jueves, 11 de junio de 2015

IRAN SENSITIVE DATA ON NUCLEAR POWER STOLEN



IRAN SENSITIVE DATA ON NUCLEAR POWER STOLEN
THE POWER OF 5+1 NATIONS DEPOWERED BY HACKERS


Published time: June 10, 2015 . Edited time: June 11, 2015


INTRODUCTION by Hugo Adan.  June 11, 2015

FACT: The power of 5+1 nations (US, UK, France, China, Russia and Germany) who held talks with Iran on its nuclear program, has been depowered by suspected –though unknown- “state-sponsored” hackers. They stole the data needed on IRAN capacity to respond to an attack and declare the blah-blah finito, concluded. So, the charade 5+1 is over and soon we will see how this data will be used. Then we will know who were the  “state-sponsored” actors of the current affair.  Meanwhile there is an statement in the report of Kaspersky suggesting that Israel is behind this act & by association the CIA.

---- 

RT published a photo of the “Negotiators of Iran and six world powers face each other at a table in the historic basement of Palais Coburg hotel in Vienna April 24, 2015”. (Reuters/Heinz-Peter Bader).

Here extracts of the RT article  http://rt.com/news/266398-kaspersky-malware-duqu-iran/

The venues of Iranian nuclear talks were targeted by sophisticated spyware, which costs “at least $10 million” and was likely “state-sponsored,” the CEO Kaspersky Lab exclusively told RT. He said his company came under threat as well.

Among the hacks primary targets were hotels and conference halls where P5+1 powers (US, UK, France, China, Russia and Germany) held talks with Iran on its nuclear program. In its report Kaspersky Lab said that the “infections are linked to the P5 plus 1 events and venues related to the negotiations with Iran about a nuclear deal.”

According to Kaspersky Duqu 2, it is believed that “the bad guys” penetrated communications, including the Wi-Fi network as well as obtain hotel records on the room numbers of important guests, upload hotel’s CCTV video and sound files recorded by any microphones.

“Victims of Duqu 2.0 have been found in several places, including western countries, the Middle East and Asia,” the company said in its report titled The Duqu 2.0, technical details.”

Eugene Kaspersky, co-founder and CEO of Moscow-based Kaspersky Lab, has confirmed to RT that cyber spies were after “very sensitive data.”
 
“There could be different motivations,” Kaspersky said. “Of course there is political information, which costs a lot, any other kind of data which is sensitive or very interesting to the attackers.”

A VIDEO explain details on how they proceed:  “They were looking for info” . Here the URL of this Video

Over the last 18 months, the negotiations took place in various hotels in Austria, Switzerland, Oman and elsewhere, with Kaspersky Lab not revealing the names of the affected hotels. 

To Kaspersky’s “surprise,” his Lab has also been targeted by the cyber spies. Kaspersky Lab just recently discovered the hack on its own network as the company was testing a new program, which was aimed at tracking exactly the type of attack that the perpetrators performed.

Kaspersky Lab has also found out that “the group behind Duqu 2.0 also spied on several prominent targets.”  Thus, the 70th anniversary of the liberation of the Auschwitz-Birkenau concentration camps, which was attended by many heads of state, was also among the victims.
[ The last statement suggest that Israel & Mosad is one of the possible actors. The other could be CIA, since they are partners on the issue Iran ]

Kaspersky Lab is still working on establishing the exact amount of data that was stolen from its networks.  However, it seems unlikely that the hackers tried to infect the 400 million Kaspersky customers worldwide after hacking the company’s network.


====

No hay comentarios:

Publicar un comentario