Switzerland & Austria Investigate Claims of Electronic Spying at Iran Talks

kaspersky.jpg?itok=5WgBTvqp

Kaspersky says Iran talks spyware masqueraded under Foxconn name.

Prosecutors in Switzerland and Austria have launched investigations into allegations that a computer virus was used to spy on the recent high-level Iran nuclear talks. Swiss police  reveal raids last month, after a security company said Dugu 2.0 spy virus appeared to have hit hotels that hosted diplomats at nuclear negotiations. Prosecutors did not say which venues were targeted.

It comes shorly after a top Russia-based software security company, Kaspersky, said a spy virus dubbed Dugu 2.0 appeared to have compromised computer networks in at least three Swiss hotels that had been host to senior diplomats from Iran and the six major powers – the US, China, Russia, Britain, France and Germany – of the group known as the P5+1. 

The office of the Swiss attorney general announced that police had last month raided unnamed locations in Geneva, where recent talks took place, and confiscated computer equipment and IT material. 
The allegations have surfaced at a critical moment in the ongoing nuclear talks ahead of an end of June deadline for a comprehensive agreement. 

An investigation was launched following those raids, federal Swiss prosecutors said, without mentioning which venues had been targeted. Swiss hotels that have hosted the negotiations in recent months include the Palais Wilson and Intercontinental in Geneva, the Beau Rivage in Lausanne and the Royal Plaza in Montreux. 
“The aim of this raid was on one hand to gather evidence and to on the other verify if information systems had been infected by malware,” the Swiss attorney general’s office said, according to AFP. 

Austria, which also hosted the Iranian nuclear negotiations, confirmed on Thursday it was investigating separately as well. Vienna’s Palais Coburg hotel has been a frequent venue for the ongoing talks. “The federal office for the protection of the constitution and counter-terrorism is aware of the information and is reviewing it,” said a Vienna-based government spokesman.

Although it is not clear who has carried out the recent cyberattacks, Dugu is related to Stuxnet, a computer worm, which is believed, to have been designed by Israel to sabotage Iran’s uranium enrichment programme. Stuxnet hit Iran’s nuclear facilities in 2010. Iranian authorities initially played down its impact but eventually admitted the malware had damaged the nuclear programme.

Israel, which stands firmly opposed to a comprehensive deal with Iran and the lifting of sanctions as a result, has denied any links to the recent attacks. “The international reports of Israeli involvement in the matter are baseless,” said Tzipi Hotovely, Israel’s deputy foreign minister. “What is much more important is that we prevent a bad agreement where at the end of the day we find ourselves with an Iranian nuclear umbrella.”

In March, and in unusual comments for US administration officials, the Wall Street Journal cited senior American officials accusing Israel of spying on the nuclear talks and using the intelligence gathered to persuade sceptics in Congress to undermine the talks. 

Reza Najafi, Iran’s ambassador to the Vienna-based UN nuclear agency, the IAEA, said the news about the cyberattack was not surprising to Iran.


“You know that there are enemies of these talks and they will do whatever they can, so it’s not a surprise to us,” he said in reaction to the news. “We continue to take precautionary measures not to let any details of the discussion go to the public.”
Kaspersky said in a statement published on its website that it believed the malware included “some unique and earlier unseen features” which made its creators feel confident no traces could be left. The carefully planned and sophisticated nature of the attacks led the security firm to believe that a nation state sponsored the campaign. 

“Kaspersky Lab researchers discovered the company wasn’t the only target of this powerful threat actor. Other victims have been found in western countries, as well as in countries in the Middle East and Asia,” the statement read.
“Most notably, some of the new 2014-2015 infections are linked to the P5+1 events and venues related to the negotiations with Iran about a nuclear deal. The threat actor behind Duqu appears to have launched attacks at the venues where the high-level talks took place.” Symantec, a rival security company, has confirmed Kaspersky’s findings.

Iran and the west reached a tentative agreement on the framework of a comprehensive deal in April. Under its terms, restrictions will be placed on Iran’s enrichment of uranium so that it is unable to use the material in nuclear weapons.

In return, the US and EU will terminate all nuclear-related economic sanctions against Iran once the UN nuclear agency confirms that Iran has complied.

Guardian

 

« Hackers Target Internet Address Bug to Disrupt Sites
The Robots Taking Your Job Could Get You Killed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Zentera Systems

Zentera Systems

Zentera's CoIP (Cloud over IP) solution offers enterprise-grade networking and security for the emerging cloud ecosystem.

CERT-PY

CERT-PY

CERT-PY is the national Computer Emergency Response Team for Paraguay.

Centre for the Protection of National Infrastructure (CPNI)

Centre for the Protection of National Infrastructure (CPNI)

CPNI works with the National Cyber Security Centre (NCSC), Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter cyber threats.

Digital Guardian

Digital Guardian

Digital Guardian is a next generation data protection platform designed to stop data theft.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

National Cybersecurity Student Association (NCSA)

National Cybersecurity Student Association (NCSA)

The National Cybersecurity Student Association is a one-stop-shop to enhance the educational and professional development of cybersecurity students through activities, networking and collaboration.

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet is a network of companies who collaborate to address skills needs within the technology sector.

HunCERT

HunCERT

HunCERT's mission is to assist Hungarian Internet Service Providers in applying appropriate procedures to address the risks of computer network incidents and to respond to such incidents.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

Blacksands

Blacksands

Blacksands is a leader in network architecture, identity & services management, threat analysis, industrial IoT architecture, and invisible dynamic networks.

Arctic Group

Arctic Group

Arctic Group is a Swedish service provider focusing on cybersecurity, integration services and deployment of software development tools.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.