Iran Threatens Retaliation For Cyber Attack At Nuclear Site

Iran say it will retaliate against any country that carries out cyber attacks on its nuclear sites, after there was a fire at its Natanz plant which Iranian officials say may have been caused by cyber sabotageThe Natanz uranium-enrichment site, much of which is underground, is one of several Iranian facilities monitored by inspectors of the International Atomic Energy Agency (IAEA), the UN nuclear watchdog.

Iran's Atomic Energy Organisation initially reported an "incident" had occurred at Natanz, located in the desert in the central province of Isfahan.

Iranian government sources said the cause of the "incident" at the nuclear site had been determined, but "due to security considerations" it would be announced at a convenient time. It later published a photo of a one-storey brick building with its roof and walls partly burned. A door hanging off its hinges suggested there had been an explosion inside the building.

"Responding to cyber-attacks is part of the country's defence might. If it is proven that our country has been targeted by a cyber-attack, we will respond," civil defence chief Gholamreza Jalali told state TV. An article by state news agency IRNA addressed what it called the possibility of sabotage by enemies such as Israel and the United States, although it stopped short of accusing either directly.

Iranian officials have sought to downplay the fire, calling it only an “incident” that affected an “industrial shed.”
However, a released photo and video of the site broadcast by Iranian state television showed a two-story brick building with scorch marks and its roof apparently destroyed.

In 2010, the Stuxnet computer virus, which is widely believed to have been developed by the United States and Israel, was discovered after it was used to attack the Natanz facility. Iranian officials said Israel could have been behind the Natanz incident, but offered no evidence.

Asked about recent incidents reported at strategic Iranian sites, Israeli Prime Minister Benjamin Netanyahu told reporters: "Clearly we can't get into that." The Israeli military and Netanyahu's office, which oversees Israel's foreign intelligence service Mossad, did not immediately respond to Reuters queries on Friday.

The International Atomic Energy Agency (IAEA) said the location of the fire did not contain nuclear materials, and that none of its inspectors was present at the time. "The Agency has been in contact with relevant Iranian authorities to confirm there will be no impact on its safeguards verification activities, which are expected to continue as before," an IAEA said in a statement. 

Natanz is the centre-piece of Iran's enrichment program, which Tehran says is only for peaceful purposes. Western intelligence agencies and the IAEA believe it had a coordinated, clandestine nuclear arms program that it halted in 2003.

Iran cut back nuclear work in exchange for the removal of most global sanctions under an accord reached with six world powers in 2015, but has reduced compliance with the deal's restrictions since the United States withdrew in 2018.

PressTV:    Yahoo:        Yahoo:        Yahoo

You Might Also Read: 

Iran Fingered For Attack On Israeli Water Infrastructure:

 

« Russian Ransomware Group Hacked US News Company
Some Hackers Earn $2m A Year »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

Future of Cyber Security Europe

Future of Cyber Security Europe

Future of Cyber Security Europe is a European wide event examining the latest cyber security strategies and technologies.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

Nexis

Nexis

Nexis GmbH is a German IT security company specializing in IAM, access control, and risk management.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

C2SEC

C2SEC

C2Sec provides an innovative analytics platform that assesses and quantifies cyber risks in financial terms based on combining patented big data, AI, and cybersecurity technologies.

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

Guardian Angel Cyber

Guardian Angel Cyber

Guardian Angel Cyber, is your trusted ally in safeguarding your digital assets and online presence.

CloudBees

CloudBees

CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.