Share

Related Stories

  • miniFlame emerges as small, highly targeted cyber-espionage tool
    Spyware families are propagating, with the latest identified spawn being miniFlame, a “small and highly flexible malicious program” suitable for targeted, in-depth cyber espionage operations, according to Kaspersky Lab.
  • Financial cybercrime a rising threat, says DoJ
    Financial cybercrime is a rising threat to national security, and as such should be reported to law enforcement agencies when it happens, the US Department of Justice is warning.
  • Pentagon developing cyber warfare rules
    The Department of Defense (DoD) is developing “rules of engagement” for cyberwar to enable the US military to “take action” against cyber adversaries, Pentagon officials told a House Armed Services Committee panel this week.
  • Comment: Cyber war – is it defensible?
    Frank Coggrave of Guidance Software provides insight into the concept of cyber warfare and talks in detail about the different forms in which it manifests itself. While many are talking about developing some rules of engagement, Coggrave contemplates those who do not play by the rules.
  • Stuxnet – a new age in cyber warfare says Eugene Kaspersky
    The Stuxnet worm, which has reportedly been successfully targeted at Iranian nuclear plants, is being widely reported as originating from a government agency or well-funded source with political intent. The CEO of Kaspersky Lab, however, says that, whilst there is insufficient evidence to point the finger of blame at anyone yet, the worm represents a new age in cyber warfare.

Top 5 Stories

News

US considers preemptive action to prevent 'Cyber Pearl Harbor'

23 October 2012

Iran may have been the culprit behind the recent rash of cyber-attacks on oil and gas giants in the Middle East, said US Defense Secretary Leon Panetta, who recently warned that the US was facing the possibility of a “cyber-Pearl Harbor” as politically motivated hackers target the nation’s power grid, transportation systems, financial networks and government entities.

“An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches,” Panetta said, speaking at the Intrepid Sea, Air and Space Museum in New York, adding that China, Russia, Iran and militant groups are the biggest likely perpetrators of such an attack.

He raised a specter of a cyber-attack that would do far worse than steal sensitive information from government departments. “They could derail passenger trains, or even more dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country.”

Other countries are already feeling the cyber-warfare bite. In August, Saudi Arabia’s state oil company, Saudi Aramco, saw more than 30,000 systems infected. While critical functions like oil production were unaffected, being on separate systems, basic operations were shut down by the attack. Shortly after, Qatari liquified natural gas company RasGas suffered a malware attack that had the same modus operandi. In his speech, Panetta said that Iran is suspected to be behind those attacks as retaliation for US sanctions.

Meanwhile, Israeli Prime Minister Benjamin Netanyahu recently warned that “there have been increasing efforts to carry out cyberattacks on Israel's computer infrastructure.”

Citing the recent rash of financial sector hacks, Panetta said that the rising threat has led the US to consider preemptive action. The military "has developed the capability to conduct effective operations to counter (cyber) threats to our national interests,” he noted.

That is something that security researchers believe is already being played out on the world stage. "If we look for offensive cyberattacks that have been linked back to a known government, we mostly find attacks that have been launched by United States, not against them,” said Mikko Hypponen, chief research officer at F-Secure. “So far, antivirus companies have found five different malware attacks linked to operation 'Olympic Games' run by US and Israel. When New York Times ran the story linking US Government and the Obama administration to these attacks, White House started an investigation on who had leaked the information. Note that they never denied the story. They just wanted to know who leaked it.”

The US and Israel are widely believed to be behind the Stuxnet Trojan in 2010, which took aim at Iran’s nuclear program by invading and compromising a uranium enrichment facility at Nantanz, shutting down centrifuges. That gambit was likely state-sponsored, intelligence sources have said, with the New York Times first linking the development of the virus to Israeli and US governments.

The policy could well backfire, Hypponen warned. “As [the] United States is doing offensive cyberattacks against other countries, certainly other countries feel that they are free to do the same,” he said. “Unfortunately, the United States has the most to lose from attacks like these."

State-sponsored attacks are unlikely to wane. Kaspersky Lab researchers say that recently, government-sponsored cyberwarfare is on the rise, thanks to deployment of malware like Flame, Duqu, Gauss and Stuxnet, and a newly identified cyber-espionage threat, miniFlame.
 

 

This article is featured in:
Industry News  •  Internet and Network Security  •  IT Forensics  •  Malware and Hardware Security  •  Public Sector

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×