Iranian government suspected of hacking Mossad, CIA, MI6 sites

Israeli website offering reward for information on Israeli MIAs, Walla web portal also attacked • Technology experts: several digital certificates contain nationalist slogans in Farsi, the language spoken by most Iranians.

צילום: Diginotar.com // Dutch Certification Authority Diginotar.

A revenge attack for Stuxnet, or the Iranian regime's latest effort to crack down on political dissent-

Cyber-attackers who hacked into a Dutch Web security firm have issued hundreds of fraudulent security certificates for intelligence agency Web sites, including the Mossad, C.I.A., as well as for Internet giants like Google, Microsoft and Twitter, the Dutch government said on Monday.

The website of the Born to Freedom Foundation [www.10million.org], a site operated out of Tel-Aviv which promises $10,000,000 reward for proven information leading to Israeli soldiers missing in action, was also hacked.

The popular Israeli 'Walla' web portal was also hacked.

Experts say they suspect the hacker — or hackers — operated with the cooperation of the Iranian government, perhaps in attempts to spy on dissidents, AP reported.

The Malware Blog, an internet security blog, reported on Monday that it had concrete evidence that the recent compromise of Dutch Certification Authority Diginotar was used to spy on Iranian Internet users on a large scale.

Another internet security blog, TrendMicro, reported that it had has uncovered evidence that the fraudulent certificates issued as a result of the DigiNotar compromise have disproportionately and suspiciously affected users based in Iran. In Iran, all web traffic must pass through state approved proxies. Because of this, a third party was probably able to read all of the email messages an Iranian Internet user sent with his/her Gmail account.

According to TrendMicro, a significant part of Internet users who loaded the SSL certificate verification URL of Diginotar were from Iran on August 28, 2011. On August 30, 2011 most traffic from Iran disappeared and on September 2, 2011 about all of the Iranian traffic was gone.

The latest versions of browsers including Microsoft’s Internet Explorer, Google’s Chrome and Mozilla’s Firefox are now rejecting certificates issued by the firm that was hacked, DigiNotar.

But in a statement on Monday, the Dutch Justice Ministry published a list of the fraudulent certificates that greatly expands the scope of the July hacking attack that DigiNotar acknowledged only last week. The list also includes certificates that were sent to sites operated by Yahoo, Facebook, Microsoft, Skype, AOL, the Tor Project, WordPress, and by intelligence agencies like Israel’s Mossad and Britain’s MI6, AP said.

DigiNotar is one of many companies that sell the security certificates widely used to authenticate Web sites and guarantee that communications between a user’s browser and a site are secure, a sort of digital passport.

In theory, a fraudulent certificate can be used to trick a user into visiting a fake version of a Web site, or used to monitor communications with the real sites without users noticing.

But in order to pass off a fake certificate, a hacker must be able to steer his target’s Internet traffic through a server that he controls. That is something only an Internet service provider, or a government that commands one, can easily do.

According to AP, technology experts cite a number of reasons to believe the attack is connected to Iran. Notably, several of the certificates contain nationalist slogans in Farsi, the language spoken by most Iranians.

“This, in combination with messages the hacker left behind on DigiNotar’s Web site, definitely suggests that Iran was involved,” Ot van Daalen, director of Bits of Freedom, an online civil liberties group, told AP.

 

טעינו? נתקן! אם מצאתם טעות בכתבה, נשמח שתשתפו אותנו

כדאי להכיר