Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Israel top suspect behind new cyber menace
by Staff Writers
Beirut, Lebanon (UPI) May 31, 2012


disclaimer: image is for illustration purposes only

Israel is widely seen as the prime suspect in the "most complex" cyberattack by a data-gulping computer worm known as W32.Flame that has hit Iran's oil industry and other targets in the Middle East in recent days.

And Israeli leaders are doing little to discourage speculation that the Jewish state's newly established cyber command is the main culprit behind the attack that some analysts say marks a new era in cyberwarfare.

Israeli Deputy Prime Minister Moshe Yaalon, who's also minister for strategic affairs, hinted Monday that Israel was involved in the Flame attacks that in April targeted Iran's oil industry, already battered by international sanctions, as well as computers in Saudi Arabia, the Israeli-occupied West Bank, Sudan and Egypt.

"Anyone who sees the Iranian nuclear threat as a significant threat," he said in Tel Aviv, will find "it's reasonable to take various steps, including these, to hobble it.

"Israel is blessed as a country rich in high-tech and these tools that we take pride in open up all kinds of opportunities for us."

Israeli Prime Minister Binyamin Netanyahu set up a National Cybernetic Task Force in July 2011 tasked with developing defenses to protect the country's strategic infrastructure from Internet-based attacks.

The following month, Israel's military establishment formed a cyberdefense command within the C4I Directorate -- command, control, communications, computers and intelligence -- under an army colonel who formerly headed Matzov, the Hebrew acronym for the Center for Encryption and Information Security.

At the center of this highly classified network is Unit 8200 of Military Intelligence, a super-secret signals intelligence and codebreaking unit that's understood to have been given responsibility for all the Jewish state's cyberwar capabilities.

The Jerusalem Post reported in May 2011 that Unit 8200 was suspected of playing a key role in developing the Stuxnet worm that Tehran said in September 2010 had disrupted its nuclear program and high-value industrial facilities.

Computer experts generally agreed at the time that the mysterious Stuxnet worm, then the most sophisticated malware system ever detected, could only have been put together by the intelligence services of Israel or the United States or another combination of states.

The German newsmagazine Der Spiegel quoted sources familiar with the Stuxnet operation as insisting it was a "a blue-and-white operation … a purely Israeli operation,' referring to Israel's national colors.

The sources said a secret Israeli unit, most likely Unit 8200, was responsible for programming much of the Stuxnet code.

U.S. sources say Israel's Dimona nuclear complex in the Negev Desert south of Tel Aviv was used as a testbed for the Stuxnet virus by a U.S.-Israeli team before it was unleashed against Iran June 22, 2009.

The Iranians since then have been hit by other worms dubbed Stars and Duqu, and have apparently struck back against Israel with their own cyber weapons. In November, Israel's military and intelligence services Web sites crashed for several hours in what appeared to be cyberattack.

A few days earlier, Anonymous, a shadowy group of global hackers and online activists, had threatened to hit Israel to retaliate against its economic blockade of the Gaza Strip.

But whether or not Anonymous was responsible, the Israelis braced for Iranian cyberattacks.

Yiftach Ron-Tal, a reserve major general and chairman of the state-owned Israel Electric Co., warned: "We need to be prepared for the possibility that critical infrastructure will be paralyzed."

The Iranians are believed to have built up a sizeable cyberwarfare network to counter what they see as a concerted Israeli-U.S. effort to cripple their nuclear project through a multilayered campaign of disruption and assassination.

Kapersky Labs, the Russian Internet security company that discovered W32.Flame, says it's the most complex and sophisticated cyberweapon it's expected have come across.

"The Flame malware looks to be another phase in this war," said the group's co-founder, Eugene Kapersky.

Where the ground-breaking Stuxnet malware damaged industrial controls, the Flame virus is designed to spy and gather intelligence by stealing programs. It can even switch on microphones attached to a computer to record conversations, experts say.

"This is a fully featured spying program that's grabbing anything it can," said Orla Cox of Symantec, a leading computer security company.

We suspect there's some nation state involvement because of the funding you'd need to have behind this."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Flame virus a new age cyber spy tool
San Francisco (AFP) May 30, 2012
The Flame computer virus that smoldered undetected for years in Middle Eastern energy facilities confirmed fears that the world has entered a new age of cyber espionage and sabotage. Internet defenders on Wednesday were tearing into freshly exposed Flame malware (malicious software) that could be adapted to spread to critical infrastructures in countries around the world. While the compo ... read more


CYBER WARS
Rafael seeks to boost range of Iron Dome

Lockheed Martin Delivers Core Structure for Fourth SBIRS Satellite

NATO activates missile shield, reaches out to Russia

NATO activates missile shield despite Russian anger

CYBER WARS
Akash missile fails a routine test flight

Pakistan tests nuclear-capable missile

Taiwan deploys anti-China missiles: report

Rafael seeks missile shield for helicopters

CYBER WARS
Northrop Grumman, L-3 MAS to Join Forces on Unmanned System for Canadian Security

US drones kill 9 militants in Pakistan: officials

AeroVironment Introduces Digital Wasp AE Small Unmanned Aircraft System

A new imaging system produces 3D models of monuments using unmanned aircraft

CYBER WARS
New Mobile Antenna from ASC Signal Designed For Rapid Deployment by Defense and Commercial Users

Researchers Improve Fast-Moving Mobile Networks

Second AEHF Military Communications Satellite Launched

Fourth Boeing-built WGS Satellite Accepted by USAF

CYBER WARS
Raytheon unveils reconnaissance system prototype to Canadian Army

Congress to spend more on tanks than US military wants

Pre-qualified modular app ready platform gets apps promptly to the battlefield

Raytheon awarded $57.8 million Phalanx contract

CYBER WARS
India's army chief retires after clash with govt

BAE Systems says to cut 620 jobs in Britain

Treatment of Vietnam vets 'a national shame': Obama

$3B in training deals for European firms

CYBER WARS
China urges US to respect its interests in Asia

Japan must lock door against China: Tokyo governor

Commentary: Alarm bells in the U.S.

Obama's Memorial Day message: troops are coming home

CYBER WARS
Wyss Institute develops nanodevice manufacturing strategy using DNA 'building blocks'

First direct observation of oriented attachment in nanocrystal growth

Stunning image of smallest possible 5 rings

Sensing the infrared: Researchers improve IR detectors with single-walled carbon nanotubes




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement