clear

Creating new perspectives since 2009

Computer experts say Iran behind Saudi cyber attack

December 2, 2016 at 6:30 pm

A destructive computer virus that four years ago crippled tens of thousands of computers at Middle Eastern energy companies, was used two weeks ago by Iran to attack computers in Saudi Arabia, according to several US cyber security firms.

CrowdStrike, FireEye Inc, Intel Corp’s McAfee security unit, Palo Alto Networks Inc and Symantec Corp warned of the attacks, though they did not name any victims. They did not say how much damage had been caused or identify the hackers using Shamoon, the name of the virus, which cripples computers by wiping drives used to start machines.

Saudi Arabia said yesterday that hackers had launched an attack on computers on government bodies and organizations in the transport sector in mid-November, heightening concern about security in the world’s largest oil exporter.

Victims included the General Authority of Civil Aviation, the Saudi agency that runs airports, where the attack disrupted work for several days, Bloomberg News reported, citing people familiar with the investigation.

The attack originated outside the country and was one of “several ongoing cyber attacks targeting government authorities,” the National Cyber Security Centre, an arm of the Ministry of Interior, told state news agency SPA.

The statement did not give details of the identity of the attacker or the damage caused, beyond saying the virus aimed to disrupt servers and plant malicious software in computer systems.

The 2012 Shamoon attack on Saudi Aramco, the world’s largest oil company, was widely seen as a watershed event. At the time, US Defence Secretary Leon Panetta said it was probably the most destructive cyber attack on a business.

There have since only been a few major attacks with disk-wiping malware, including ones in 2014 on Sheldon Adelson’s Las Vegas Sands Corp and Sony Corp’s Hollywood studio.

In the initial Shamoon hacks, images of a burning US flag were left on computers at Saudi Aramco and RasGas Co Ltd. A disturbing image of the body of 3-year-old drowned Syrian refugee Alan Kurdi was used in recent attacks.

The 2012 hackers were likely working on behalf of the Iranian government, said CrowdStrike Chief Technology Officer Dmitri Alperovitch. It is too early to say whether the same group was behind Shamoon 2, he said.

Tehran has been investing heavily in its cyber warfare capabilities since 2010, when its nuclear programme was hit by the Stuxnet computer virus, widely believed to have been launched by the United States and Israel.

The malware triggered the disk-wiping to begin at 8:45pm local time on 17 November, according to the security firms. The Saudi business week ends on Thursday, so it appears to have been timed to begin after staff left for the weekend to reduce the chance of discovery and allow for maximum damage.