Iran: We've learned how to fight Stuxnet computer worm

Islamic Republic's intelligence minister adds that several nuclear spies arrested but fails to clarify if they are connected to Stuxnet sabotage.

By ASSOCIATED PRESS
October 2, 2010 18:20
2 minute read.
The reactor building of Bushehr nuclear power plant is seen just outside the city of Bushehr.

Bushehr Reactor 311. (photo credit: Associated Press)

 
X

Dear Reader,
As you can imagine, more people are reading The Jerusalem Post than ever before. Nevertheless, traditional business models are no longer sustainable and high-quality publications, like ours, are being forced to look for new ways to keep going. Unlike many other news organizations, we have not put up a paywall. We want to keep our journalism open and accessible and be able to keep providing you with news and analyses from the frontlines of Israel, the Middle East and the Jewish World.

As one of our loyal readers, we ask you to be our partner.

For $5 a month you will receive access to the following:

  • A user experience almost completely free of ads
  • Access to our Premium Section
  • Content from the award-winning Jerusalem Report and our monthly magazine to learn Hebrew - Ivrit
  • A brand new ePaper featuring the daily newspaper as it appears in print in Israel

Help us grow and continue telling Israel’s story to the world.

Thank you,

Ronit Hasin-Hochman, CEO, Jerusalem Post Group
Yaakov Katz, Editor-in-Chief

UPGRADE YOUR JPOST EXPERIENCE FOR 5$ PER MONTH Show me later Don't show it again

TEHERAN, Iran  — Iran's intelligence minister said the country has learned how to fight off a complex computer worm that some foreign experts have speculated was designed to target Teheran's nuclear program, state television reported Saturday.

Heidar Moslehi was also quoted as saying authorities have arrested several nuclear spies, but he gave no details and it wasn't clear if the developments were related.

Be the first to know - Join our Facebook page.


RELATED:
Opinion: Column One - The lessons of Stuxnet
Iran's Bushehr electricity production hits two month delay

Over recent months, the malicious Stuxnet computer code has also affected industrial systems in India, Indonesia and the US But it has spread the most in Iran, including to several personal computers of workers at Iran's first nuclear power plant, which is to go online later this year.

The destructive Stuxnet worm has surprised experts because it is the first one specifically created to take over industrial control systems, like those at power plants, rather than just steal or manipulate data.

Moslehi did not reveal where or when the suspected spies were arrested, saying only that Iran has "always faced sabotage" by foreign intelligence services.

Iran periodically announces the arrest of nuclear spies without giving details.



The state TV report did not carry any remarks from Moslehi linking the arrests with the investigation into the computer worm.

"Iran's intelligence department has found a solution for confronting (the worm) and it will be applied," he was quoted as saying. "Our domination of virtual networks has thwarted the activities of enemies in this regard."

A week ago, Iran said the stuxnet code was found on several laptops belonging to staff at the Bushehr nuclear power plant but that the plant's main systems were not affected.

The plant has stood outside the current controversy over Iran's nuclear program since Russia will be providing the fuel for the plant and supervising its disposal.

But other aspects of Iran's nuclear work, especially its enrichment of uranium, are of concern to the United States and other world powers. Enrichment can be used to produce weapons as well as make fuel for power plants. Iran says it only has peaceful nuclear aims, such as generating electricity.

Who created the Stuxnet code and what its precise target is, if any, remains a mystery.

The web security firm Symantec Corp. says the computer worm was likely spawned by a government or a well-funded private group. It was apparently constructed by a small team of as many as five to 10 highly educated and well-funded hackers, Symantec says.

Related Content

Bushehr nuclear Iranian
August 5, 2014
Iran and the bomb: The future of negotiations

By YONAH JEREMY BOB