Iranian official Mohammad Reza Golshani, head of the communications and IT of the NIOOC (Nat’l Iranian Offshore Oil Company), said that Israel launched a cyber attack against his company, and was soundly defeated before it could cause any damage.
Lack of proof that it was Israel aside, Golshani told local media that investigations concluded that Israel used different IP addresses, from locations in China and other parts of the world, in an attempt to mask their actions – conveniently ignoring that anyone else, anywhere in the world, could do the same.
"Fortunately, due to the separation of the internet network from our intranet network, the company remained safe," Golshani said.
In April, SecurityWeek reported on the news that the NIOC (National Iranian Oil Company) took computer systems offline after malware was detected inside the control systems of Kharg Island oil terminal, which handles the majority of Iran’s crude oil exports.
In related news, the Iranian Intelligence Minister, Heidar Moslehi, announced this week that Iran is involved in a sustained cyber war against state enemies.
"These threats are posed every day and the intelligence apparatus counters and obviates enemy's actions in the cyber space every day," Moslehi told reporters in Tehran.
"The Islamic Republic is so powerful in the cyber space that leaders of the arrogant powers admit and acknowledge our country's successes as well."
Israel has remained silent on the accusal.
“Iran periodically reports attacks on government, nuclear, oil and industrial targets, blaming Israel and the United States. Israel has done little to deflect suspicion that it uses viruses against Iran,” says the AP wire reports.
Thanks to New York Times chief Washington correspondent, David Sanger, Israel and the U.S. cannot deny the use of malware outright, as they were linked to Stuxnet and Duqu.