Stuxnet infects 30,000 industrial computers in Iran: report

Sep 26, 2010
A general view of the reactor building at the Bushehr nuclear power plant in southern Iran in August 2010. Iranian officials said that the Stuxnet computer worm has infected 30,000 computers in Iran but has failed to "cause serious damage."

The Stuxnet computer worm has infected 30,000 computers in Iran but has failed to "cause serious damage," Iranian officials were quoted as saying on Sunday.

Some 30,000 IP addresses have been infected by Stuxnet so far in Iran, Mahmoud Liayi, head of the information technology council at the ministry of industries, was quoted as saying by the government-run paper Iran Daily.

Stuxnet, which was publicly identified in June, was tailored for Siemens supervisory control and data acquisition (SCADA) systems commonly used to manage water supplies, oil rigs, and other industrial facilities.

Stuxnet is able to recognize a specific facility's control network and then destroy it, according to German computer security researcher Ralph Langner, who has been analysing the , or malware.

Langner suspected Stuxnet's target was the Bushehr in Iran, where unspecified problems have been blamed for getting the facility fully operational.

Siemens, however, claims its software has not been installed at the Russian-built plant, and no Iranian official has hinted that nuclear facilities may have been infected by the malware.

"The worm has not been able to penetrate or cause serious damage to government systems," telecommunications minister Reza Taqipour was quoted as saying by the Iran Daily.

"No serious damage to industrial systems (by Stuxnet) have been reported in the country," he added.

According to the paper, another telecommunications official, Saeed Mahdiyoun, said "teams of experts had begun to systematically eliminate the virus."

"It is likely a (foreign) government project," given its complexity, Liayi added without giving further details.

Iran Daily cited various experts who suggested the United States and Israel were behind the malware, evoking the "West's electronic warfare against Iran."

An Iranian youth browses at an internet cafe in the city of Hamadan, 2009. Iranian officials said that the Stuxnet computer worm has infected 30,000 computers in Iran but has failed to "cause serious damage."

Liyai said industries were currently receiving systems to combat Stuxnet, while stressing that Iran had decided not to use anti-virus softwares developed by Siemens because "they could be carrying a new version of the malware."

"When Stuxnet is activated, the industrial automation systems start transmitting data about production lines to a main designated destination by the virus. There, the data is processed by the worm's architects and then engineer plots to attack the country," Liayi said.

The worm has been found lurking on Siemens systems mostly in India, Indonesia, Pakistan, but the heaviest infiltration appears to be in Iran, according to software security researchers.

Iran's nuclear programme is at the heart of a conflict between Tehran and the West, which suspects the Islamic republic is seeking to develop atomic weapons under the cover of a civilian drive.

Iran denies the allegation and has pressed on with its nuclear programme despite four sets of UN Security Council sanctions.

Explore further: New approach to online compatibility

Related Stories

Iran aims to send man into space in nine years

Jul 23, 2010

President Mahmoud Ahmadinejad said Friday that Iran plans to send a man into space by 2019 as a blow to Western powers pressing Tehran over its nuclear programme, state news agency IRNA reported.

Iran to unveil new home-built satellite: report

Dec 24, 2009

Iran will unveil a new home-built satellite in February, a newspaper reported Thursday, amid Western concerns that Tehran is using its nuclear and space industries to develop atomic and ballistic weapons.

Russia: Iran's nuclear plant to get fuel next week

Aug 13, 2010

(AP) -- Russia will load fuel into Iran's first nuclear power plant next week despite U.S. demands to prevent Iran obtaining nuclear energy until the country proves that it's not pursuing a weapons capacity, ...

Recommended for you

New approach to online compatibility

16 hours ago

Many of the online social networks match users with each other based on common keywords and assumed shared interests based on their activity. A new approach that could help users find new friends and contacts with a greater ...

Most internet anonymity software leaks users' details

Jun 29, 2015

Virtual Private Networks (VPNs) are legal and increasingly popular for individuals wanting to circumvent censorship, avoid mass surveillance or access geographically limited services like Netflix and BBC ...

WikiLeaks says NSA spied on French business

Jun 29, 2015

WikiLeaks has released documents that it says show that the U.S. National Security Agency eavesdropped on France's top finance officials and high-stakes French export bids over a decade in what the group called targeted economic ...

Google gets extended deadline to answer EU case

Jun 29, 2015

Brussels has given Google an extension until mid-August to answer an anti-trust case alleging that the tech giant abuses its search engine's market dominance, a company spokesman said Monday.

Facebook opens first Africa office

Jun 29, 2015

Facebook announced Monday it had opened its first African office in Johannesburg as part of its efforts "to help people and businesses connect" on the continent.

User comments : 4

Adjust slider to filter visible comments by rank

Display comments: newest first

5 / 5 (1) Sep 26, 2010
A foreign government??? Nah!! It's probably some kid in Holon with some time on his hands!!
1 / 5 (1) Sep 26, 2010
It rains in Iran :US or Israel conspiracy

Amadinejad slips and fall: US or Israel conspiracy
not rated yet Sep 27, 2010
If you don't know where this worm came from, you are struggling with either dementia or autistic spectrum disorder. Stop eating so many cheeseburgers, America, it's making you dumb.
not rated yet Oct 04, 2010
I'm really surprised it took this long for such threats to emerge. Needless to say, these are the sort of viruses that can do much more direct damage to people and infrastructure.

So word to the wise, put a freaking password on your MODBUS, SCADA systems and certainly don't put them on the internet.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.