Oct 02, 2010
Iran says it has detained several "spies" it claims were behind cyber attacks on its nuclear program.
The intelligence minister, Heydar Moslehi, said western "spy services" were behind the complex computer virus that recently infected more than 30,000 computers in industrial sites, including those in the Bushehr nuclear power plant, appearing to confirm the suspicion of computer security experts that a foreign state was responsible.
The announcement also suggests that the attack involving the Stuxnet worm virus, which computer experts believe may have been designed to spy on Iran's nuclear facilities rather than destroy them, has caused more alarm in the regime than has so far been acknowledged.
In remarks carried on Iranian state television and the Mehr news service, Moslehi said Iran had discovered the "destructive activities of the arrogance [of the west] in cyberspace", adding that "different ways to confront them have been designed and implemented".
"I assure all citizens that the intelligence apparatus currently has complete supervision on cyberspace and will not allow any leak or destruction of our country's nuclear activities."
Moslehi gave no details of when the arrests had taken place or whether those detained were Iranians or foreign citizens.
According to experts the Stuxnet worm, designed to be delivered through a removable drive like a USB stick, is one of the most complex pieces of malicious code ever deployed. It was written specifically to attack Siemens industrial control units of the kind used in the Iranian nuclear program.
Suspicion for responsibility for the attack has inevitably focused on Israel and the US, although there is little evidence to support this.
The announcement of the arrests, intended to reassure Iranians, follows comments last week by another senior Iranian official, Mahmoud Liaii, who said: "An electronic war has been launched against Iran".
Iran has denied that the worm damaged the main control systems at Bushehr, rather infecting the laptops of some workers at the plant. However, the disclosure of the attack coincided with an announcement that the plant's inauguration has been delayed until at least next year because of continuing technical problems.
It was confirmed earlier this week that Iran will start fueling the Bushehr nuclear reactor with enriched uranium fuel over the next few days, months later than had been originally announced.
The vice-president, Ali Akbar Salehi, maintained the delay had nothing to do with the computer worm and said the plant had not been affected in any way.
"We hope to load the fuel into the Bushehr reactor by early October and the necessary groundwork for this is coming together, God willing, so it [the fuel] will be completely put in place in the heart [of the reactor] by November," he told the semi-official ISNA news agency.
In recent years Iran has announced the arrest of nuclear spies on a periodic basis. Three years ago it announced it had broken up a spy ring that had handed nuclear intelligence to the UK.
Why Your Ongoing Support Is Essential
Donald Trump’s attacks on democracy, justice, and a free press are escalating — putting everything we stand for at risk. We believe a better world is possible, but we can’t get there without your support. Common Dreams stands apart. We answer only to you — our readers, activists, and changemakers — not to billionaires or corporations. Our independence allows us to cover the vital stories that others won’t, spotlighting movements for peace, equality, and human rights. Right now, our work faces unprecedented challenges. Misinformation is spreading, journalists are under attack, and financial pressures are mounting. As a reader-supported, nonprofit newsroom, your support is crucial to keep this journalism alive. Whatever you can give — $10, $25, or $100 — helps us stay strong and responsive when the world needs us most. Together, we’ll continue to build the independent, courageous journalism our movement relies on. Thank you for being part of this community. |
Our work is licensed under Creative Commons (CC BY-NC-ND 3.0). Feel free to republish and share widely.
Iran says it has detained several "spies" it claims were behind cyber attacks on its nuclear program.
The intelligence minister, Heydar Moslehi, said western "spy services" were behind the complex computer virus that recently infected more than 30,000 computers in industrial sites, including those in the Bushehr nuclear power plant, appearing to confirm the suspicion of computer security experts that a foreign state was responsible.
The announcement also suggests that the attack involving the Stuxnet worm virus, which computer experts believe may have been designed to spy on Iran's nuclear facilities rather than destroy them, has caused more alarm in the regime than has so far been acknowledged.
In remarks carried on Iranian state television and the Mehr news service, Moslehi said Iran had discovered the "destructive activities of the arrogance [of the west] in cyberspace", adding that "different ways to confront them have been designed and implemented".
"I assure all citizens that the intelligence apparatus currently has complete supervision on cyberspace and will not allow any leak or destruction of our country's nuclear activities."
Moslehi gave no details of when the arrests had taken place or whether those detained were Iranians or foreign citizens.
According to experts the Stuxnet worm, designed to be delivered through a removable drive like a USB stick, is one of the most complex pieces of malicious code ever deployed. It was written specifically to attack Siemens industrial control units of the kind used in the Iranian nuclear program.
Suspicion for responsibility for the attack has inevitably focused on Israel and the US, although there is little evidence to support this.
The announcement of the arrests, intended to reassure Iranians, follows comments last week by another senior Iranian official, Mahmoud Liaii, who said: "An electronic war has been launched against Iran".
Iran has denied that the worm damaged the main control systems at Bushehr, rather infecting the laptops of some workers at the plant. However, the disclosure of the attack coincided with an announcement that the plant's inauguration has been delayed until at least next year because of continuing technical problems.
It was confirmed earlier this week that Iran will start fueling the Bushehr nuclear reactor with enriched uranium fuel over the next few days, months later than had been originally announced.
The vice-president, Ali Akbar Salehi, maintained the delay had nothing to do with the computer worm and said the plant had not been affected in any way.
"We hope to load the fuel into the Bushehr reactor by early October and the necessary groundwork for this is coming together, God willing, so it [the fuel] will be completely put in place in the heart [of the reactor] by November," he told the semi-official ISNA news agency.
In recent years Iran has announced the arrest of nuclear spies on a periodic basis. Three years ago it announced it had broken up a spy ring that had handed nuclear intelligence to the UK.
Iran says it has detained several "spies" it claims were behind cyber attacks on its nuclear program.
The intelligence minister, Heydar Moslehi, said western "spy services" were behind the complex computer virus that recently infected more than 30,000 computers in industrial sites, including those in the Bushehr nuclear power plant, appearing to confirm the suspicion of computer security experts that a foreign state was responsible.
The announcement also suggests that the attack involving the Stuxnet worm virus, which computer experts believe may have been designed to spy on Iran's nuclear facilities rather than destroy them, has caused more alarm in the regime than has so far been acknowledged.
In remarks carried on Iranian state television and the Mehr news service, Moslehi said Iran had discovered the "destructive activities of the arrogance [of the west] in cyberspace", adding that "different ways to confront them have been designed and implemented".
"I assure all citizens that the intelligence apparatus currently has complete supervision on cyberspace and will not allow any leak or destruction of our country's nuclear activities."
Moslehi gave no details of when the arrests had taken place or whether those detained were Iranians or foreign citizens.
According to experts the Stuxnet worm, designed to be delivered through a removable drive like a USB stick, is one of the most complex pieces of malicious code ever deployed. It was written specifically to attack Siemens industrial control units of the kind used in the Iranian nuclear program.
Suspicion for responsibility for the attack has inevitably focused on Israel and the US, although there is little evidence to support this.
The announcement of the arrests, intended to reassure Iranians, follows comments last week by another senior Iranian official, Mahmoud Liaii, who said: "An electronic war has been launched against Iran".
Iran has denied that the worm damaged the main control systems at Bushehr, rather infecting the laptops of some workers at the plant. However, the disclosure of the attack coincided with an announcement that the plant's inauguration has been delayed until at least next year because of continuing technical problems.
It was confirmed earlier this week that Iran will start fueling the Bushehr nuclear reactor with enriched uranium fuel over the next few days, months later than had been originally announced.
The vice-president, Ali Akbar Salehi, maintained the delay had nothing to do with the computer worm and said the plant had not been affected in any way.
"We hope to load the fuel into the Bushehr reactor by early October and the necessary groundwork for this is coming together, God willing, so it [the fuel] will be completely put in place in the heart [of the reactor] by November," he told the semi-official ISNA news agency.
In recent years Iran has announced the arrest of nuclear spies on a periodic basis. Three years ago it announced it had broken up a spy ring that had handed nuclear intelligence to the UK.
We've had enough. The 1% own and operate the corporate media. They are doing everything they can to defend the status quo, squash dissent and protect the wealthy and the powerful. The Common Dreams media model is different. We cover the news that matters to the 99%. Our mission? To inform. To inspire. To ignite change for the common good. How? Nonprofit. Independent. Reader-supported. Free to read. Free to republish. Free to share. With no advertising. No paywalls. No selling of your data. Thousands of small donations fund our newsroom and allow us to continue publishing. Can you chip in? We can't do it without you. Thank you.