T-Room

The Best in Alt News

  • Home
  • News Archive
  • Visit the New Website

May 29, 2012

Another computer worm – W32.Flamer – hit Iran's oil terminals

Experts warn W32.Flamer may have been developed by a nation state as part of cyberwarfare activities

by Nick Hopkins
guardian.co.uk, Monday 28 May 2012 14.04 EDT

Iran's Kharg island terminal processes 90% of the country's crude oil exports Photograph: Kaveh Kazemi/Corbis

A cyber-attack that targeted Iran‘s oil ministry and main export terminal was caused by the most sophisticated computer worm yet developed, experts have warned.

The virus appears to have been directed primarily at a small number of organisations and individuals in Iran, the West Bank, Lebanon and the United Arab Emirates. This will inevitably raise suspicions that Israel or the US were involved in some way.

Analysts who have been decoding the computer worm, which is called W32.Flamer, have been unable to identify the source. But they say only a professional team working for several months could have been behind it.

The CrySys Laboratory, in Hungary, said: “The results of our technical analysis supports the hypothesis that [the worm] was developed by a government agency of a nation state with significant budget and effort, and it may be related to cyberwarfare activities.”It is certainly the most sophisticated malware we [have] encountered. Arguably, it is the most complex malware ever found.”

Orla Cox, a senior analyst at Symantec, the international computer security firm, said: “I would say that this is the most sophisticated threat we have ever seen.”

Symantec undertook a detailed analysis of the groundbreaking Stuxnet virus, which targeted Iran’s nuclear enrichment facilities two years ago, sending some of their centrifuges spinning out of control. Cox said W32.Flamer appeared to be even more complex than Stuxnet, and that it was an incredibly clever, comprehensive “spying programme”.

“It is a backdoor worm that goes looking for very specific information. It scrapes a mass of information from any infected machines and then sends it, without the user having any idea what is going on. The amount of information it can send is huge.”

Symantec first started working on the code over the weekend after it was discovered by specialists at the Laboratory of Cryptography and System Security, at the University of Budapest.

Analysis now shows that the worm has been around, undetected, for at least two years, and experts are confident it was responsible for the disruption to Iran’s oil industry last month.

Read the rest of the story HERE.

 

Filed Under: Opinion Tagged With: CrySys Laboratories, cyber attack, cyberwarfare, Iran, Iran's oil refineries, Israel, Lebanon, malware, Stuxnet, the West Bank, United Arab Emirates, United States, Virus, W32.Flamer

Leave a Reply Cancel reply

You must be logged in to post a comment.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Tags

9/11 Alex Jones Article II Banksters Barack Obama bernanke China CIA Corbett Report Edward Snowden fascism Federal Reserve fukushima GMO Gold Gold currency Goldman Sachs IMF Iran Israel JP Morgan Keiser Report Max Keiser NATO Netanyahu New World Order NSA Obama Palestine Police state politics President Obama radiation RT Russia Silver Silver currency Syria T-Room the t room US Constitution USD Wall Street wayne madsen Zionism

Any publication posted at The T-Room and/or opinions expressed therein do not necessarily reflect the views of The T-Room. Such publications and all information within the publications (e.g. titles, dates, statistics, conclusions, sources, opinions, etc) are solely the responsibility of the author of the article, not The T-Room.

© 2013 Tansey & Associates, LLC | Terms of Use | Privacy Policy | Site Designed by Owen Design Company