The Iranian worm is not so new and has damaged the systems of other countries

An expert in information warfare and network intelligence, cools the headlines: "The Iranian worm was discovered already five months ago and damaged the systems of other countries before it damaged Iran"

Shay Blitzblau, CEO of Magellan Information Protection Technologies. Credit: People and Computers
Shay Blitzblau, CEO of Magellan Information Protection Technologies. Credit: People and Computers

"The Stuxnet computer worm that was discovered in the Iranian reactor in Bushehr is a hostile code that has been known to the community of information security experts for 5 months. The worm affected computers all over the world, including in the USA, India, France, Cuba, Pakistan, Russia and Belarus, but only when it affected computers in Iran did the echo arise the media about it" says Shay Blitzblau, CEO of Magellan Information Protection Technologies, an expert in information warfare and international network intelligence.

According to Blitzblau: "Until July 19, 2010, both the US Cyber ​​Warfare Agency and Microsoft published reports on the subject and explanations on how to deal with the hostile code. At the beginning of August 2010, thousands of computers in the world were already infected. Since the hostile code is relevant to industrial controllers, most of the entities infected were national infrastructures or local essential infrastructures. The rate of infection was no different from the rate of viruses and other network worms we know."

Blitzblau rejects the claim that it is necessarily international organizations for information warfare that developed the worm and says, "a technical analysis of the Stuxnet code by Magellan experts shows that it is a well-planned hostile code with sophisticated functions, but at the same time it lacks so many elements that it is doubtful that the author acted from a method and deepening techno-intelligence worldviews. The code lacks many network-intelligence embedding components, Due to information security issues, only a few can be mentioned: the communication of the code is based on a standard communication protocol that is not encrypted, there are no traffic hiding components and the backdoor is simple The code requires three simple and readily available means: Siemens software and an industrial controller that can be bought on ebay and in almost any computer lab, familiarity with SCADA systems and knowledge of SQL".

So how did the media spin around the worm come about? According to Blitzblau, "on September 13, a researcher named Ralph Langer from a small company in Hamburg published news updates and estimates that a country was behind the planting of the worm in Iran. A few days later, Langer presented his analysis of the worm at a large conference in Washington and hence the story about the worm being sent by countries Hitting the reactor in Iran gained incredible momentum and appeared in the media around the world."

"There is no doubt that before us is a smart hostile code, but information security experts all over the world are raising an eyebrow in the face of the technical 'miracle' that has been discussed and known to everyone for months, and in particular in the face of the late arson that is making waves all over the world to which stories of imaginary fabrics are linked," concludes Blitzblau.

To the Magellan Information Protection Technologies website

13 תגובות

  1. Yes, read the Symantec report and decide who to believe. Because if Cinematec are right, the gentleman upstairs doesn't understand anything about his life.
    And for those who don't understand the response above, his site was not only hacked, but the hacker gained administrator (ROOT) access to the server...

  2. What an expert. I just tried to go to Magellan's website and I got the following caption

    Server got rooted by Albanian Hacking Crew

    X-n3t – **RoAd_KiLlEr** – TheDenny` – EaglE EyE – The_1nv1s1bl3

    uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel)

    Special greetz : ..::arSh::.. & TheKabuS (my dear friends

  3. I read the analysis by Symantec and there, contrary to the opinion of the expert in the article above, it says:
    W32.Stuxnet has gained a lot of attention from researchers and media recently. There is a good reason for this. Stuxnet is one of the most complex threats we have analyzed
    As someone who works with programmable industrial controllers (PLC), I have never before come across a worm that tries to "handle" such industrial controllers.
    Two other interesting things that caught my attention are:
    1. The highest infection rates after Iran are Indonesia, India, Azerbaijan, Pakistan and Malaysia. (p. 6 of the report) In my opinion, this is the smoking gun of the organizations and industries that support Iran and that work closely with it. My grandfather said about this that if you go to bed with dogs, you should not be surprised to wake up with bedbugs....
    2. Another interesting thing is that the worm checks if the date of 24/06/2012 has passed. If so, the computer is not infected (p. 14 of the report). Does anyone have a guess as to why?

  4. For the theory...:
    What do you think about a nice and innocent worm that is put to sleep by order in all kinds of places in the world, and in one country its mutation develops at an amazing rate and penetrates every senior computer and generates names in it?....

  5. Yes yes, we are only irritating the dwarf, and he says to himself "wait wait" (and we have something to watch out for and what to expect)

  6. Koko, there is a difference between 'the virus was introduced into Iran...' and between 'the virus also penetrated into Iran but also into many other countries...'
    The argument of the author of the article is very simple. The destruction did not specifically target Iran, and secondly, it is not so sophisticated, so it could have been written by Hecker and not necessarily by Medina.

  7. Oh and how did I forget
    Link to the website at the end of the article
    What a beautiful advertisement

    It really reduces the credibility of a site if it publishes news that is funded by interested parties with financial interests

  8. It should be noted that this is a self-proclaimed expert and if the worm is six months old or 10 years old (what if 6 months is new) but it doesn't matter
    What does matter is that a virus was introduced into sensitive systems in Iran
    What does matter is that it is a virus that attacks miners' management systems
    What does matter is that he infected a lot of important computers in Iran

Leave a Reply

Email will not be published. Required fields are marked *

This site uses Akismet to filter spam comments. More details about how the information from your response will be processed.