A
very convenient conclusion. There are so many groups that have it in
for the United States that it could be anyone with the sophistication
and ability.
No doubt, at all, that this will be used to introduce even more repressive measures.
Iran
Blamed for Cyberattacks
U.S.
Officials Say Iranian Hackers Behind Electronic Assaults on U.S.
Banks, Foreign Energy Firms
WSJ,
12
October, 2012
Iranian
hackers with government ties have mounted cyberattacks against
American targets in recent months, escalating a low-grade cyberwar,
U.S. officials say.
The
Iranian effort culminated in a series of recent attacks against U.S.
banks as well as electronic assaults this year on energy companies in
the Persian Gulf. The attacks bore "signatures" that
allowed U.S. investigators to trace them to the Iranian government,
the officials said.
The
hackers appear to be a network of fewer than 100 Iranian
computer-security specialists at universities and network security
companies in Iran, investigators said.
Iranian
officials didn't return a call seeking comment.
U.S.
officials said detailed evidence linking the attacks to Tehran is
classified. But Iranian hackers don't have the resources to mount
major attacks without the support and technical expertise of the
government, the officials said.
"These
are not ordinary Iranians," one senior U.S. official said.
Defense
Secretary Leon Panetta alluded to the Iranian cyberattacks in a
policy announcement this week on U.S. efforts to counter the threat.
He didn't directly finger Iran in these attacks, but said they mark
"a significant escalation." Mr. Panetta, in an address in
New York, outlined procedures being put into place to block such
attacks, identify attackers and retaliate, if necessary.
"They
have been going after everyone—financial services, Wall Street,"
said a senior defense official. "Is there a cyberwar going on?
It depends on how you define 'war.'"
The
attacks against U.S. banks were so-called denial of service attacks,
in which computers are programmed to bombard a particular website and
knock it off line. But investigators fear that they represent a first
step to more destructive electronic assaults, which already had been
mounted on a Saudi oil company.
The
attacks began early this year in what some officials surmised was
retaliation for harsh sanctions on Iran's oil and financial sectors,
imposed as part of an effort by the U.S. and its allies to halt
Tehran's nuclear program. Tehran denies Western charges that it is
seeking to use the nuclear program to develop atomic weapons.
The
Iranian effort may also be payback for a high-tech campaign against
Iran that involved the U.S., including the cybersabotage project
known as Stuxnet. That project targeted Iran's Natanz nuclear plant
with cyberattacks that caused a large proportion of its centrifuges
to spin out of control beginning in 2008.
U.S.
officials have long considered Iran as a second-tier cyberpower,
behind China, Russia, France, Israel and the United States. They now
are debating the extent to which Iran has the capability to damage
the financial system and other U.S. infrastructure.
Iran
has stepped up its cyber capabilities in recent years, spending at
least $1 billion on them since the beginning of this year, said Ilan
Berman, a Middle East expert at the American Foreign Policy Council.
The Pentagon spends about $3 billion a year on cyberdefenses.
Iran's
strategy has shifted from fortifying its cyberdefenses to developing
offensive cyberweapons, said Mr. Berman.
Defense
officials see the cyberattacks as part of a larger effort by Iran.
U.S. investigators allege Iran was behind an attack in July on
Israeli tourists in Bulgaria, the killing of a Saudi diplomat in May
in Pakistan, and the attempted assassination last year of the Saudi
ambassador in Washington. Iran has denied involvement in all the
incidents.
U.S.
banks were the first targets of attacks that were comparatively small
in scale, according to former U.S. officials.
The
attacks expanded to oil and gas companies in the Persian Gulf and
Middle East over the summer, then returned to U.S. banks with far
more potent attacks in recent weeks.
Three
more banks were hit this week, and each of those actions was preceded
by an Internet warning of an imminent attack.
"In
the last year, there's been a cyberwar going on in the Middle East,
and it's spilled over now" into America, a former U.S. official
said.
The
attacks began shortly after approval last December of a U.S. defense
bill that stepped up punitive sanctions. Iranian hackers initially
mounted potent, but smaller-scale denial of service attacks on a
group of U.S. banks in January, investigators say. The attackers were
testing the banks' responses to each assault and adjusting their
tactics to penetrate banks' defenses.
The
Tel Aviv Stock Exchange and the website of Israeli airline El Al also
came under attack that month, each suffering website outages.
Although an unknown hacker who claimed to be a Saudi took credit,
investigators are examining a possible Iranian role. The stock
exchange and airline acknowledged the attack at the time and said
they quickly recovered from it.
The
Iranian hackers re-emerged in July with an attack on the Saudi
Arabian Oil Co., known as Saudi Aramco, investigators believe. That
attack, wielding a virus called "Shamoon," destroyed data
on 30,000 computers. A group calling itself "Cutting Sword of
Justice" claimed responsibility for the attack, which U.S.
investigators believe was tied to Iran.
Aramco
acknowledged then that its computers had been taken down by an
electronic attack and said it expected more attacks in the future. It
said that it quickly recovered.
The
Aramco attacks set off alarms within the U.S. government as a shift
in tactics from stealing information to destroying it.
In
August, the target was Rasgas, a Qatari natural gas company that is a
leading global provider of liquefied natural gas. The attack, which
U.S. officials believe was carried out by the same Iranian network,
shut down its website and internal email servers. Rasgas also
acknowledged the attack and said it had no impact on operations.
In
September, the group redoubled its attacks on the U.S. financial
sector. It announced its plans in advance under the moniker "Qassam
Cyber Fighters," a previously unknown group.
On
Sept. 18, the group announced it would target Bank of America Corp.
It followed with several more attacks, including J.P. Morgan Chase &
Co., U.S. Bancorp, PNC Financial Services Corp., and Wells Fargo &
Co.
This
past week, the pre-announced attacks continued with Capital One
Financial Corp., COF -1.15% SunTrust Banks Inc., STI -3.38% and
Regions Financial Corp. RF -4.46% Following the announcements, the
attacks bombarded computers that run bank websites, slowing website
performance of some and taking others offline temporarily.
Bank
of America declined to comment and J.P. Morgan wouldn't confirm an
attack but acknowledged some customers had difficulty accessing its
website. PNC's president wrote an open letter to customers about the
attacks, which lasted about 31 hours. Wells Fargo and U.S. Bancorp
also acknowledged they had been hit.
With
this week's attacks, a Capital One spokeswoman said that some
customers were intermittently unable to log on to their accounts on
Oct. 9 due to a large volume of traffic. A SunTrust spokesman said
the company experienced increased traffic Oct. 10 that led to service
outages. A Regions spokesman said the company experienced
intermittent Internet service disruption on Oct. 11.
See
also -
No comments:
Post a Comment
Note: only a member of this blog may post a comment.