| 

Iran oil terminal suffers malware attack

  • Post author: Omid Farhang
  • Post published: April 24, 2012
  • Reading Time: 2 min
  • Word Count: 240 words

The BBC is reporting that websites belonging to the Iranian oil ministry and national oil company are offline after suffering a malware infection this weekend. Iran has disconnected all of its oil processing facilities as a precaution, including the facility at Kharg Island which processes more than 90% of Iranā€™s exports. The semi-official news agency, Mehr, reported that information about users of the websites had been stolen, but no sensitive data had been accessed. ...

Continue Reading Iran oil terminal suffers malware attack

Banking System Vulnerability ā€“ 3 million bank accounts hacked in Iran [Updated]

  • Post author: Omid Farhang
  • Post published: April 17, 2012
  • Reading Time: 2 min
  • Word Count: 225 words

As I said in the other post, Iranā€™s Central Bank has announced that the electronic information of 3 million customers of 10 Iranian banks have been compromised. These banks now require their customers to change their ATM pin numbers before they can access their account. This has caused a rush to the ATM machines by the worried customers. The hacker was identified as Khosro Zareā€™, a former bank-system specialist in Iran who recently left the country. Zareā€™ claimed in a blog that he hacked the PIN codes to highlight the vulnerability of Iranā€™s banking system. ...

Continue Reading Banking System Vulnerability ā€“ 3 million bank accounts hacked in Iran [Updated]

Hacker divulges data on 10 Iranian banks, central bank warns clients [Updated]

  • Post author: Omid Farhang
  • Post published: April 15, 2012
  • Reading Time: 2 min
  • Word Count: 237 words

An Iranian hacker published the information about some 3 million debit cards of 10 Iranian banks, including codes and passwords. The information has been published by someone named ā€œKhosrow Zare Faridā€ who was the manager of a company which operates SHETAB payment network in Iran and produces and installs POS devices. ā€œAround one year ago I found a critical bug in the system. Then I wrote and sent a formal report to all the CEO of banks in Iran but none of them replied to me. Now I decided to publish the information. Governments tried to catch me by Iran Cyber Army but they failed,ā€ he said, according to Kabir News website ...

Continue Reading Hacker divulges data on 10 Iranian banks, central bank warns clients [Updated]

Iran increasingly controls its Internet [Update 6]

  • Post author: Omid Farhang
  • Post published: February 9, 2012
  • Reading Time: 2 min
  • Word Count: 391 words

Washington Post wrote: TEHRAN ā€” Whenever an Iranian blogger, connects to the Internet from his office, they switches on a special connection that for years would bypass the Islamic republicā€™s increasingly effective firewall. But recently the software, which allowed them to go online through portals elsewhere in the world, stopped working. When it sporadically returns, speeds are so excruciatingly slow that sites such as Facebook become unusable. [SNIP] Many fear that the disabling of the software used to bypass the state-run firewall heralds the coming of what authorities have labeled the National Internet. The governmentā€™s technology officials have announced the construction of a domestic Internet network comparable to an office intranet, which would block many popular sites. They have hinted the National Internet can be launched at any time, and have said it will gradually start working over the coming three years. ...

Continue Reading Iran increasingly controls its Internet [Update 6]

Iranian block on Tor traffic quickly foiled

  • Post author: Omid Farhang
  • Post published: September 16, 2011
  • Reading Time: 2 min
  • Word Count: 232 words

The H-Security: The online privacy and security service Tor was blocked by the Iranian government late evening (local time) 13 September. This was done by adding a filter rule to the Iranian border routers which identified Tor traffic and blocked it. The blocking was quickly discovered by Tor and the project released a fix a few hours later. The fix consists of a new version of the Tor software, Tor 0.2.3.4-alpha, and once this is installed on relays and bridges, the company expects normal service to be resumed for users in Iran. ...

Continue Reading Iranian block on Tor traffic quickly foiled

An update on attempted man-in-the-middle attacks

  • Post author: Omid Farhang
  • Post published: August 31, 2011
  • Reading Time: 1 min
  • Word Count: 164 words

Google: Today we received reports of attempted SSL man-in-the-middle (MITM) attacks against Google users, whereby someone tried to get between them and encrypted Google services. The people affected were primarily located in Iran. The attacker used a fraudulent SSL certificate issued by DigiNotar, a root certificate authority that should not issue certificates for Google (and has since revoked it). Google Chrome users were protected from this attack because Chrome was able to detect the fraudulent certificate. ...

Continue Reading An update on attempted man-in-the-middle attacks

Iran: Computer Malware Sabotaged Uranium Centrifuges

  • Post author: Omid Farhang
  • Post published: November 30, 2010
  • Reading Time: 5 min
  • Word Count: 976 words

A security man stands next to an anti-aircraft gun as he scans Iranā€™s nuclear enrichment facility in Natanz, 300 kilometers [186 miles] south of Tehran, Iran, in April 2007. Wired: In what appears to be the first confirmation that the Stuxnet malware hit Iranā€™s Natanz nuclear facility, Iranian President Mahmoud Ahmadinejad said Monday that malicious computer code launched by ā€œenemiesā€ of the state had sabotaged centrifuges used in Iranā€™s nuclear-enrichment program. ...

Continue Reading Iran: Computer Malware Sabotaged Uranium Centrifuges

Stuxnet in the news

  • Post author: Omid Farhang
  • Post published: September 30, 2010
  • Reading Time: 1 min
  • Word Count: 81 words

The Stuxnet Trojan is very well covered in the media as more and more details about its sophisticated code become public. It abuses four previously unknown security vulnerabilities in Windows to enter the system and is specialized on attacking Siemens processing systems. An interesting information which didnā€™t get much attention yet comes from heise Security: The nuclear plant in Busheer isnā€™t really the target of the worm as rumours say, as the attacked systems arenā€™t approved for usage in nuclear plants. ...

Continue Reading Stuxnet in the news