On Tuesday, October 26, the Iranians were surprised at the gas stations across the country, by stopping service, and some of the various cities and governorates participated on social media platforms with what happened with them in these stations, some of them publish a picture of fuel pumping machine screens,It was written on the phrase "electronic attack 64411", and some of them published pictures of the closure of the stations, and long queues in front of them, waiting to be supplied with gasoline.
The Iranian Ministry of Oil announced, after two hours, that the problem is general in the country, due to the occurrence of a "technical defect" in the electronic system of fuel distribution network, declaring that the research is underway to reach the reasons.But soon the accounts differed on the communication sites regarding the accident, between those who accused the authorities of being paved to increase fuel prices through this procedure, and those who talked about an electronic attack.But what hehened the rumor market is the announcement of the national fuel distribution company about the presence of gasoline at free prices, the government price doubled, outside the electronic gasoline distribution system, what some considered a step in the direction of raising prices.
Coinciding with the stoppage of gasoline stations from the service and the controversy that accompanied this, video clips spread on the communication network.Then the Iranian student "ISNA" agency published a report that gasoline stations stopped service, and the political slogans published on electronic paintings after their penetration, which held the Iranian Supreme Leader, Ali Khamenei, responsible for the lack of gasoline in the stations, noting that what happened was the result of an attackElectronic, with criticism of the authorities.However, the report was deleted from the "ISNA" website after its publication, before the agency later announced that it was hacked, and that the report was published by "Hackers".
The process of reactivating the government electronic system in the fuel distribution network lasted for four days, and the 4300 gasoline stations throughout Iran returned to the service, all of which were operating on Saturday, October 30,.
Iran officially confirmed that what happened to the gas stations was the result of a "foreign electronic attack" without naming a specific party, but as the Iranian Nebrana expert, Mohammad Mahdi Bahrami, said, it was a very complicated and implementation attack that needed various technical specialties and strong structure to implement it..He adds that the attack succeeded after the attackers exceeded the "Firewall Wall" and software safety systems, pointing out that this shows a "new type of electronic attack that discovered local devices recently similar cases".Bahrami explains that these attacks adopt "ADVANCED PERSISTENT Threat", which is unable to confront safety systems.And on the financial losses that this electronic attack left, the Iranian expert points out that there is no "accurate evaluation, but given the decrease in fuel in Iran, it is direct or indirectly left tens of millions of dollars losses in the Iranian economy.".
On Monday, November 8, Iran confirmed that its response to the electronic attack will be "painful".The Iranian Foreign Ministry spokesman, Saeed Khatib Zada, in his weekly journalistic conference, in response to a question about the origin of the attack, referred a response to the "technical references concerned"..He added that "the concept of collective security confirms that it is not possible to live safely at a time when the security of others is shaken, and this applies to the cyberspace," saying that "from his home from the glass does not launch a cyber attack on others.Everyone knows Iran's capabilities and their weaknesses, "he said.
"A foreign country" is behind the attack, saying, in an interview with Iranian television, that "it is too early to determine the country that carried out the attack and itsThe goal is to "breach services to the people".
Also, the head of the Iranian negative defense organization, BrigadierChuladah, said that "the analysis of the cyberspace attack on fuel systems shows that a foreign country, the Americans and the Israelis have been made," but he said at the same time that "technical information is under study, and it is not possible to talk aboutThe party that carried out the attack is resolved ".However, there are those who were accused of the Iranian interior and local hackers, while talking about the fact that the electronic fuel system works "in the form of" in the form of "in the form of" in the form of "in the form of" in the form of "in the form of" in the form of "in the form of" in the form of "in the form of" in the form of "in the form of" in the form of "in the form of" in the form of "in the form of" in the form of "in the form of" in the form of "in the form of" in the form of "in the form of" in the form of "in the form of" in the form of "in the form of" in the form of "in the form of" in the form of ".
For his part, the Iranian technical expert, Mohammad Mahdi Bahrami, told Al -Arabi Al -Jadeed that the work of the fuel distribution network in Iran as a "form of offline" does not mean that it is not subject to penetration from abroad permanently, and that he is "fully believed", noting at the same time.Until "the security of these systems is more than others, because their infrastructure is not needed to access permanent internet".Bahrami adds that "the attacking team needs the maximum information for the success of its operation," so he did not exclude the provision of the team with information about the electronic system of the fuel distribution network in Iran, "by individuals familiar with it, whether directly or indirectly..
رصدالتحديثات الحيةThe Iranian expert excludes that "an internal team is one of the plans and carried out the attack," attributing this to several reasons, including, according to him, that those who are able to launch such attacks in countries are "few and limited, which is easy to monitor security"."The attack, if not, has occurred as a result of neglect, it has very great complications, so it is not possible in Iran to form a team of experts who are able to implement and which needs a strong artistic structure, and it is impossible to happen away from the eyes of the security services."As the expert Bahrami says.
Israel is the main accused of launching such electronic attacks on Iran, according to Bahrami, who added that "Iranian systems and infrastructure are monitored by enemies like Israel, they have high technical capabilities, and their penetrations monitor these systems, and there may be people who sell weaknesses to enemies.".
The electronic attack that targeted the fuel distribution network in Iran is different from the previous attacks. For the first time, this type of attack has been targeting the infrastructure of public services, after they only touched the sensitive Iranian facilities, nuclear and military..Therefore, the goal was greater than just achieving technical damage in order to disrupt public life, as fuel stations have no location in "Iranian confrontation with enemies", according to Bahrami, who stressed that the goal "is political in order to achieve gains, such as increasing resentment and inciting the street to the government".
As for the Iranian expert Salahuddin Khedio, it links the attack and Vienna's nuclear negotiations between Iran and the United States indirectly and by members of the nuclear agreement, saying that "the last electronic attack is a joint Western project, to increase pressure on Iran to push it to return quickly to these negotiations" that decides toIt appeals on the 29th of this month.Khedio adds, to "Al -Arabi Al -Jadeed", that "the attack carries a warning message about more in the future, in order to reduce Iran's capabilities to bear the consequences of the sanctions and the current economic situation," noting that what distinguishes the last electronic attack is that it was targetedCivil infrastructure is not related to the nuclear program.
The Iranian expert expects that "Iran is similarly carrying out similar attacks that reduce the repetition of such attacks in the future, to achieve a state of new deterrence and increase the costs of these attacks on the attackers.".
It was not hours since the electronic attack that Iran was exposed to in the fuel distribution network, until three Israeli engineering companies were subjected to a penetration process, which suggests the hypothesis that these attacks and counter -attacks come in the context of an electronic warfare between Iran and Israel, which has been going on for more than a decade.
The "Hackers" group calls itself "Moses Staff" (Moussa Mousa), who is accused of Israel, that it belongs to Iran, on Tuesday evening, 26 October last, that it managed to penetrate computers, digital networks and three Israeli engineering companies, before it was publishedThe details, plans and projects of engineering these Israeli companies H.C.M Engiening, David Engineers and Ehud Leviathan Engineering.The attack came a day after the Internet Pirates Group announced "Black Shadow", publishing the details of more than 290,000 Israelis who receive medical treatments and medical examinations in the Israeli "Moore" institutes to photograph radiology and other medical examinations, and publish details and dataM and Community.The group demanded a ransom of one million dollars, threatening that it will publish the subscribers' data on the site if this ransom does not pay.
تكنولوجياالتحديثات الحيةThe Mosa Staf group (Asa Musa) had previously published, two weeks ago, personal photos of the Minister of the Occupation Army, Bani Gantz, and for hundreds of soldiers, after the group climbed its cyber attacks against the Israeli army and published information files about hundreds of occupation soldiers and students of a preparatory school for military service.On the "Asa Musa" group, the Israeli "Walla" website reported, last Sunday, from the Israeli expert on cyber affairs, May Brooks, as saying that this group has become known for almost a month, after it published multiple reports of "successful" hacking operations for Israeli sites and facilities.The site said that the aim of these attacks is not to achieve economic profits, but rather to influence the awareness of the Israelis.
The "Stax Net" virus, classified as the most dangerous military virus, launched the spark of the electronic war against Iran, after it targeted the 2010 "Natanz" nuclear nuclear facility in the country to enrich uranium and the "Bushehr" nuclear reactor near the Gulf.Although there are strong evidence and indicators that this virus is an American -Israeli industry, to disrupt the Iranian nuclear program, according to the Persian -speaking "BBC" documentary, broadcast it on May 22, 2018, but they did not announce it to that."Stax Net" the latest "problems" in the centrifuges in "Natanz", as Iranian President Ahmadinejad said during November 2010, according to the official Iranian "IRNA", but Iranian engineers succeeded in neutralizing the virus and removing it from computers in nuclear facilitiesAnd European, American officials and private sector experts told Reuters on February 19, 2012.
Then the cyber attacks against Iran continued at low levels and in other forms, so that the head of the negative defense organization, Brigadier Ghulad, revealed, on October 22, 2019, that it had been subjected to "50 thousand cyber attacks per day, and about 8 serious electronic attacks annually", the widest of what happened onFebruary 9, 2020, targeting the country's infrastructure, according to the Iranian Assistant Minister of Communications, Hamid Fattahi, on Twitter, saying that the pirates tried to "carry out the largest attack to target millions of goals," noting that the goal was "to harm the Internet,Through a SYN Flood attack at a rate of one million PPS ".The source of the attacks, East Asia and North America, was according to the Iranian government infrastructure telecommunications company, and caused the interruption of the Internet in Iran by 75 percent, according to a tweet by the "Net Blix" Foundation for network security control.
During July 2020, Israeli media revealed that Israeli water facilities were subjected to two Iranian attacks, one of which targeted agricultural water pumps in the Supreme Galilee area, and the second targeted the infrastructure in central Israel..These sources confirmed that the attacks did not leave "damages".At that time, the Israeli Water Authority announced, in a statement, that the targeted drainage facilities were "small specific in the agricultural sector and were immediately fixed".
Observers linked these electronic attacks to an explosion accident that occurred on the second of the same month (Yolio 2020) at the Iranian Natanz facility, amid Israeli and American media talk that Israel was behind the explosion, which Tehran later described as a "sabotage" without naming a specific foreign partyStanding behind him.
During the July, Iran was also subjected to multiple cyber attacks, the rail network, the Ministry of Roads, Cities Building and Other Institutions, in light of confirmation and exile from the media and authorities, amid official warnings of indicators of other possible electronic attacks, at the time..
تكنولوجياالتحديثات الحيةCyber security and the endeavor to impose strict censorship on virtual content and control, formed two motives for Iran to launch the largest electronic project in Iran, in 2005, under the title "National Information Network" or "National Internet", then the electronic war contributed to promoting the trend towards building the network thatIt has not yet been completed, but the recent attack against gasoline stations has brought back the issue of the information network to the interface again, which activists and observers consider an attempt to restrict international social networks and access the international internet.Iranian expert Mohammad Mahdi Bahrami says that the Iranian authorities "do not complain of the quality of their technical programs for cybersecurity," noting that "the problematic offered is always in management and implementation of these programs in the face of attacks.".
Bahrami explains, to Al -Arabi Al -Jadeed, that "what calls for concern is a sufficient lack of interest in electronic threats," saying that securing cybersecurity with "a need for a sufficient budget to fortify infrastructure and dependence on internal technical security systems".
However, the sanctions imposed on Iran, which mainly targeted its financial resources, caused major problems in securing the country's budget, including the budget of the Iranian negative defense organization authorized to confront cyber threats to increase Iran's deterrence in its confrontation, so its budget became insufficient.The head of the organization, Brigadier Ghulad, says that "the operational budget of the organization is zero in the previous government" whose mandate ended last July, saying that it "did not pay the organization most of its employees' salaries," and demanding a special clause to balance the organization in the budget projectIranian annual.
Jalali adds, in an interview with Iranian television, that "threats and weaknesses, the management of the ignorant and the lack of proper division of the leadership of the crisis, are factors that facilitate these cyber attacks," accusing the former Iranian government of being dealing with the negative defense organization "from a political standpoint and was not taking cyber threatsSeriously".He said, "The previous government wanted to turn the organization into a device belonging to it," he said.