Iran attacking critical infrastructures-Cylance report
December 2nd, the Cylance report on OpCleaver was made public. The report provides details about Iranās program to attack critical infrastructures. I have been concerned about Iranās capabilities and intents for several years and have blogged about it in the past. These include articles I have reviewed by an āIranian engineerā on Stuxnet and Siemens safety systems, articles by Iranian professors on ICS cyber security methodology, and Iran translating Project Shine into Farsi. As an engineer not a threat analyst, I do not know why Iran has chosen to publish some of the articles but I am sure there is a message there. Make no mistake, these articles displayed detailed technical competency. I have expressed my concerns about the Iranian threat in most of my presentations for the past several years because the perceived focus has been on China and Russia. This is not an āI told you soā note. It is a note expressing concern that our critical infrastructure organizations such as NERC, FERC, NRC, NEI, AWWA, and others do not appear to be taking this threat seriously. DHS made the unconscionable mistake of declassifying Aurora in July. Unfortunately, NERC and NRC have not taken any adequate steps to address this targeted threat whose declassified information actually provides a targeted hit list while at the same time DOE wonāt even acknowledge Aurora exists. Congress is still gridlocked about passing any legislation which can be good or bad depending on the legislation that may be enacted. Even the recent NIST framework may not be sufficient to address this threat. Nero, in the guise of our critical infrastructure organizations, appears to be fiddling while Rome burns.
Joe Weiss
