Iran’s Nuclear Site Attacked Following Attempts To Hack Israel's Water System

There have been cyber attacks on Israel’s water treatment plant from Iran, and an attack response from Israel on an Iranian Nuclear plantWhen Iran cyber attacked Israel’s water supply system on April 24 and 25, it did more than just shut down computers and disrupt water system operations.  

The water facility attack was intended to release large amounts of poisonous chlorine into Israel’s water delivery infrastructure, potentially poisoning tens of thousands of Israelis. Now, Israel is thought to be responsible for two major explosions at Iranian facilities, one related to uranium enrichment, the other for missile production.

Some Iranian officials have blamed possible cyber attack similar to the previous Stuxnet sabotage of their nuclear facilities.  Newly released satellite imagery showed the damage from what Iranian authorities attributed to a fire at the Natanz nuclear facility was far more extensive that previously disclosed.

It is thought n Israeli cyber attack caused a fire and explosion at the largely underground Natanz nuclear enrichment facility and in a separate attack Israeli F-35 stealth jets bombed a site located in the area of Parchin, which is believed to house a missile production complex, an area of particular concern for Israel, due to increasing sophistication of missiles and rockets in the arsenals of Iranian allies in Lebanon and Gaza. Neither of these claims were confirmed by Israeli officials.

The alleged Israeli attacks also came amid an ongoing campaign of so-called maximum pressure by the United States in the form of heavy sanctions on Iran and Iranian officials.

Iranian Cyber Attack On Israel’s Water Supply 

Israel successfully thwarted a major cyber attack against its water systems last month, widely thought to have been the work of  Iran. The assault was a "synchronised and organised" attempt at disrupting key national infrastructure, cyber chief Yigal Unna said in a video address to CyberechLive Asia, a digital international cyber conference.

The water facility attack was to release large amounts of poisonous chlorine into Israel’s water delivery infrastructure, potentially poisoning tens of thousands of Israelis. It may indicate a growing threat of cyber-attacks throughout the world.

Researchers at FireEye concluded that the malware developed for this kind of attack came out of Russia and specifically from the Central Scientific Research Institute of Chemistry and Mechanics, a Russian government-owned technical research institution in Moscow.

The first known use of the malware was against a petrochemical facility in Saudi Arabia in 2017. It would appear the Russia-developed cyber-weapon was shared with Iranian government hackers. The attack was routed through servers in Europe and the United States to try to hide its origin. 

These rising attacks are attributed by US officials to international actors like China, Russia, and Iran. Covid-19-linked cyber-attacks reflect the huge competition among global pharmaceutical companies for windfalls and market share if a successful vaccine is developed. 

A growing concern in the US is that foreign equipment, mainly coming from China, can have built-in back doors or include malware buried in the code of the firmware or software that comes with the hardware. 

The Israeli security cabinet decided on the subsequent port attack instead of stronger military action. Israel’s response would likely have been far harsher had the Iranian attack accomplished its poisonous objective. 

The US probably would likewise react harshly if a critical infrastructure attack did any real and lasting damage and resulted in civilian casualties. No one can say for sure when, or if, that will happen but the potential for a cyber-driven military confrontation is rising.

Military Aerospace:       Asia Times:         Deutsche Welle:     Times of Israel:

You Might Also Read: 

Do Not Underestimate Iran’s Cyber Threat:

 

« Hackers Extort $1.14m From University of California
Journalist’s Phone Hacked Using An ‘Invisible’ Technique »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Leonardo

Leonardo

Leonardo (formerly Finmeccanica) is a global high-tech company in Aerospace, Defence, Security & Information Systems including Cybersecurity & ICT solutions.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

LTIMindtree

LTIMindtree

LTIMindtree is a new kind of technology consulting firm. We help businesses transform – from core to experience – to thrive in the marketplace of the future.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

11:11 Systems

11:11 Systems

11:11 Systems synchronizes every aspect of network services for your business. Build your network with the industry’s most trusted expert skills.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

Robust Intelligence

Robust Intelligence

Robust Intelligence enables enterprises to secure their AI transformation with an automated solution to protect against security and safety threats.

TELUS

TELUS

TELUS provide Canadian businesses with the services and solutions they need to securely thrive in a digital world. Partner with a cybersecurity leader you can rely on.

TeamSystem

TeamSystem

TeamSystem is a leading tech company in the market for digital business management solutions for companies and professionals.