Names | Operation Olympic Games (self given) GOSSIPGIRL (?) | |
Country | USA Israel | |
Sponsor | State-sponsored, Equation Group (NSA), CIA and Unit 8200 | |
Motivation | Information theft and espionage, Sabotage and destruction | |
First seen | 2007 | |
Description | The events have been described in detail in the 2015 book Countdown to Zero Day and the 2016 documentary Zero Days. The piece of crucial information that was missing from both sources, how the malware was actually brought inside the facility, was documented in an investigative report in 2019. (The New York Times) From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program. Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet. | |
Observed | Sectors: Energy. Countries: Iran. | |
Tools used | Stuxnet. | |
Information | <https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html> <https://news.yahoo.com/revealed-how-a-secret-dutch-mole-aided-the-us-israeli-stuxnet-cyber-attack-on-iran-160026018.html> <https://open.spotify.com/episode/0qlbXt6FWftwS94UUfluOT?si=_pdmIrbpRdW7umqXXFIqBw&nd=1&dlsi=e45c589309dc4c62> <https://www.volkskrant.nl/kijkverder/v/2024/sabotage-in-iran-een-missie-in-duisternis~v989743/> |
Last change to this card: 17 January 2024
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |