Coding of Stuxnet Virus Attacking Iran Refers to Queen Esther?


(A7) Iranian Intelligence Minister Heider Moslehi said Sunday that his country is under cyber attack, and blamed the United States and Israel. Iranian officials initially admitted that their country had been hit by the Stuxnet computer worm, but insisted that the damage was minimal.

Iran has been forced to push back the opening of the nuclear plant in Bushehr. Senior Information and Technology official Hamid Alipour admitted that while Iranian officials had hoped to clean up the worm's infiltration in under two months, that hope had been proven unrealistic. “The worm is not stable, and since we started the cleanup process, three new versions have been spreading,” he said.

Stuxnet hit Iran much harder than any other nation, affecting an estimated 62,000 systems. A total of 100,000 computers are thought to have been hit with the worm worldwide. The worm was designed to target software created by the German company Siemens; Iran relies heavily on Siemens systems.

Israel has been among the top suspects in the creation of the Stuxnet worm, due both to Israeli opposition to Iran's unsupervised nuclear program, and to the complexity of the attacker, which experts say could only have been created by a team with significant funding, resources and expertise.

Stuxnet is uniquely dangerous in that it can not only cause damage to a system, but can take control of facilities, producing physical, real-world results to an attack. The worm also studies its targets, determining which type of system it has entered before deciding whether or not to attack. To date, it has entered primarily systems that control critical infrastructure.

Even the worm's discovery has not stopped its destructive power. Attackers remain able to communicate with infected machines using peer-to-peer networking.

A detailed analysis released by security firm Symantec revealed two clues that, according to Wired.com, may indicate Israeli involvement in the attack – or may indicate that another country is trying to implicate Israel in the attack. Two file directory names, “myrtus” and “guava,” could be an allusion to the biblical Queen Esther, who intervened to save the Jewish people from destruction at the hands of a Persian king. Persia is now known as Iran.

Photo:  'Esther Pleads for the Captive Jews' Engraving by Matthäus Merian
Esther was also known as Hadassah, a name which means “myrtle” in Hebrew. Guavas are in the myrtle family of fruit.

A second possible hint at Israeli involvement is the halt marker 19790509, a possible reference to the date May 9, 1979, when Iran executed Persian Jew Habib Elghanian, prompting the mass exodus of Iranian Jews from the newly Islamic state.

The Symantec analysis was released in an attempt to get information on what, exactly, Stuxnet is targeting.

Queen Esther seems to be a ubiquitous symbol, imagined or otherwise. Two years ago, an Egyptian cleric called for a boycott of Starbucks' Coffee after he claimed to have identified the image of Queen Esther in its logo.



Copyright © Jewish Internet Defense Force
All Rights Reserved

LEGAL:
The views expressed on this website do not necessarily reflect the views of the JIDF. The content is not intended to malign any religion, ethnic group, club, organization, company or individual. This site's intention is to do no harm, to not injure others, defame, or libel. All data and information provided on this site is for informational, educational, and/or entertainment purposes only. The Jewish Internet Defense Force (JIDF) makes no representations as to accuracy, currentness, correctness, suitability, or validity of any information on this site and will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use, or access to this site. We are not responsible for translation or interpretation of content. We are not responsible for defamatory statements bound to government, religious or other laws from the reader’s country of origin. All information is provided on an as-is basis with no warranties, and confers no rights. We are not responsible for the actions, content, accuracy, opinions expressed, privacy policies, products or services or for any damages or losses, directly or indirectly, caused or alleged to have been caused as a result of your use or reliance on such information on the Jewish Internet Defense Force site. This site includes links to other sites and blogs operated by third parties. These links are provided as a convenience to you and as an additional avenue of access to the information contained therein. We have not reviewed all of the information on other sites and are not responsible for the content of any other sites or any products or services that may be offered through other sites. The inclusion of these links in no way indicates their endorsement, support or approval of the contents of this site or the policies or positions of the JIDF. We have the right to edit, remove or deny access to content that is determined to be, in our sole discretion, unacceptable. These Terms and Conditions of Use apply to you when you view, access or otherwise use this blog and the Website. The JIDF is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com.
Related Posts with Thumbnails