine at the Bushehr nuclear reactor. In 2009, only half  of Iran’s centrifuges were being used and some of those operating were only enriching half as much uranium as they should. The Iranians have to replace  all of the computers at Natanz, and it may take up to two years. It was later found out that Israel tested  Stuxnet on centrifuges identical to those used by Iran at its nuclear site in Dimona.
The Iranians later announced  in April 2011 that a second cyber attack was discovered, which they called “Stars.” All that the regime said was that it was found on government computers and caused little damage. Iran soon replaced its centrifuges at Natanz and began manufacturing more sophisticated centrifuges that can significantly speed up the nuclear program. The centrifuges were moved to an underground site in the mountains near Qom. In February, experts determined  that Iran had recovered from the damage wrought by Stuxnet. And now, the “Son of Stuxnet” has emerged.
The new virus, also called Stuxnet 2.0 and Duqu, is broader in scope. It opens up a back door in the compromised computer systems for 36 days, and then disappears. It has been doing this as far back as last December, though the victims have not been publicly identified. The virus allows the creator to hijack the controlling computer systems, permitting the attacker to direct their operations or to even self-destruct. It also records keystrokes and sends back critical information about system vulnerabilities. The back doors have not been exploited, leading experts to conclude that a cyber attack is on its way.
“The attackers are looking for information such as design documents that could help them mount a future attack on an industrial control facility,” Symanetec said  in its announcement of the discovery. It called it a “precursor to a future Stuxnet-like attack.”
“It’s my personal belief that the guys who wrote Stuxnet knew exactly what they were doing, and if you thought they were good guys then, you probably don’t have anything more to worry about now. But if you didn’t, you probably have a lot to worry about,” said  Vikrum Thakur of Symantec.
At the same time, sanctions and other likely covert operations are taking a heavy toll on the Iranian nuclear program. One issue still confronting Iran is faulty equipment. This may be connected to CIA-Mossad operations that began as early as 1998 to sell Iran booby-trapped equipment. Nuclear-related tools that the Iranians admitted  were “manipulated” caused the destruction of 50 centrifuges in 2006, and the director of the Atomic Energy Organization was sacked  in 2009 after a similar explosion happened at Natanz.
The creation of enriched uranium is still decreasing despite Iran’s use of newly-made centrifuges to replace the old and damaged ones. This is being attributed to the type of metal used in them, but covert operations cannot be ruled out given the history. The Institute for Science and International Security and U.N. inspectors say  that Iran is producing more uranium than it did before the Stuxnet attack, but U.N. inspectors say this amount is declining as centrifuges break.
Iran must also overcome a critical shortage of raw uranium, a problem that has forced it to look to  foreign suppliers such as Venezuela, Zimbabwe and North Korea. The black market equipment at the Isfahan uranium conversion site, which turns the raw uranium into gas so it can go into the centrifuges, has also suffered from technical errors. The facility must remove impurities from the uranium before it can be safely inserted into the units without damaging them. In a problem possibly related to covert operations, the equipment failed to do so .
There are a number of other mysterious incidents that have undermined Iran’s nuclear efforts. In the past two years, four Iranian nuclear scientists have been assassinated.  In October 2010, a Revolutionary Guards base  that housed Shahab-3 missiles suffered a massive explosion  at an ammunition depot. There have been repeated  explosions  at important gas pipelines over the past year.
The problems that Iran is encountering are encouraging, but there is still not much room for comfort. It is still believed  that Iran could make a nuclear weapon within 6 months if it tried. The scale of the Iranian nuclear program shows that the regime wants the ability to quickly produce multiple nuclear weapons, and does not want to build one and call it quits.
The “Son of Stuxnet” is almost certainly Israel’s answer to this continued threat. For once, it is Iran that is sitting, feeling helpless as it awaits the next attack.
Freedom Center pamphlets now available on Kindle. Click here .
Article printed from FrontPage Magazine: http://www.frontpagemag.com
URL to article: http://www.frontpagemag.com/2011/ryan-mauro/second-cyber-attack-on-iran/
URLs in this post:
 Image: http://frontpagemag.com/wp-content/uploads/2011/10/stux.jpg
 say: http://www.foxnews.com/scitech/2011/10/19/stuxnet-clone-duqu-hydrogen-bomb-cyberwarfare/
 damaged: http://www.foxnews.com/scitech/2010/11/26/secret-agent-crippled-irans-nuclear-ambitions/
 half: http://www.washingtonpost.com/wp-dyn/content/article/2010/02/10/AR2010021003988.html?sid=ST2010021004101
 replace: http://www.worldthreats.com/?p=6404
 tested: http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html?pagewanted=all
 announced: http://www.guardian.co.uk/world/feedarticle/9613098
 determined: http://www.washingtonpost.com/wp-dyn/content/article/2011/02/15/AR2011021505395.html?hpid=topnews
 said: http://www.symantec.com/connect/w32_duqu_precursor_next_stuxnet
 said: http://redtape.msnbc.msn.com/_news/2011/10/18/8384786-son-of-stuxnet-virus-could-be-used-to-attack-critical-computers-worldwide
 admitted: http://www.ft.com/intl/cms/s/dc135fc6-95af-11df-b5ad-00144feab49a,Authorised=false.html?_i_location=http%3A%2F%2Fwww.ft.com%2Fcms%2Fs%2F0%2Fdc135fc6-95af-11df-b5ad-00144feab49a.html&_i_referer=http%3A%2F%2Ffrontpagemag.com%2F2011%2F07%2F25%2Fmotorcycle-assassins-strike-again%2F2%2F#axzz1bD54rJ00
 sacked: http://wikileaks.org/wiki/Serious_nuclear_accident_may_lay_behind_Iranian_nuke_chief%27s_mystery_resignation
 say: http://www.thenational.ae/news/worldwide/middle-east/failures-stall-irans-nuclear-ambitions
 look to: http://pajamasmedia.com/blog/irans-secret-uranium-deal-with-zimbabwe/
 failed to do so: http://www.washingtonpost.com/wp-dyn/content/article/2009/10/15/AR2009101502761.html
 assassinated.: http://www.frontpagemag.com../2011/07/25/motorcycle-assassins-strike-again/
 base: http://www.globalsecurity.org/wmd/world/iran/khorramabad.htm
 explosion: http://www.jpost.com/Headlines/Article.aspx?id=192686
 repeated: http://www.jpost.com/Headlines/Article.aspx?id=207828
 explosions: http://blogs.telegraph.co.uk/news/concoughlin/100050959/whos-blowing-up-irans-gas-pipelines/
 believed: http://www.voanews.com/english/news/middle-east/Iran-Encounters-Nuclear-Problems-132204623.html
 here: http://www.amazon.com/s/ref=nb_sb_noss?url=search-alias%3Ddigital-text&field-keywords=david+horowitz&rh=n%3A133140011%2Ck%3Adavid+horowitz&ajr=0#/ref=sr_st?keywords=david+horowitz&qid=1316459840&rh=n%3A133140011%2Ck%3Adavid+horowitz&sort=daterank
Copyright © 2015 FrontPage Magazine. All rights reserved.