Iran's oil ministry today confirmed that it was the target of malware attacks over the weekend, adding to reports by state-run media that the country's oil industry was hit by hackers.
The Mehr News Agency, which is a semi-official arm of the Iranian government, reported Monday that the country's principal oil terminal on Kharg Island was disconnected from the Internet as part of the response to the attacks. Email systems associated with the targets were also pulled offline.
Kharg Island, which is in the Persian Gulf off the western coast of Iran, handles the bulk of the country's oil exports.
A spokesman for the Ministry of Petroleum acknowledged the attacks, but said that critical servers at the reported targets -- the ministry, Iran's national oil company and Kharg Island -- were not affected because they are isolated from the Internet.
The ministry spokesman also said that the malware, which he did not identify, resulted in the theft of some user information from websites and some minor damage to data stored on the web servers. According to the ministry, no data was actually lost because backups were available.
Later Monday, Mehr reported that the attacks had prompted authorities to create a crisis management committee to counter the threats.
Those reports were echoed Monday by the Fars News Agency, which also has ties to the Iranian government.
The attacks immediately brought to mind Stuxnet, the worm that targeted Iran's nuclear fuel enrichment project in 2009, and reportedly set back the program after damaging hundreds of gas centrifuges.
Symantec, whose researchers were instrumental in analyzing Stuxnet three years ago, said it could not corroborate Iran's claims that a worm was responsible for the new attacks. But Liam O Murchu, manager of operations with Symantec's security response team, did note that Duqu, malware that some experts had tagged as a follow-up to Stuxnet, had infected some Iranian computers last year.
In November 2011, Iranian officials admitted that Duqu had done some damage, but claimed that the malware was "under control."
Earlier in 2011, Moscow-based Kaspersky Lab said that the "Stars" malware -- which an Iranian military officer confirmed had targeted Iranian machines in April -- was probably a part of Duqu.
O Murchu said the same today.
"And one of the industries that Duqu targeted was the energy industry," said O Murchu. He said there was no concrete evidence to link Duqu to Sunday's attacks, however.
Duqu resurfaced in late March 2012 after a five-month hiatus, O Murchu and other researchers said at the time.
O Murchu suspected that the recent attacks were aimed at Iranian websites, and were likely not based on a worm. "They do give the impression that it was an outside attack, rather than a malicious piece of software," said O Murchu, citing such things as the sites being yanked from the Internet.
While it's unusual for victims to acknowledge attacks -- doubly so for governments or critical industries -- Iran has publicly confirmed previous attacks. In this case, it may have felt it had no alternative.
"When someone has to take down a public website, that's different," said O Murchu, leaning toward that explanation for Iran's attack acknowledgement.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed. His email address is [email protected].
Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.