‘Stars’ Out for Iran’s Information Systems
Less than a year after reporting that its nuclear program was the target of never-before-seen computer worm Stuxnet, Iran announced this week that its systems had suffered yet another cyber attack.
Continuing to investigate the issue, Iranian security officials are calling the malicious new malware “Stars,” claiming that the worm aimed at efforts of espionage, meanwhile noting that it would take time to determine the virus’ precise purpose.
But the Stars’ attempt at destruction may have been minimal, according to Iran’s Mehr News, which spoke with the director of Iran’s Passive Defense Organization, Gholam-Reza Jalali.
“Certain characteristics about the Stars worm have been identified, including that it is compatible with the (targeted) system and that the damage is very slight in the initial stage, and it is likely to be mistaken for executable files of the government,” asserted the defense official.
And while he did not provide additional information on what facilities had been targeted in the latest attack, Jalali noted that the incident would be taken seriously, adding, “The Foreign Ministry might not have paid due attention to pursuing this issue legally. But it seems that our diplomatic apparatus should pay attention to legally pursuing cyber attacks against the Islamic Republic of Iran more than before, since many countries, such as Russia, regard any cyber attack as an official (act of) war.”
While the investigation continues, check out the following cybersecurity news headlines:
DHS Sec. Napolitano calls cybersecurity a shared responsibility (InformationWeek)
Cybersecurity ‘compliance regime’ a concern on the Hill (FierceGovIT)
Where is the “Public Awareness” in the Cyber Security Public Awareness Act? (Forbes)
Q&A: Rep. Jim Langevin on US cybersecurity (BusinessWeek)
CIA investors aim to build a pseudo-gambling market for data security predictions (Forbes)
Advanced cyber attack claims are usually false, overhyped (eWeek)
West Point excels at digital defense (Times Herald-Record)
Schmidt: No cyber ‘leadership vacuum’ in Feds’ efforts (ExecutiveGov)
Opinion: Strategic vision for a more secure cyberspace (San Jose Mercury News)
Cyber thieves stealing fewer records – why is that bad news? (GovComputerNews)
INTERNATIONAL ISSUES:
Investors urge EU to make swift security fix for “limping” emissions trading platform (BusinessGreen)
Prosecutors probe N Korea’s alleged role behind cyber attack on Nonghyup (Yonhap)
Australia needs to do more on cyber security: report (Xinhua)
UK cybersecurity spending plans revealed (ZDNet)
CYBER HITS:
Top federal lab hacked in spear-phishing attack (Wired)
Sony: 77M users’ credit card data risked in PlayStation breach (AP)
Cyber attack hits Amnesty International site (eSecurity Planet)
Cyber attack hits AutoTrader site (eSecurity Planet)
INDUSTRY NEWS:
Booz Allen Hamilton gets Naval cybersecurity deal (BusinessWeek)
Northrop Grumman, U of Md launch cybersecurity incubator program (UPI)
HBGary’s open letter: full of denials that don’t hold water (Ars Technica)
Baltimore-Washington corridor emerges as front line of defense in cyberwars (Patch)
Industry survey reveals RSA breach undermining confidence in security tokens (Press Release)
Referentia opens Hawaii’s first cyber collaboration center (Press Release)
SE Solutions wins task order to support FEMA IT security branch (Press Release)
Detica expands cyber defense service (UPI)
Hello admin, i see that cybersecuritynews.org needs fresh posts. Daily updates will rank your page in google higher, content is king nowadays. If you are to lazy to write unique content everyday you should search in google for:
Ightsero’s Essential Tool