Was it just a gas tank explosion, or an act of cyber sabotage?
An Iranian general would not rule out that a massive explosion east of Tehran last week was caused by “hacking,” amidst much speculation by military anaysts.
Both the United States and Israel deny involvement.
Iranian authorities had attempted to downplay the blast — which tore through a missile factory east of Tehran — as a gas tank explosion at a different industrial park. But one official refused to rule out an act of cyber-sabotage, Matthew Petti of National Interest reported.
“On the explosion of the Parchin gas facilities, it has been mentioned that the incident was caused by hacking the center’s computer systems,” said Brig. Gen. Gholamreza Jalali, head of the Passive Defense Institution, at a conference on anti-chemical weapons defense.
“But until we come to a conclusion on the dimensions of this incident and the claim, we cannot comment.”
The explosion damaged the Khojir missile production complex, according to satellite imagery, but Iranian authorities have insisted that it actually took place at the Parchin industrial park forty kilometers away, The National Interest reported.
The apparent coverup — along with international tensions around Iran’s missile program —have raised suspicions of foul play.
Iran’s missiles were a topic of debate at the UN Security Council on Tuesday, which was debating whether to extend an international arms embargo on Iran, The National Interest reported. The US is using a recent Iranian space launch to argue that Iran is pursuing a dangerous ballistic missile program.
The US and Israel have worked together to sabotage the Iranian nuclear program in the past, using motorcycle-borne assassins to kill scientists and a cyberweapon called Stuxnet to damage nuclear facilities. A site like Khojir would fall within the crosshairs of a similar campaign aimed at Iran’s conventional missiles.
Israeli journalist Barak Ravid asked US envoy Brian Hook about last week’s explosion during an interview for Channel 13.
“We don’t have any observations to make on that,” replied Hook, the State Department official in charge of Iranian affairs. He added that Iran’s missile program is “very concerning.”
Israeli officials also told the New York Times that they were not involved.
“There is a motivation, when you’re using a cyberweapon, to leave attribution murky…to keep cyber conflict below the threshold of armed conflict, and to minimize the risk of geopolitical fallout,” said Daniel Frey, a cyber threat investigator at Advanced Intelligence LLC.
Stuxnet was an extremely sophisticated weapon designed to evade detection. It interfered with the control systems for nuclear centrifuges, causing them to spin too quickly or too slow, while giving false readings to the controller, The National Interest reported.
Things have changed, however, since the Stuxnet era.
Iran and North Korea are now “second to Russia and China” in terms of cyber-warfare capabilities, Frey said. “It is clear that Iran now poses a threat to critical infrastructure, and the US government itself recognizes this.”
US officials have warned that Iran’s cyber-arsenal is increasingly sophisticated.
Advanced Intelligence LLC found that an Iranian cyber-entity named Achilles may have even compromised British government and Australian defense industry accounts.
Yelisey Boguslavskiy, head of research at Advanced Intelligence LLC, claims that Achilles “is not only active but is expanding their hacking activities targeting critical national infrastructure” in cooperation with Russian-speaking ransomware attackers.