|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
. | ![]() |
. |
|
![]() |
![]() by Staff Writers Tehran (AFP) May 26, 2015
Iran said on Tuesday it had foiled a cyber-attack on the Islamic republic's oil ministry, and that those behind the hacking attempt were based in the United States. The Fars news agency cited Brigadier General Kamal Hadianfar, head of the cyber police, as saying the unit had thwarted "the hackers' attack on the oil ministry". He said the source of the attempt was in the United States, and that the US authorities had been informed. "The IP address for these hackers was in America," he said, adding that "an international judicial order" had been sent to the United States, without elaborating. Hadianfar said the hacking attempt took place over a four-day period at the start of the new Iranian year which began on March 20. Iran's controversial nuclear programme was the target of a 2010 cyber-attack by the Stuxnet virus, in a hack Tehran blamed on both the United States and Israel. A February report by Russian security firm Kaspersky Lab spoke of a powerful cyber-spying tool that can tap into millions of computers worldwide through secretly installed malware, with many signs pointing to a US-led effort. Iran has also been accused of developing its own cyber espionage capability. US National Intelligence Director James Clapper in February blamed Iran for a cyber attack on Sands Casino in Las Vegas that stole confidential data and shut down many of the casino's operations. The assault came after the billionaire owner of Sands, Sheldon Adelson, said in 2013 that "Iran should be nuked". And last December, US cyber-security firm Cylance said Iran-based hackers had been engaged for two years in an operation dubbed "Cleaver". Cylance researchers said the effort has "conducted a significant global surveillance and infiltration campaign". They said targets include government networks as well as companies involved in military, oil and gas, energy and utilities, transportation, airlines, airports, hospitals, telecommunications, technology, education, aerospace and other sectors. The report said the campaign appeared to be retaliation for the Stuxnet virus.
Related Links All About Oil and Gas News at OilGasDaily.com
|
![]() |
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service. |