Over the weekend, an Iranian government agency boasted that they’d successfully blocked a cyberattack that had targeted the networks of the Oil Ministry and the National Iranian Oil Company (NIOC).
After the proclamation was made early Saturday, the head of IT at the NIOC, Ahmad Tavallaei, posted to the Iranian Oil Ministry’s website that a technical problem – not a cyberattack – was the cause of network problems, which eventually led to a temporary shutdown.
In April 2012, the NIOC took several systems offline after malware was detected inside the control systems of Kharg Island oil terminal, which handles the majority of Iran’s crude oil exports.
Last October, Mohammad Reza Golshani, head of the communications and IT of a subsidiary of the NIOC – the NIOOC (Nat’l Iranian Offshore Oil Company), blamed Israel for cyberattacks against his company, bragging that they were defeated before any serious damage could be done.
Iran often reports to state media that they have stopped a cyberattack launched by the west – Israel or the U.S., but as this weekend’s report shows, often their claims do not match the facts. Still, since it was revealed that the U.S. (and allegedly Israel) was behind Stuxnet and Duqu, Iran can cry wolf all they want and still have a somewhat valid argument for their claims.
The last time they used Stuxnet in context was on Christmas Day 2012. According to ISNA, the state’s media agency, Ali Akbar Akhavan said that a virus “penetrated some manufacturing industries in Hormuzgan province,” but progress was halted after Iran gained some help from “skilled hackers.”
The Christmas attack had occurred over several months, Akhavan noted, and it used malware that was “Stuxnet-like.” One of the targets of the Christmas attack was Bandar Abbas Tavanir Co.
According to the company’s website, they oversee electricity production and distribution in Hormuzgan and other adjacent provinces. This led Iran to speculate and blame the west for additional infrastructure attacks.
Interestingly, once the Christmas Day attack was carried by international media, Iran attempted to walk back their claims, and blamed inter-agency confusion for misleading statements.
More from Steve Ragan
- Anonymous Claims Attack on IP Surveillance Firm Brickcom, Leaks Customer Data
- Workers Don’t Trust Employers with Personal Data: Survey
- Root SSH Key Compromised in Emergency Alerting Systems
- Morningstar Data Breach Impacted 184,000 Clients
- Microsoft to Patch Seven Flaws in July’s Patch Tuesday
- OpenX Addresses New Security Flaws with Latest Update
- Ubisoft Breached: Users Urged to Change Passwords
- Anonymous Targets Anti-Anonymity B2B Firm Relead.com
Latest News
- Many VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- Fraudulent “CryptoRom” Apps Slip Through Apple and Google App Store Review Process
- US Downs Chinese Balloon Off Carolina Coast
- Microsoft: Iran Unit Behind Charlie Hebdo Hack-and-Leak Op
- Feds Say Cyberattack Caused Suicide Helpline’s Outage
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
