Subscribe free to our newsletters via your
. Solar Energy News .




CYBER WARS
Israel top suspect behind new cyber menace
by Staff Writers
Beirut, Lebanon (UPI) May 31, 2012


disclaimer: image is for illustration purposes only

Israel is widely seen as the prime suspect in the "most complex" cyberattack by a data-gulping computer worm known as W32.Flame that has hit Iran's oil industry and other targets in the Middle East in recent days.

And Israeli leaders are doing little to discourage speculation that the Jewish state's newly established cyber command is the main culprit behind the attack that some analysts say marks a new era in cyberwarfare.

Israeli Deputy Prime Minister Moshe Yaalon, who's also minister for strategic affairs, hinted Monday that Israel was involved in the Flame attacks that in April targeted Iran's oil industry, already battered by international sanctions, as well as computers in Saudi Arabia, the Israeli-occupied West Bank, Sudan and Egypt.

"Anyone who sees the Iranian nuclear threat as a significant threat," he said in Tel Aviv, will find "it's reasonable to take various steps, including these, to hobble it.

"Israel is blessed as a country rich in high-tech and these tools that we take pride in open up all kinds of opportunities for us."

Israeli Prime Minister Binyamin Netanyahu set up a National Cybernetic Task Force in July 2011 tasked with developing defenses to protect the country's strategic infrastructure from Internet-based attacks.

The following month, Israel's military establishment formed a cyberdefense command within the C4I Directorate -- command, control, communications, computers and intelligence -- under an army colonel who formerly headed Matzov, the Hebrew acronym for the Center for Encryption and Information Security.

At the center of this highly classified network is Unit 8200 of Military Intelligence, a super-secret signals intelligence and codebreaking unit that's understood to have been given responsibility for all the Jewish state's cyberwar capabilities.

The Jerusalem Post reported in May 2011 that Unit 8200 was suspected of playing a key role in developing the Stuxnet worm that Tehran said in September 2010 had disrupted its nuclear program and high-value industrial facilities.

Computer experts generally agreed at the time that the mysterious Stuxnet worm, then the most sophisticated malware system ever detected, could only have been put together by the intelligence services of Israel or the United States or another combination of states.

The German newsmagazine Der Spiegel quoted sources familiar with the Stuxnet operation as insisting it was a "a blue-and-white operation … a purely Israeli operation,' referring to Israel's national colors.

The sources said a secret Israeli unit, most likely Unit 8200, was responsible for programming much of the Stuxnet code.

U.S. sources say Israel's Dimona nuclear complex in the Negev Desert south of Tel Aviv was used as a testbed for the Stuxnet virus by a U.S.-Israeli team before it was unleashed against Iran June 22, 2009.

The Iranians since then have been hit by other worms dubbed Stars and Duqu, and have apparently struck back against Israel with their own cyber weapons. In November, Israel's military and intelligence services Web sites crashed for several hours in what appeared to be cyberattack.

A few days earlier, Anonymous, a shadowy group of global hackers and online activists, had threatened to hit Israel to retaliate against its economic blockade of the Gaza Strip.

But whether or not Anonymous was responsible, the Israelis braced for Iranian cyberattacks.

Yiftach Ron-Tal, a reserve major general and chairman of the state-owned Israel Electric Co., warned: "We need to be prepared for the possibility that critical infrastructure will be paralyzed."

The Iranians are believed to have built up a sizeable cyberwarfare network to counter what they see as a concerted Israeli-U.S. effort to cripple their nuclear project through a multilayered campaign of disruption and assassination.

Kapersky Labs, the Russian Internet security company that discovered W32.Flame, says it's the most complex and sophisticated cyberweapon it's expected have come across.

"The Flame malware looks to be another phase in this war," said the group's co-founder, Eugene Kapersky.

Where the ground-breaking Stuxnet malware damaged industrial controls, the Flame virus is designed to spy and gather intelligence by stealing programs. It can even switch on microphones attached to a computer to record conversations, experts say.

"This is a fully featured spying program that's grabbing anything it can," said Orla Cox of Symantec, a leading computer security company.

We suspect there's some nation state involvement because of the funding you'd need to have behind this."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Flame virus a new age cyber spy tool
San Francisco (AFP) May 30, 2012
The Flame computer virus that smoldered undetected for years in Middle Eastern energy facilities confirmed fears that the world has entered a new age of cyber espionage and sabotage. Internet defenders on Wednesday were tearing into freshly exposed Flame malware (malicious software) that could be adapted to spread to critical infrastructures in countries around the world. While the compo ... read more


CYBER WARS
Nuisance seaweed found to produce compounds with biomedical potential

Maps of Miscanthus genome offer insight into grass evolution

Relative reference: Foxtail millet offers clues for assembling the switchgrass genome

Lawrence Livermore work may improve the efficiency of the biofuel production cycle

CYBER WARS
Robotic jellyfish could one day patrol oceans, clean oil spills, and detect pollutants

Graphene-control cutting using an atomic force microscope-based nanorobot

Rescue robot tested at So. Calif. beach

DLR presents innovations in robotics at AUTOMATICA 2012

CYBER WARS
US slaps duties on Chinese wind towers

Obama pushes for wind power tax credit

US DoI Approves Ocotillo Express Wind Project

Opening Day Draws Close for Janneby Wind Testing Site

CYBER WARS
Japan's vehicle output soars 174% in April

Japan's April auto output soars in year after quake

Ferrari recalls 56 cars in China: state media

Toyota overtakes GM, regains number one spot

CYBER WARS
Iraq plans energy auction after lacklustre sale

Iran Guards chief visits disputed Gulf islands

Major Investors Back IEA Call for 'Golden Rules'

Oil firms shun Iraq's 4th energy auction

CYBER WARS
South Korean nuclear engineers charged with cover-up

Russian-made metal used at Bulgaria nuclear plant meets quality standards

Japan PM says close to reactor restart decision

Japan to decide on nuclear power restart

CYBER WARS
Indonesia to tap its geothermal supply

Greener, More Efficient Lighting

Thailand's PTTEP, Myanmar to sign contract

Germany needs 20 bn euro investment in power grid: operator

CYBER WARS
Greenpeace says KFC boxes destroy Indonesia forests

Beetle-infested Pine Trees Contribute to Air Pollution and Haze in Forests

Beetle-infested pine trees contribute more to air pollution and haze in forests

Forest diversity from Canada to the sub-tropics influenced by family proximity




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement