Israel and Saudi Arabia are plotting a cyber weapon worse than Stuxnet

Iranian report states that Israel and Saudi Arabia are plotting new computer cyber weapon to sabotage the Iranian nuclear program like happened with Stuxnet. Saudi spy agency, Mossad are collaborating in the design of malware worse than Stuxnet.

The Fars agency reported that Israel and Saudi Arabia have started a joint collaboration for the development of a new cyber weapon with the intent to spy on and destroy the Iranian nuclear program.

The Iranian agency explicitly referentied “an informed source” close to the Saudi secret service, the informant cited a meeting happened in Vienna on November 24th between  that Saudi spy chief Prince Bandar bin Sultan and the Mossad head Tamir Pardo. The meeting was arranged to discuss about the “‘two sides’ cooperation in intelligence and sabotage operations against Iran’s nuclear program.”

“One of the proposals raised in the meeting was the production of a malware worse than the Stuxnet to spy on and destroy the software structure of Iran’s nuclear program,” revealed the source to the Fars agency.

Just a week ago Arab media reported that Prince Bandar met in Tel Aviv the Prime Minister Benjamin Netanyahu and French President Francois Hollande to discuss on diplomatic relations between US and Iran.

Netanyahu appealed to American and French governments to oppose the proposed agreement with Iran, he considers Iran’s nuclear program a direct threat to Israel’s state.

A new cyber weapon similar to Stuxnet is the goal of the partnership, the popular malware was designed according various sources by Israeli in a joint collaboration with US to hit Iran’s uranium enrichment program and in particular it was used to infect SCADA within the nuclear facility at Natanz. Also Edward Snowden confirmed to Der Spiegel that the U.S. cooperated with Israel to design and deploy produce the Stuxnet virus.

Recently the Sunday Times reported of other secret dialogues between Israel and Saudi Arabia to arrange a possible attack against Iran in case of failure for the Geneva talks on Iranian nuclear program, the Saudis would allow Israel use of air space and provide drones, rescue helicopters and tanker planes to the allies to support the operations.

“Once the Geneva agreement is signed, the military option will be back on the table. The Saudis are furious and are willing to give Israel all the help it needs,” the Times quoted the source as saying.

Israel and Saudi Arabi consider Iran an enemy to destroy, the progress of Iranian nuclear program are not acceptable and represent for both governments a dangerous threat.

The creation of cyber weapons is no less dangerous of the Iranian nuclear program, the diffusion of such malware could cause serious damage to a critical infrastructure with unpredictable results, nor to exclude the possibility to directly hit innocent population.

Exactly as for nuclear program it is absolutely necessary the definition of a shared law framework that establish how to use a cyber weapon and which are the rules of engage, a cyber weapon could have effects similar to a nuclear bomb.

Pierluigi Paganini

(Security Affairs –  Israel, cyber weapon)

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Cisco addressed high-severity flaws in IOS and IOS XE software

Cisco addressed multiple vulnerabilities in IOS and IOS XE software that can be exploited to…

2 hours ago

Google: China dominates government exploitation of zero-day vulnerabilities in 2023

Google's Threat Analysis Group (TAG) and Mandiant reported a surge in the number of actively…

9 hours ago

Google addressed 2 Chrome zero-days demonstrated at Pwn2Own 2024

Google addressed two zero-day vulnerabilities in the Chrome web browser that have been demonstrated during…

20 hours ago

INC Ransom stole 3TB of data from the National Health Service (NHS) of Scotland

The INC Ransom extortion group hacked the National Health Service (NHS) of Scotland and is threatening…

1 day ago

CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Microsoft SharePoint vulnerability disclosed at the…

1 day ago

The DDR Advantage: Real-Time Data Defense

This is the advantage of Data Detection and Response (DDR) for organizations aiming to build…

1 day ago

This website uses cookies.