Switzerland & Austria Investigate Claims of Electronic Spying at Iran Talks

kaspersky.jpg?itok=5WgBTvqp

Kaspersky says Iran talks spyware masqueraded under Foxconn name.

Prosecutors in Switzerland and Austria have launched investigations into allegations that a computer virus was used to spy on the recent high-level Iran nuclear talks. Swiss police  reveal raids last month, after a security company said Dugu 2.0 spy virus appeared to have hit hotels that hosted diplomats at nuclear negotiations. Prosecutors did not say which venues were targeted.

It comes shorly after a top Russia-based software security company, Kaspersky, said a spy virus dubbed Dugu 2.0 appeared to have compromised computer networks in at least three Swiss hotels that had been host to senior diplomats from Iran and the six major powers – the US, China, Russia, Britain, France and Germany – of the group known as the P5+1. 

The office of the Swiss attorney general announced that police had last month raided unnamed locations in Geneva, where recent talks took place, and confiscated computer equipment and IT material. 
The allegations have surfaced at a critical moment in the ongoing nuclear talks ahead of an end of June deadline for a comprehensive agreement. 

An investigation was launched following those raids, federal Swiss prosecutors said, without mentioning which venues had been targeted. Swiss hotels that have hosted the negotiations in recent months include the Palais Wilson and Intercontinental in Geneva, the Beau Rivage in Lausanne and the Royal Plaza in Montreux. 
“The aim of this raid was on one hand to gather evidence and to on the other verify if information systems had been infected by malware,” the Swiss attorney general’s office said, according to AFP. 

Austria, which also hosted the Iranian nuclear negotiations, confirmed on Thursday it was investigating separately as well. Vienna’s Palais Coburg hotel has been a frequent venue for the ongoing talks. “The federal office for the protection of the constitution and counter-terrorism is aware of the information and is reviewing it,” said a Vienna-based government spokesman.

Although it is not clear who has carried out the recent cyberattacks, Dugu is related to Stuxnet, a computer worm, which is believed, to have been designed by Israel to sabotage Iran’s uranium enrichment programme. Stuxnet hit Iran’s nuclear facilities in 2010. Iranian authorities initially played down its impact but eventually admitted the malware had damaged the nuclear programme.

Israel, which stands firmly opposed to a comprehensive deal with Iran and the lifting of sanctions as a result, has denied any links to the recent attacks. “The international reports of Israeli involvement in the matter are baseless,” said Tzipi Hotovely, Israel’s deputy foreign minister. “What is much more important is that we prevent a bad agreement where at the end of the day we find ourselves with an Iranian nuclear umbrella.”

In March, and in unusual comments for US administration officials, the Wall Street Journal cited senior American officials accusing Israel of spying on the nuclear talks and using the intelligence gathered to persuade sceptics in Congress to undermine the talks. 

Reza Najafi, Iran’s ambassador to the Vienna-based UN nuclear agency, the IAEA, said the news about the cyberattack was not surprising to Iran.


“You know that there are enemies of these talks and they will do whatever they can, so it’s not a surprise to us,” he said in reaction to the news. “We continue to take precautionary measures not to let any details of the discussion go to the public.”
Kaspersky said in a statement published on its website that it believed the malware included “some unique and earlier unseen features” which made its creators feel confident no traces could be left. The carefully planned and sophisticated nature of the attacks led the security firm to believe that a nation state sponsored the campaign. 

“Kaspersky Lab researchers discovered the company wasn’t the only target of this powerful threat actor. Other victims have been found in western countries, as well as in countries in the Middle East and Asia,” the statement read.
“Most notably, some of the new 2014-2015 infections are linked to the P5+1 events and venues related to the negotiations with Iran about a nuclear deal. The threat actor behind Duqu appears to have launched attacks at the venues where the high-level talks took place.” Symantec, a rival security company, has confirmed Kaspersky’s findings.

Iran and the west reached a tentative agreement on the framework of a comprehensive deal in April. Under its terms, restrictions will be placed on Iran’s enrichment of uranium so that it is unable to use the material in nuclear weapons.

In return, the US and EU will terminate all nuclear-related economic sanctions against Iran once the UN nuclear agency confirms that Iran has complied.

Guardian

 

« Hackers Target Internet Address Bug to Disrupt Sites
The Robots Taking Your Job Could Get You Killed »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

Qualitest Group

Qualitest Group

Qualitest is the world’s largest pure play Quality Assurance and software testing company.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

EverC

EverC

EverC (formerly EverCompliant) is a leading provider of cyber intelligence that allows acquiring banks and payment service providers (PSP) to manage cyber risk.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

KETS Quantum Security

KETS Quantum Security

KETS harnesses the properties of quantum mechanics to solve challenging problems in randomness generation and secure key distribution and enable ultra secure communications.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

Tonex

Tonex

Tonex providing industry-leading technology training, courses, seminars, workshops, and consulting services to companies and government organizations around the world.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

FatPipe Networks

FatPipe Networks

FatPipe’s network optimization solutions along with robust native security and SASE-based protection provides organizations all they need for super network performance and security.