Cyber-Attack Targeted Iran Nuclear Talks Venues: Kaspersky Lab

Advertisement
By Reuters | Updated: 11 June 2015 13:35 IST
A computer virus was used to hack into venues linked to international talks on Iran's nuclear programme, Russian computer security company Kaspersky Lab said on Wednesday.

Kaspersky said it found the software in three European hotels used in the negotiations involving Iran and six world powers and also on Kaspersky's own computers.

Both Kaspersky and U.S. security company Symantec said the virus shared some programming with previously discovered espionage software called Duqu, which security experts believe to have been developed by Israelis.

"Most notably, some of the new 2014-2015 infections are linked to the P5+1 events and venues related to the negotiations with Iran about a nuclear deal," the statement said.

Advertisement

"P5+1" refers to the six world powers negotiating with Iran on curbs to its disputed nuclear programme - the United States, Russia, China, Britain, France and Germany. The talks have been held in Geneva, Lausanne, Montreux, Munich and Vienna.

Advertisement

In February, the United States accused Israel of using selective leaks from the talks to distort the U.S. position.

Israel has denounced the diplomatic opening to Iran, saying it doubts any agreement arising from the talks will sufficiently restrain the nuclear programme of its arch-enemy.

Advertisement

The West suspects Iran wants to develop a nuclear weapons capability from its enrichment of uranium. Iran says it wants nuclear energy only for electricity and medical isotopes.

During various rounds of the talks, Israeli officials said they knew what was being discussed from various sources including intelligence gathering and information relayed by allies.

Advertisement

The officials did not elaborate on the latter, but asserted that Israel never spied on the United States, its closest ally.

Other victims of what Kaspersky called "Duqu 2.0" had been found in Western countries, the Middle East and Asia.

Another attack, Kaspersky said, was carried out "in relation to" the commemoration of the 70th anniversary in January this year of the liberation of the Auschwitz-Birkenau Nazi concentration camp in Poland.

That ceremony was attended by the heads of state of Germany, France, Britain and other nations.

Kaspersky said the new software included commands for an unknown type of control software that could have been used at the hotels for conferencing tools.

Duqu similar to stuxnet "worm"
Kaspersky said Duqu 2.0 had evolved from the earlier Duqu, which had been deployed against unidentified targets for years before it was discovered in 2011.

Symantec and Kaspersky analysts have said there was overlap between Duqu and Stuxnet, a U.S.-Israeli project that sabotaged Iran's nuclear programme in 2009-10 by destroying a thousand or more centrifuges that were enriching uranium.

Kaspersky said Duqu 2.0 used three previously unknown flaws in Microsoft Corp Inc software to infect machines and spread, including a problem with Software Installer files, which are commonly used by technical administrators to install and update software on Windows computers within an organisation. The attack left almost no traces.

Microsoft said it fixed the last of those flaws on Tuesday. Moscow-based Kaspersky, a supplier of anti-virus software and other security tools, said it discovered the advanced malware earlier in the spring as a result of attacks it had seen on a number of organisations, including itself.

At a news conference in London, Chief Executive Eugene Kaspersky said malicious software designed by cyberspies often finds its way into the hands of cybercriminals, and thereby poses a far wider threat in a world that now relies on the Internet.

"Cybercriminals are copying the technologies from the state-sponsored attacks. They educate the bad guys," Kaspersky said.

As a top research firm that shares its findings with the rest of the security industry, knowing what Kaspersky knew would allow cyberspies to craft fresh attacks to evade detection for new campaigns.

Kaspersky has uncovered a number of advanced cyber-espionage campaigns, including several from the West, making it a tempting target for spies who want to know what it knows.

Though known attacks on security firms are still rare, the industry has become increasingly fragmented along geopolitical lines.

© Thomson Reuters 2015

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. Best Diwali 2025 Wishes, Quotes, and Facebook Statuses to Share
  2. Scientists Create Most Detailed Radio Map of Early Universe Using MWA
  3. Madam Sengupta Is Now Streaming: Know Where to Watch This Bangla Crime Thriller
  1. Thanal Comes to OTT: Everything You Need to Know About This Tamil Action Thriller
  2. Madam Sengupta Is Now Streaming: Know Where to Watch This Bangla Crime Thriller
  3. Ryugu Samples Reveal Ancient Water Flow on Asteroid for a Billion Years
  4. Scientists Create Most Detailed Radio Map of Early Universe Using MWA
  5. Mayor of Kingstown Season 4 OTT Release: Know When, Where to Watch Jeremy Renner's Crime Drama
  6. Our Fault Is Streaming Now: Know All About This Gabriel Guevara and Nicole Wallace Starrer
  7. The Conjuring: Last Rites Is Now Streaming Online: Know Where to Watch the Latest Installment from the Horror Franchise
  8. Delhi Crime Season 3 OTT Release: Know When to Watch This Shefali Shah Thriller Series
  9. Vast Space to Launch Haven-1, the World’s First Private Space Station in 2026
  10. Atmospheric Carbon Dioxide Soars to 424PPM, Marking Biggest Yearly Jump Ever
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.