Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

4/23/2012
01:05 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Iran: Oil Industry Hit By Malware Attack

Deja vu all over again as Iranian government-owned systems reportedly targeted by a 'worm'

Officials in the Iranian oil ministry say their network and the country's main oil export terminal were infected with a malware-borne attack that reportedly forced the nation to take those systems offline temporarily.

Word of the apparent worm attack reported by various international news outlets today quickly brought a sense of deja vu and comparisons to the Stuxnet worm that targeted Iran's Natanz facility in 2010. But most security experts say this doesn't appear to be another Stuxnet, which was an obvious nation state-sponsored attack aimed at disarming Iran's nuclear operations.

An Iranian oil ministry spokesperson said in a statement on the ministry's website that the virus attacks yesterday did not affect any major information and that the public servers that were hit are "isolated from the main servers."

The Mehr news agency said the Iranian Oil Ministry, the National Iranian Oil Company, and other businesses with ties to the oil ministry were targeted on Sunday by the worm, but that it was mitigated before it could do serious damage, according to a Dow Jones newswire report.

According to a report by Bloomberg, sources in the Iranian oil industry said a virus was found in the control systems of Kharg Island, where most of Iran's crude oil expert operations reside. The terminal remained up and running during the infection, the sources said.

A server that offered public information was the only one hurt in the attack, Ali Nikzad, a ministry spokesman, told the state-run Fars news agency, according to the Bloomberg report.

Security experts say it's too soon to draw any connections to this attack and Stuxnet or Duqu, for instance.

"Based on information currently available, it would be very premature to suggest that this was targeted against either Iran or systems utilized in oil pipeline/transportation operations -- and indeed make any kind of comparison to Stuxnet," says Tom Parker, chief technology officer at FusionX.

Initial reports indicate that it was the website of the oil ministry that was affected, and not control systems. "So [there is] no indication that it was targeted against oil production systems," Parker says.

[Researchers at Symantec dissect part of new, retooled version of the reconnaissance-gathering malware that's related to Stuxnet. See Duqu Alive And Well: New Variant Found In Iran. ]

The other issue, of course, is the validity of reports and statements that come from the highly censored nation. "Iran also likes to play victim on this sort of stuff, and has done [so] since Stuxnet, so I'd take any info that comes from Iranian officials, or companies with a pinch of salt," Parker says.

Mark Russinovich, technical fellow at Microsoft in Windows Azure, said on Twitter today that he doesn't think the attack was a nation-state operation. "I doubt this was a nation-state attack, but Iran announces that oil terminal was 'offline' after 'malware attack,'" he tweeted today from his account.

Meanwhile, John Bumgarner, a security specialist with the think tank U.S. Cyber Consequences Unit, reportedly told Reuters that the purpose of such a malware attack would to be "erase data" and ultimately shut down operations: "The reason you would put a virus inside this network to erase data is because that causes those facilities to have to shut down" and to rebuild servers, he told Reuters. "So during that time the production and refinery operations for Iran could be impacted. And depending on how the virus was written, it could be longer term."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ANON1234466804894
50%
50%
ANON1234466804894,
User Rank: Apprentice
4/25/2012 | 12:13:08 AM
re: Iran: Oil Industry Hit By Malware Attack
-agreed
ydnar
50%
50%
ydnar,
User Rank: Apprentice
4/23/2012 | 9:24:01 PM
re: Iran: Oil Industry Hit By Malware Attack
I could see them acknowledging a simple DoS/DDoS if they are trying to play the "victim" as one person mentioned in the article has already speculated.-
boldi
50%
50%
boldi,
User Rank: Apprentice
4/23/2012 | 8:41:26 PM
re: Iran: Oil Industry Hit By Malware Attack
For a simple DoS or DDoS Iran would not ack that they were hit.
ydnar
50%
50%
ydnar,
User Rank: Apprentice
4/23/2012 | 7:23:50 PM
re: Iran: Oil Industry Hit By Malware Attack
You're correct.- A Web server should be isolated within a DMZ and segregated from any other sensitive servers, and ideally there should be an additional layer of security between those sensitive servers and any SCADA infrastructure.
Danielle Russell
50%
50%
Danielle Russell,
User Rank: Apprentice
4/23/2012 | 6:48:57 PM
re: Iran: Oil Industry Hit By Malware Attack
This is no Stuxnet:
This could be a DDOS or an actual expoit of some software running on the web server, article does not mention if this is the same as the "terminal" computer. Generally web servers are segregated from sensitive computers, can't imagine they run web servers on their main oil export computer.
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5230
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
CVE-2019-5231
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
CVE-2019-5233
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
CVE-2019-5246
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
CVE-2010-4177
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.