Iran’s Nuclear Site Attacked Following Attempts To Hack Israel's Water System

There have been cyber attacks on Israel’s water treatment plant from Iran, and an attack response from Israel on an Iranian Nuclear plantWhen Iran cyber attacked Israel’s water supply system on April 24 and 25, it did more than just shut down computers and disrupt water system operations.  

The water facility attack was intended to release large amounts of poisonous chlorine into Israel’s water delivery infrastructure, potentially poisoning tens of thousands of Israelis. Now, Israel is thought to be responsible for two major explosions at Iranian facilities, one related to uranium enrichment, the other for missile production.

Some Iranian officials have blamed possible cyber attack similar to the previous Stuxnet sabotage of their nuclear facilities.  Newly released satellite imagery showed the damage from what Iranian authorities attributed to a fire at the Natanz nuclear facility was far more extensive that previously disclosed.

It is thought n Israeli cyber attack caused a fire and explosion at the largely underground Natanz nuclear enrichment facility and in a separate attack Israeli F-35 stealth jets bombed a site located in the area of Parchin, which is believed to house a missile production complex, an area of particular concern for Israel, due to increasing sophistication of missiles and rockets in the arsenals of Iranian allies in Lebanon and Gaza. Neither of these claims were confirmed by Israeli officials.

The alleged Israeli attacks also came amid an ongoing campaign of so-called maximum pressure by the United States in the form of heavy sanctions on Iran and Iranian officials.

Iranian Cyber Attack On Israel’s Water Supply 

Israel successfully thwarted a major cyber attack against its water systems last month, widely thought to have been the work of  Iran. The assault was a "synchronised and organised" attempt at disrupting key national infrastructure, cyber chief Yigal Unna said in a video address to CyberechLive Asia, a digital international cyber conference.

The water facility attack was to release large amounts of poisonous chlorine into Israel’s water delivery infrastructure, potentially poisoning tens of thousands of Israelis. It may indicate a growing threat of cyber-attacks throughout the world.

Researchers at FireEye concluded that the malware developed for this kind of attack came out of Russia and specifically from the Central Scientific Research Institute of Chemistry and Mechanics, a Russian government-owned technical research institution in Moscow.

The first known use of the malware was against a petrochemical facility in Saudi Arabia in 2017. It would appear the Russia-developed cyber-weapon was shared with Iranian government hackers. The attack was routed through servers in Europe and the United States to try to hide its origin. 

These rising attacks are attributed by US officials to international actors like China, Russia, and Iran. Covid-19-linked cyber-attacks reflect the huge competition among global pharmaceutical companies for windfalls and market share if a successful vaccine is developed. 

A growing concern in the US is that foreign equipment, mainly coming from China, can have built-in back doors or include malware buried in the code of the firmware or software that comes with the hardware. 

The Israeli security cabinet decided on the subsequent port attack instead of stronger military action. Israel’s response would likely have been far harsher had the Iranian attack accomplished its poisonous objective. 

The US probably would likewise react harshly if a critical infrastructure attack did any real and lasting damage and resulted in civilian casualties. No one can say for sure when, or if, that will happen but the potential for a cyber-driven military confrontation is rising.

Military Aerospace:       Asia Times:         Deutsche Welle:     Times of Israel:

You Might Also Read: 

Do Not Underestimate Iran’s Cyber Threat:

 

« Hackers Extort $1.14m From University of California
Journalist’s Phone Hacked Using An ‘Invisible’ Technique »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: How to build and implement an effective endpoint detection and response strategy

ON-DEMAND WEBINAR: How to build and implement an effective endpoint detection and response strategy

Discover how you can implement endpoint detection and response (EDR) tools into your security strategy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

SECURITYMADEIN.LU

SECURITYMADEIN.LU

SECURITYMADEIN.LU is the main online source for cyber security in Luxembourg providing news, information and a toolbox of cyber security solutions.

DomainTools

DomainTools

DomainTools helps security analysts turn threat data into threat intelligence.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

ZEBOX

ZEBOX

ZEBOX is an international incubator & accelerator of innovative startups. Focus is on Transport/Logistics and Industry X.0 including technologies such as AI, Blockchain and Cybersecurity.

Kainos

Kainos

Kainos is a leading provider of Digital Services and Platforms. Our services include Digital Transformation, Cyber Security, Cloud, AI, IoT and more.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

Saepio Solutions

Saepio Solutions

Saepio promote an all-encompassing approach to cybersecurity, ensuring the appropriate balance of budget and resource across Policy, Product and People.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

Astrill VPN

Astrill VPN

Astrill VPN is a Seychelles based Virtual Private Network(VPN) Company.