Subscribe free to our newsletters via your
. GPS News .




CYBER WARS
Israel top suspect behind new cyber menace
by Staff Writers
Beirut, Lebanon (UPI) May 31, 2012


disclaimer: image is for illustration purposes only

Israel is widely seen as the prime suspect in the "most complex" cyberattack by a data-gulping computer worm known as W32.Flame that has hit Iran's oil industry and other targets in the Middle East in recent days.

And Israeli leaders are doing little to discourage speculation that the Jewish state's newly established cyber command is the main culprit behind the attack that some analysts say marks a new era in cyberwarfare.

Israeli Deputy Prime Minister Moshe Yaalon, who's also minister for strategic affairs, hinted Monday that Israel was involved in the Flame attacks that in April targeted Iran's oil industry, already battered by international sanctions, as well as computers in Saudi Arabia, the Israeli-occupied West Bank, Sudan and Egypt.

"Anyone who sees the Iranian nuclear threat as a significant threat," he said in Tel Aviv, will find "it's reasonable to take various steps, including these, to hobble it.

"Israel is blessed as a country rich in high-tech and these tools that we take pride in open up all kinds of opportunities for us."

Israeli Prime Minister Binyamin Netanyahu set up a National Cybernetic Task Force in July 2011 tasked with developing defenses to protect the country's strategic infrastructure from Internet-based attacks.

The following month, Israel's military establishment formed a cyberdefense command within the C4I Directorate -- command, control, communications, computers and intelligence -- under an army colonel who formerly headed Matzov, the Hebrew acronym for the Center for Encryption and Information Security.

At the center of this highly classified network is Unit 8200 of Military Intelligence, a super-secret signals intelligence and codebreaking unit that's understood to have been given responsibility for all the Jewish state's cyberwar capabilities.

The Jerusalem Post reported in May 2011 that Unit 8200 was suspected of playing a key role in developing the Stuxnet worm that Tehran said in September 2010 had disrupted its nuclear program and high-value industrial facilities.

Computer experts generally agreed at the time that the mysterious Stuxnet worm, then the most sophisticated malware system ever detected, could only have been put together by the intelligence services of Israel or the United States or another combination of states.

The German newsmagazine Der Spiegel quoted sources familiar with the Stuxnet operation as insisting it was a "a blue-and-white operation … a purely Israeli operation,' referring to Israel's national colors.

The sources said a secret Israeli unit, most likely Unit 8200, was responsible for programming much of the Stuxnet code.

U.S. sources say Israel's Dimona nuclear complex in the Negev Desert south of Tel Aviv was used as a testbed for the Stuxnet virus by a U.S.-Israeli team before it was unleashed against Iran June 22, 2009.

The Iranians since then have been hit by other worms dubbed Stars and Duqu, and have apparently struck back against Israel with their own cyber weapons. In November, Israel's military and intelligence services Web sites crashed for several hours in what appeared to be cyberattack.

A few days earlier, Anonymous, a shadowy group of global hackers and online activists, had threatened to hit Israel to retaliate against its economic blockade of the Gaza Strip.

But whether or not Anonymous was responsible, the Israelis braced for Iranian cyberattacks.

Yiftach Ron-Tal, a reserve major general and chairman of the state-owned Israel Electric Co., warned: "We need to be prepared for the possibility that critical infrastructure will be paralyzed."

The Iranians are believed to have built up a sizeable cyberwarfare network to counter what they see as a concerted Israeli-U.S. effort to cripple their nuclear project through a multilayered campaign of disruption and assassination.

Kapersky Labs, the Russian Internet security company that discovered W32.Flame, says it's the most complex and sophisticated cyberweapon it's expected have come across.

"The Flame malware looks to be another phase in this war," said the group's co-founder, Eugene Kapersky.

Where the ground-breaking Stuxnet malware damaged industrial controls, the Flame virus is designed to spy and gather intelligence by stealing programs. It can even switch on microphones attached to a computer to record conversations, experts say.

"This is a fully featured spying program that's grabbing anything it can," said Orla Cox of Symantec, a leading computer security company.

We suspect there's some nation state involvement because of the funding you'd need to have behind this."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Flame virus a new age cyber spy tool
San Francisco (AFP) May 30, 2012
The Flame computer virus that smoldered undetected for years in Middle Eastern energy facilities confirmed fears that the world has entered a new age of cyber espionage and sabotage. Internet defenders on Wednesday were tearing into freshly exposed Flame malware (malicious software) that could be adapted to spread to critical infrastructures in countries around the world. While the compo ... read more


CYBER WARS
Australia and China eye joint farming plan

Shiraz with your Peking Duck? Sacre bleu!

One in seven suffer malnourishment: UN food agency

Women warming to white wines in China: experts

CYBER WARS
The first chemical circuit developed

Copper-nickel nanowires could be perfect fit for printable electronics

Japan's Renesas ups chip outsourcing to Taiwan giant

New silicon memory chip developed

CYBER WARS
Louis Gallois hands EADS reins to Tom Enders

Boeing Delivers First EA-18G Growler Featuring Bharat Electronics Limited Cockpit Subassembly

Flapping protective wings increase lift

Russia, India to produce transports

CYBER WARS
Japan's vehicle output soars 174% in April

Japan's April auto output soars in year after quake

Ferrari recalls 56 cars in China: state media

Toyota overtakes GM, regains number one spot

CYBER WARS
EU, China edge closer to hi-tech trade war

Australian PM: miners don't own minerals

U.K., Spain work on S. America investments

Japan's NEC buys Australian IT firms

CYBER WARS
Greenpeace says KFC boxes destroy Indonesia forests

Beetle-infested Pine Trees Contribute to Air Pollution and Haze in Forests

Beetle-infested pine trees contribute more to air pollution and haze in forests

Forest diversity from Canada to the sub-tropics influenced by family proximity

CYBER WARS
CryoSat goes to sea

S Korea to develop geostationary satellite for environmental monitoring

LiDAR Technology Reveals Faults Near Lake Tahoe

Satellite maps ocean floor

CYBER WARS
Wyss Institute develops nanodevice manufacturing strategy using DNA 'building blocks'

First direct observation of oriented attachment in nanocrystal growth

Stunning image of smallest possible 5 rings

Sensing the infrared: Researchers improve IR detectors with single-walled carbon nanotubes




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement