IRAN SENSITIVE DATA ON NUCLEAR POWER STOLEN
THE POWER OF 5+1 NATIONS DEPOWERED BY HACKERS
Published time: June 10, 2015 . Edited time: June 11, 2015
INTRODUCTION by
Hugo Adan. June 11, 2015
FACT: The power of 5+1
nations (US, UK, France, China,
Russia and Germany) who held talks with Iran on its nuclear program, has been depowered
by suspected –though unknown- “state-sponsored” hackers. They stole the data
needed on IRAN capacity to respond to an attack and declare the blah-blah finito,
concluded. So, the charade 5+1 is over and soon we will see how this data will
be used. Then we will know who were the “state-sponsored”
actors of the current affair. Meanwhile there is an statement in the report of Kaspersky suggesting that Israel is behind this act & by association the CIA.
----
RT published a photo of the “Negotiators of Iran and six
world powers face each other at a table in the historic basement of Palais
Coburg hotel in Vienna April 24, 2015”. (Reuters/Heinz-Peter Bader).
Here extracts of the RT article http://rt.com/news/266398-kaspersky-malware-duqu-iran/
The venues of Iranian nuclear talks were targeted by
sophisticated spyware, which costs “at least $10 million” and was likely
“state-sponsored,” the CEO Kaspersky Lab exclusively told RT. He said his
company came under threat as well.
Among the hacks primary targets were hotels and conference
halls where P5+1 powers (US, UK, France, China, Russia and Germany) held talks
with Iran on its nuclear program. In its
report Kaspersky Lab said that the “infections are
linked to the P5 plus 1 events and venues related to the negotiations with Iran
about a nuclear deal.”
According to Kaspersky Duqu
2, it is believed that “the bad guys” penetrated communications,
including the Wi-Fi network as well as obtain hotel records on the room numbers
of important guests, upload hotel’s CCTV video and sound files recorded by any
microphones.
“Victims of Duqu 2.0 have been
found in several places, including western countries, the Middle East and Asia,”
the company said in its report titled “The
Duqu 2.0, technical details.”
Eugene Kaspersky, co-founder and CEO of Moscow-based
Kaspersky Lab, has confirmed to RT that cyber spies were after “very
sensitive data.”
“There could be different
motivations,” Kaspersky said. “Of course there is political information,
which costs a lot, any other kind of data which is sensitive or very
interesting to the attackers.”
A VIDEO explain
details on how they proceed: “They were
looking for info” . Here the URL of this Video
Over the last 18 months, the negotiations took place in
various hotels in Austria, Switzerland, Oman and elsewhere, with Kaspersky Lab
not revealing the names of the affected hotels.
To Kaspersky’s “surprise,” his Lab has also been
targeted by the cyber spies. Kaspersky Lab just recently discovered the hack on
its own network as the company was testing a new program, which was aimed at
tracking exactly the type of attack that the perpetrators performed.
Kaspersky Lab has also found out that “the group behind
Duqu 2.0 also spied on several prominent targets.” Thus, the 70th anniversary of the liberation of the
Auschwitz-Birkenau concentration camps, which was attended by many heads of
state, was also among the victims.
[ The last statement suggest that Israel & Mosad is one of
the possible actors. The other could be CIA, since they are partners on the
issue Iran ]
Kaspersky Lab is still working on establishing the exact
amount of data that was stolen from its networks. However, it seems unlikely that the hackers
tried to infect the 400 million Kaspersky customers worldwide after hacking the
company’s network.
====
No hay comentarios:
Publicar un comentario