Skip to content
  • Facebook
  • X
  • Linkedin
  • WhatsApp
  • Associate Journalism
  • About Us
  • Privacy Policy
  • 033-46046046
  • editor@artifex.news
Artifex.News

Artifex.News

Stay Connected. Stay Informed.

  • Breaking News
  • World
  • Nation
  • Sports
  • Business
  • Science
  • Entertainment
  • Lifestyle
  • Toggle search form
  • G20 Summit Full Dress Rehearsal In Delhi Today, Traffic To Be Affected Nation
  • “Disappointed, This Country Hasn’t Seen Your Potential”: Gautam Gambhir Tells 281-Game Veteran Sports
  • Prepping For Another India-Made Aircraft Carrier: Indian Navy’s Big Announcement Nation
  • Rodrigo De Paul Stunner Fires Atletico Madrid Past Celta Vigo Towards Top Four Finish Sports
  • Teen Computer Prodigy, Who Died At 15, To Become First “Millennial Saint” World
  • “Need To Work On My Mistakes”: PV Sindhu After Getting Knocked Out Of All England Badminton Sports
  • Student From Telangana Drowns In Lake In Canada On His Birthday World
  • Virat Kohli’s Celebration After 32-Ball-50 Says It All Amid Strike Rate Chatter Sports

How CIA, Mossad Used A Computer Virus To Dismantle Iran’s Nuclear Program

Posted on September 21, 2024 By admin


Stuxnet did not confine itself to Iran. It spread to other countries, including India.

New Delhi:

It’s June, 2009. The streets of Tehran have erupted in protests over the results of a presidential election. The incumbent Mahmoud Ahmadinejad has emerged victorious with an overwhelming majority against Mir-Hossein Mousavi. Protesters alleged a fraudulent victory. Among them is a woman named Neda Agha-Soltan, who on her way to join the main protests, parked her car at some distance from the gathering and stepped out as the vehicle’s air conditioner was not working. As she breathed in the fresh air, a sniper belonging to a government-funded militia took aim and shot her square in the chest. She was dead.

While this was unfolding in Tehran, around 300 kilometres to the south at the Natanz nuclear facility, the heart of Iran’s nuclear program – ‘strange’ things were happening. Just days after Neda’s death, the CIA reportedly received approval to initiate a cyber operation against this facility. The operation involved uploading a sophisticated piece of malware, known as Stuxnet, directly onto Iranian hardware. This malware had been in development for years, a collaborative effort between the United States and Israel, and represented the world’s first digital weapon.

Stuxnet: The Genesis

Stuxnet was not a new presence in Iran’s nuclear infrastructure; it had been causing disruptions for years. However, this new version was designed to deliver a decisive blow. 

The story of Stuxnet’s development and deployment began years earlier. The inception of Stuxnet can be traced back to the early 2000s, during a period of heightened tension between Iran and Western nations over Iran’s nuclear ambitions. The Bush administration, concerned about Iran’s potential to develop nuclear weapons, sought unconventional methods to impede Tehran’s progress. Thus, the covert operation codenamed ‘Olympic Games’ was born. This initiative, involving close collaboration between the CIA, the NSA, and Israel’s Mossad, aimed to create a digital weapon capable of physically disrupting Iran’s nuclear enrichment capabilities.

Stuxnet was not an ordinary piece of malware. Its design reflected a level of sophistication unprecedented in the realm of cyber weapons. The malware targeted Siemens Step7 software, used to control industrial equipment, specifically focusing on the centrifuges at Iran’s Natanz uranium enrichment facility. These centrifuges, essential for enriching uranium, operated at high speeds and required precise control to function correctly.

Stuxnet: The Execution

The US built a replica of Iran’s nuclear facility in its Oak Ridge facility in the state of Tennessee, where they meticulously studied the centrifuges to understand how to sabotage them without detection. In 2007, the first version of Stuxnet was released, targeting these centrifuges by preventing the release of pressure through the valves, causing the uranium gas to solidify and the centrifuges to spin out of control and ultimately self-destruct.

Latest and Breaking News on NDTV

Photo Credit: Oak Ridge National Laboratory

Iran’s nuclear facility was air-gapped, meaning its network was offline, so Stuxnet had to be introduced via an inside agent using a USB drive. The malware operated undetected, using a rootkit to hide its presence and stolen digital certificates to appear as legitimate commands. Despite its effectiveness, initial versions of Stuxnet only slowed Iran’s progress, and did not sabotage it entirely.

In response, US researchers developed a more aggressive version of Stuxnet, using four zero-day exploits and stolen private keys to sign its commands. This version could spread rapidly, even across air-gapped networks, and reprogram the centrifuges to destroy themselves while masking the sabotage as hardware malfunctions.

Stuxnet: The Implications

An insider at Natanz introduced this new version of Stuxnet, and it quickly spread throughout the facility’s network. However, its aggressive nature led to unintended consequences: the malware spread beyond Natanz, infecting computers across Iran and eventually the globe. The CIA, realising the uncontrollable spread of Stuxnet, decided to continue with the operation, hoping it would remain undetected within Natanz.

Latest and Breaking News on NDTV

Photo Credit: Google Earth

Their hopes were dashed when cybersecurity firm Symantec discovered Stuxnet and published a detailed report on the malware. Iran soon realised the extent of the cyber attack and took measures to protect their nuclear program. Despite the setbacks caused by Stuxnet, Iran vowed to continue its nuclear ambitions.

One of the earlier hints of Stuxnet’s existence emerged in June 2010 when a Belarusian cybersecurity firm discovered an unusual piece of malware on an Iranian computer. As cybersecurity experts from around the world began analysing the code, they were astounded by its complexity and purpose. 

Impact On Iran’s Nuclear Program

Stuxnet’s impact on Iran’s nuclear program was significant but not immediately catastrophic. By 2009, Iran had installed over 7,000 centrifuges at Natanz, but Stuxnet caused approximately 1,000 of these to fail. The disruptions forced Iran to temporarily halt its enrichment activities and replace the damaged equipment, delaying its nuclear ambitions by several months to years.

The Iranian government, initially oblivious to the cause of the centrifuge failures, eventually recognised the cyber intrusion. Publicly, Iran downplayed the impact of Stuxnet, but internally, it spurred significant investment in cybersecurity measures and the development of offensive cyber capabilities.

Over the following years, targeted assassinations of key Iranian nuclear scientists further crippled their program. Car bombings and other attacks eliminated many of the leaders involved, including the director of the Natanz facility.

Stuxnet: Global Fallout

Stuxnet did not confine itself to Iran. It spread to other countries, including India, Indonesia, and Pakistan, affecting industrial systems worldwide. In India, several critical infrastructure facilities,  reportedly infecting as many as 80,000 computers. Several power plants and manufacturing units were also found to be vulnerable to similar attacks.

In 2013, India adopted the National Cyber Security Policy which focused on “protection of information infrastructure and preservation of the confidentiality, integrity and availability of information in cyberspace”. The following year, the Centre announced the formation of the National Critical Information Infrastructure Protection Centre to further safeguard India’s cyber security space. 
 

Waiting for response to load…



Source link

World Tags:CIA, cia iran, cia mission, Cyber Warfare, Espionage, Hezbollah, hezbollah attack, Iran Natanz plant, iran nuclear, Iran nuclear accord, Iran nuclear activity, Iran Nuclear Agreement, Iran nuclear arms, iran nuclear bomb, Iran nuclear deal, Iran nuclear facility, Iran nuclear weapon, israel gaza, Israel Hamas, israel hezbollah, Israel Iran, israel iran attack, israel iran attacks, israel iran nuclear facilities, Israel Iran war, israel lebanon, Israel Mossad, Mossad, Natanz nuclear facility, Spy Ops, Stuxnet, Stuxnet virus

Post navigation

Previous Post: Mexican President blames the U.S. for bloodshed in Sinaloa as cartel violence surges
Next Post: Kerala-Born Man’s Name Comes Up In Pager Blasts Case. What Probe Reveals

Related Posts

  • New York Students Admit They Have No Idea What They Are Protesting World
  • Bangladesh suspends job reservations after student protests World
  • Pope offers refuge to Myanmar’s jailed Suu Kyi: report World
  • WHO states decide not to invite Taiwan to annual assembly World
  • Turkiye formally asks to join the genocide case against Israel at the UN court World
  • Kenyan officials remove bodies as they try to confirm the death toll from a school dormitory fire World

More Related Articles

Republicans reject Rep. Jim Jordan for House speaker on a first ballot, signaling more turmoil ahead World
Israel PM Benjamin Netanyahu Faces Political Dilemma World
UK Police Arrest Two Men After Assault On Anti-Fascism Protester World
Nepal rains bring floods, landslides that kill 10, with seven missing World
Police beat, arrest opposition supporters in Ethiopia’s Tigray World
ISIS-Linked Outfit Khorasan Threatens Terror Attack On India-Pak T20 World Cup Match In US New York World
SiteLock

Archives

  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022

Categories

  • Business
  • Nation
  • Science
  • Sports
  • World

Recent Posts

  • India vs Bangladesh: No More International Games In Kanpur After ‘Washout’ Row? Report Says…
  • PM Modi calls Kharge to enquire about his health
  • Not just nothing, dark matter quests close in on dire ‘neutrino fog’
  • Death toll soars in U.S. from storm Helene, North Carolina reeling
  • ACA chief Kesineni Sivanath meets BCCI president Roger Binny

Recent Comments

  1. TpeEoPQa on UP Teacher Who Asked Students To Slap Muslim Classmate
  2. xULDsgPuBe on UP Teacher Who Asked Students To Slap Muslim Classmate
  3. KyJtkhneiLmcq on UP Teacher Who Asked Students To Slap Muslim Classmate
  4. mOyehudovB on UP Teacher Who Asked Students To Slap Muslim Classmate
  5. GFBvgSrWPcsp on UP Teacher Who Asked Students To Slap Muslim Classmate
  • AIFF To Have ‘Independent’ Inquiry Into Ex-Head Coach Igor Stimac’s Contract Renewal Process Sports
  • Terrorist Planning Lone Wolf Attack On Security Personnel Arrested In Madhya Pradesh: Cops Nation
  • Air Force Conducts Special Air Show To Mark 76 Years Of Jammu-Kashmir Acceding To India Nation
  • Poland’s pro-EU opposition tipped to win election with record turnout World
  • In A 1st, China Operates All 3 Aircraft Carriers At Once, Near Japan, Taiwan World
  • Centre Launches Mobile App For Applicants Seeking Citizenship Under CAA Nation
  • “Entire Story Not In 20-30 Seconds Clip”: Ex-India Star On Viral Mohammad Rizwan Video Sports
  • U.K. Finance Minister dampens down hopes of tax cuts as election looms World

Editor-in-Chief:
Mohammad Ariff,
MSW, MAJMC, BSW, DTL, CTS, CNM, CCR, CAL, RSL, ASOC.
editor@artifex.news

Associate Editors:
1. Zenellis R. Tuba,
zenelis@artifex.news
2. Haris Daniyel
daniyel@artifex.news

Photograher:
Rohan Das
rohan@artifex.news

Artifex.News offers Online Paid Internships to college students from India and Abroad. Interns will get a PRESS CARD and other online offers.
Send your CV (Subjectline: Paid Internship) to internship@artifex.news

Links:
Associate Journalism
About Us
Privacy Policy

News Links:
Breaking News
World
Nation
Sports
Business
Entertainment
Lifestyle

Registered Office:
72/A, Elliot Road, Kolkata - 700016
Tel: 033-22277777, 033-22172217
Email: office@artifex.news

Editorial Office / News Desk:
No. 13, Mezzanine Floor, Esplanade Metro Rail Station,
12 J. L. Nehru Road, Kolkata - 700069.
(Entry from Gate No. 5)
Tel: 033-46011099, 033-46046046
Email: editor@artifex.news

Copyright © 2023 Artifex.News Newsportal designed by Artifex Infotech.