Iran: Oil Industry Hit By Malware Attack

  /     /     /  
Publicated : 22/11/2024   Category : security


Iran: Oil Industry Hit By Malware Attack


Deja vu all over again as Iranian government-owned systems reportedly targeted by a worm



Officials in the Iranian oil ministry say their network and the countrys main oil export terminal were infected with a malware-borne attack that reportedly forced the nation to take those systems offline temporarily.
Word of the apparent worm attack reported by various international news outlets today quickly brought a sense of deja vu and comparisons to the Stuxnet worm that targeted Irans Natanz facility in 2010. But most security experts say this doesnt appear to be another Stuxnet, which was an obvious nation state-sponsored attack aimed at disarming Irans nuclear operations.
An Iranian oil ministry spokesperson
said in a statement on the ministrys website
that the virus attacks yesterday did not affect any major information and that the public servers that were hit are isolated from the main servers.
The Mehr news agency said the Iranian Oil Ministry, the National Iranian Oil Company, and other businesses with ties to the oil ministry were targeted on Sunday by the worm, but that it was mitigated before it could do serious damage, according to
a Dow Jones newswire report
.
According to
a report by Bloomberg
, sources in the Iranian oil industry said a virus was found in the control systems of Kharg Island, where most of Irans crude oil expert operations reside. The terminal remained up and running during the infection, the sources said.
A server that offered public information was the only one hurt in the attack, Ali Nikzad, a ministry spokesman, told the state-run Fars news agency, according to the Bloomberg report.
Security experts say its too soon to draw any connections to this attack and Stuxnet or Duqu, for instance.
Based on information currently available, it would be very premature to suggest that this was targeted against either Iran or systems utilized in oil pipeline/transportation operations -- and indeed make any kind of comparison to Stuxnet, says Tom Parker, chief technology officer at FusionX.
Initial reports indicate that it was the website of the oil ministry that was affected, and not control systems. So [there is] no indication that it was targeted against oil production systems, Parker says.
[Researchers at Symantec dissect part of new, retooled version of the reconnaissance-gathering malware thats related to Stuxnet. See
Duqu Alive And Well: New Variant Found In Iran
. ]
The other issue, of course, is the validity of reports and statements that come from the highly censored nation. Iran also likes to play victim on this sort of stuff, and has done [so] since Stuxnet, so Id take any info that comes from Iranian officials, or companies with a pinch of salt, Parker says.
Mark Russinovich, technical fellow at Microsoft in Windows Azure, said on Twitter today that he doesnt think the attack was a nation-state operation. I doubt this was a nation-state attack, but Iran announces that oil terminal was offline after malware attack, he tweeted today from his account.
Meanwhile, John Bumgarner, a security specialist with the think tank U.S. Cyber Consequences Unit, reportedly told Reuters that the purpose of such a malware attack would to be erase data and ultimately shut down operations: The reason you would put a virus inside this network to erase data is because that causes those facilities to have to shut down and to rebuild servers, he told Reuters. So during that time the production and refinery operations for Iran could be impacted. And depending on how the virus was written, it could be longer term.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Iran: Oil Industry Hit By Malware Attack