Switzerland & Austria Investigate Claims of Electronic Spying at Iran Talks

kaspersky.jpg?itok=5WgBTvqp

Kaspersky says Iran talks spyware masqueraded under Foxconn name.

Prosecutors in Switzerland and Austria have launched investigations into allegations that a computer virus was used to spy on the recent high-level Iran nuclear talks. Swiss police  reveal raids last month, after a security company said Dugu 2.0 spy virus appeared to have hit hotels that hosted diplomats at nuclear negotiations. Prosecutors did not say which venues were targeted.

It comes shorly after a top Russia-based software security company, Kaspersky, said a spy virus dubbed Dugu 2.0 appeared to have compromised computer networks in at least three Swiss hotels that had been host to senior diplomats from Iran and the six major powers – the US, China, Russia, Britain, France and Germany – of the group known as the P5+1. 

The office of the Swiss attorney general announced that police had last month raided unnamed locations in Geneva, where recent talks took place, and confiscated computer equipment and IT material. 
The allegations have surfaced at a critical moment in the ongoing nuclear talks ahead of an end of June deadline for a comprehensive agreement. 

An investigation was launched following those raids, federal Swiss prosecutors said, without mentioning which venues had been targeted. Swiss hotels that have hosted the negotiations in recent months include the Palais Wilson and Intercontinental in Geneva, the Beau Rivage in Lausanne and the Royal Plaza in Montreux. 
“The aim of this raid was on one hand to gather evidence and to on the other verify if information systems had been infected by malware,” the Swiss attorney general’s office said, according to AFP. 

Austria, which also hosted the Iranian nuclear negotiations, confirmed on Thursday it was investigating separately as well. Vienna’s Palais Coburg hotel has been a frequent venue for the ongoing talks. “The federal office for the protection of the constitution and counter-terrorism is aware of the information and is reviewing it,” said a Vienna-based government spokesman.

Although it is not clear who has carried out the recent cyberattacks, Dugu is related to Stuxnet, a computer worm, which is believed, to have been designed by Israel to sabotage Iran’s uranium enrichment programme. Stuxnet hit Iran’s nuclear facilities in 2010. Iranian authorities initially played down its impact but eventually admitted the malware had damaged the nuclear programme.

Israel, which stands firmly opposed to a comprehensive deal with Iran and the lifting of sanctions as a result, has denied any links to the recent attacks. “The international reports of Israeli involvement in the matter are baseless,” said Tzipi Hotovely, Israel’s deputy foreign minister. “What is much more important is that we prevent a bad agreement where at the end of the day we find ourselves with an Iranian nuclear umbrella.”

In March, and in unusual comments for US administration officials, the Wall Street Journal cited senior American officials accusing Israel of spying on the nuclear talks and using the intelligence gathered to persuade sceptics in Congress to undermine the talks. 

Reza Najafi, Iran’s ambassador to the Vienna-based UN nuclear agency, the IAEA, said the news about the cyberattack was not surprising to Iran.


“You know that there are enemies of these talks and they will do whatever they can, so it’s not a surprise to us,” he said in reaction to the news. “We continue to take precautionary measures not to let any details of the discussion go to the public.”
Kaspersky said in a statement published on its website that it believed the malware included “some unique and earlier unseen features” which made its creators feel confident no traces could be left. The carefully planned and sophisticated nature of the attacks led the security firm to believe that a nation state sponsored the campaign. 

“Kaspersky Lab researchers discovered the company wasn’t the only target of this powerful threat actor. Other victims have been found in western countries, as well as in countries in the Middle East and Asia,” the statement read.
“Most notably, some of the new 2014-2015 infections are linked to the P5+1 events and venues related to the negotiations with Iran about a nuclear deal. The threat actor behind Duqu appears to have launched attacks at the venues where the high-level talks took place.” Symantec, a rival security company, has confirmed Kaspersky’s findings.

Iran and the west reached a tentative agreement on the framework of a comprehensive deal in April. Under its terms, restrictions will be placed on Iran’s enrichment of uranium so that it is unable to use the material in nuclear weapons.

In return, the US and EU will terminate all nuclear-related economic sanctions against Iran once the UN nuclear agency confirms that Iran has complied.

Guardian

 

« Hackers Target Internet Address Bug to Disrupt Sites
The Robots Taking Your Job Could Get You Killed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Advenica

Advenica

Advenica develops, manufactures and sells innovative cybersecurity solutions for encryption and secure information exchange.

Zentera Systems

Zentera Systems

Zentera's CoIP (Cloud over IP) solution offers enterprise-grade networking and security for the emerging cloud ecosystem.

IoT Now

IoT Now

IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next gen IoT services.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

Cyber Talents

Cyber Talents

CyberTalents is on a mission to close the gap of cyber security professionals shortage across the globe.

Accolite Digital

Accolite Digital

Accolite is an innovative, design thinking software company that guarantees seamless digital experiences with maximum results.

Stratia Cyber

Stratia Cyber

Stratia Cyber is an independent, technology agnostic company providing high quality, pragmatic cyber security consultancy and expertise.

Silicon Labs

Silicon Labs

Silicon Labs are a leader in secure, intelligent wireless technology for a more connected world. We provide award-winning hardware and software security to help safeguard connected devices.

FortKnoxster

FortKnoxster

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

Commission Nationale de l'Informatique et des Libertés (CNIL)

Commission Nationale de l'Informatique et des Libertés (CNIL)

The mission of CNIL is to protect personal data, support innovation, and preserve individual liberties.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

TraitWare

TraitWare

The TraitWare mission is to increase user and company security while simplifying access to digital and physical resources through the elimination of the need for usernames and passwords.