Feeds

Iran fingered for attacks on US power firms

Increased levels of online activity have US spooks alert, just a little alarmed

Securing Web Applications Made Simple and Scalable

Iranian hackers are launching state-sanctioned attacks on US energy firms and hope to sabotage critical infrastructure by targeting industrial control systems, according to American officials.

The attacks on oil, gas and power firms have so far concentrated on accruing information on how their systems work – a likely first step in a co-ordinated campaign that would eventually result in attacks aimed at disrupting or destroying such infrastructure.

The prospect of such attacks has senior American officials more worried than the espionage-related incursions which Chinese state-sponsored attackers have been blamed for, according to the Wall Street Journal.

"This is representative of stepped-up cyber activity by the Iranian regime. The more they do this, the more our concerns grow," one anonymous official told the 'paper. "What they have done so far has certainly been noticed, and they should be cautious."

Iran has form when it comes to disrupting US critical infrastructure, having being blamed at the beginning of the year for a series of denial of service attacks on banks in the country.

However, sabotaging industrial control systems represents a greater level of sophistication on the part of the attackers and a serious risk to be managed by those energy firms involved.

Just last week, a report by Congressmen Ed Markey and Henry Waxman urged electricity companies to improve their security posture, after revealing that more than a dozen of those surveyed reported their systems were under “daily”, “frequent” or “constant” attack.

Ironically, some have argued that it was the infamous Stuxnet attack – widely believed to be a US-led effort to disrupt Iran’s nuclear program – which not only showcased the dramatic potential of targeting industrial control systems, but also drove Iran to beef up its own cyber defence and attack capabilities.

Unsurprisingly, the Islamic republic has maintained it is the victim, not the perpetrator, of attacks.

The Journal quotes Iranian spokesperson Alireza Miryousefi as saying “Although Iran has been repeatedly the target of state-sponsored cyber attacks, attempting to target Iran's civilian nuclear facilities, power grids, oil terminals and other industrial sectors, Iran has not ever retaliated against those illegal cyber attacks." ®

The smart choice: opportunity from uncertainty

More from The Register

next story
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.