Categories: Malware

Stuxnet is Back! No, new agencies have misunderstood

Everytime a news related to Stuxnet is spread in internet immediately the world wide security community writes on cyber war and the possible consequences of a cyber attacks, but what is really happened this time?

Iranian authorities claim to have rejected a new cyber attack against industrial units located in the south of the country, but this doesn’t represent a novelty because Iran and its infrastructures have been hit during last years by different cyber offensives.

Many security experts and journalists blame governments of US and Israel as author of the dangerous cyber weapon Stuxnet, they have concentrated the effort to create a malware able to interfere with nuclear program of Iranian government.

Several years after its discovery the Stuxnet virus has hit a power plant and other industries in southern Iran according a declaration of an Iranian civil defense official.

Iranian news agency Fars revealed that a malware Stuxnet-like attacked the Culture Ministry’s Headquarters for Supporting and Protecting Works of Art and Culture and was reportedly sent from Dallas via switches in Malaysia and Vietnam.

The Iranian Students’ News Agency confirmed that the country’s Passive Defense Organization  had detected a computer virus offensive that hit an electric utility, the Bandar Abbas Tavanir Co, and other unspecified manufacturing industries in southern Hormozgan Province, home to a large oil refinery and container port in the provincial capital of Bandar e Abbas.

But Stuxnet is a well-known malware, and Iranian government has detected it successfully preventing any diffusion inside the networks of the country. The chief of the Passive Defense Organization’s provincial branch, Ali Akbar Akhavan, commented the event with the following statement:

“We were able to prevent its expansion owing to our timely measures and the cooperation of skilled hackers,”

Akhavan added that the malware was “Stuxnet-like”

There aren’t currently reliable information on the extent of any damage to structures, and unknown is also the real nature of the attacks. According some cyber security specialists the attacks could be a response of US and Israel for the cyber offensives that hit US financial institutions and also Saudi Arabian oil industry, but sincerely speaking I believe that we are facing with an ordinary and planned offensive that is totally independent from other events.

Iran is a privileged cyber targets and events like this are very common, I don’t understand the real motivation for the use of Stuxnet like malware, a cyber threat that could hardly produce effects desired due its past.

But … few hours after  the scenario totally changed, the same Ali Akbar Akhavan clarified:

“At a press conference we announced readiness to confront cyber attacks against Hormuzgan installations, which was mistakenly reported by the agencies as a cyber attack having been foiled,”  

Despite earlier on Tuesday, ISNA news agency quoted him as saying:

“A virus had penetrated some manufacturing industries in Hormuzgan province, but its progress was halted with … the cooperation of skilled hackers.”

What is really happened? Do news agencies created a non-case?

We’re probably before the nth propaganda campaign, during the last year other effects have been observed by Iranian cyber defense such as continuous network slowdowns and other mysterious attacks against national offshore oil and gas platforms.

While in cyberspace the dispute appears very active the world wide politics hope that diplomatic negotiations will be re-opened to solve the nuclear confrontation stalled since last summer.

Will diplomacy solve the situation? Who really benefits  this tension? It’s a mission impossible!

Pierluigi Paganini

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

20 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.