recommended reading

‘AC/DC virus’ attacks Iranian nuke plant; DHS issues alert to U.S. industry

The Australian rockers in Norway in 2008.

The Australian rockers in Norway in 2008. // Sara Johannessen/AP file photo

This story was updated to include a comment from cyber expert Mikko Hypponen.

A supposed Iranian scientist emailed a world-renowned cybersecurity researcher to report a virus that blared music by the Australian rock band AC/DC while stopping equipment at the Natanz nuclear plant -- one day before America’s cyber emergency team issued two warnings about similar attacks.

The U.S. Industrial Control Systems Cyber Emergency Response Team alerts alluded to Siemens software exploits resembling Stuxnet -- the virus that crippled Natanz’s centrifuges in 2010.

There was “some music playing randomly on several of the workstations during the middle of the night with the volume maxed out. I believe it was playing 'Thunderstruck' by AC/DC,” reads one email from the Iranian that Mikko H. Hypponen, chief research officer at antivirus firm F-Secure, posted to his blog on Monday.

The scientist began the note by stating, “I am writing you to inform you that our nuclear program has once again been compromised and attacked by a new worm with exploits which have shut down our automation network at Natanz and another facility Fordo near Qom.”

The hackers had access to the nuclear program’s virtual private network, the Iranian added. “The automation network and Siemens hardware were attacked and shut down,” said the scientist, who admitted knowing little about cyber issues.

Hypponen said he didn’t know what to make of the messages, three of which arrived on Sunday. But he was able to confirm that the purported researcher was sending and receiving emails from within the Atomic Energy Organization of Iran.

On Monday, ICS-CERT, part of the Homeland Security Department, announced that Siemens has released an update to fix a “hijacking vulnerability” reported by the German firm. If not resolved, an attacker could abuse the flaw to meddle with systems controlling critical operations in the energy, water and chemical sectors, among other industries, according to ICS-CERT.

The Siemens threat described in the advisory works by overriding a file collection, called a Dynamic Link Library, that performs functions so software programs load the attacker’s dangerous operations instead of the legit preset ones. So-called DLL hijacking is made possible when developers do not instruct software programs where to search for the correct file library.

A separate notice distributed the same day cautioned industries about a weakness that “allows an attacker to gain unauthorized access” by using default logins “to read from or write to files and settings on the target system.”

On Wednesday morning, Hypponen told Nextgov he is "quite sure” the cyber incidents reported by the Iranian scientist and ICS-CERT are not related.

The Thunderstruck strike – if real -- is one of several computer infections aimed at Iran. In June, the New York Times reported that America and Israel united in slipping Iran the Stuxnet virus to sabotage its nuclear aspirations. Around the same time, Kaspersky Labs uncovered a behemoth malicious code called Flame that has been exploiting computers in the Middle East to spy on activities there since before Stuxnet. That bug funnels all sorts of intelligence back to its handlers, including screenshots, audio and documents.

Malware that resembles a slipshod Flame, called Mahdi, was discovered probing computers in Iran and countries worldwide earlier in July. Unlike the discreet Flame, Mahdi -- a word for the Islamic messiah -- tricks targeted users into, among other things, opening an infected email attachment that appeals to their tastes -- such as a news article about Israel’s plan to jam Iranian emergency communications.

Threatwatch Alert

Spear-phishing

Google Chrome Update Addresses Super Sneaky URL Trick

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.