Experts: US cyber-attack on Iran may have exploited a loophole at their system

The US cyber-attack last week, according to US officials, was used against Iranian information systems to control rocket fire.
Experts says, that there is a loophole in the system that is supposed to be flawless.
The US media quoted these officials as saying that the United States launched cyber-attacks against Iran last week, targeting an Iranian spying network, after the Iranian army shot down the US spying and reconnaissance plane.
The Washington Post reported that US President Donald Trump secretly authorized the US cyber-command to launch retaliatory cyber-attacks against Tehran.
Despite the “tightening” of military information software, according to a military term means the most protected systems, the information experts who compete units of information in modern armies to join them, still find a way to infiltrate them.
“The simplest thing is for a member of the Special Forces to place a memory key + USB + containing virus in the right place”, according to Leuk Guiseau, assistant secretary general of the French Security and Information Club, told AFP.
In the midst of a nuclear crisis, Tehran accused the United States and Israel of attacking it with the “Stoxent” virus, which infected thousands of computers and shut down centrifuges used to enrich uranium.
It took Iran years to overcome the consequences of this attack, which didn’t recognize the States and Israel to stand behind him.
Experts believe that the Iranian Revolutionary Guard mostly extracted lessons from this attack, and took precautions to isolate his military information network from the Internet.
But a military expert, speaking on condition of anonymity, told AFP that “the anti-aircraft defense system needs to be radar, command and control centers, and land-to-air missile sites, interconnected”.
“So, it is tied to internal electronic networks that must be at one moment or another connected to the Internet”, he explained, “here lies the gap”.
“In the past, there was no way of communicating with a weapons system and no information systems.
Today, it’s about computers that mostly use operating systems derived from commercial systems, that is, they can be targeted through known methods”.
“Despite all the efforts to protect it, nothing is immune from attacks”, he said.
To achieve this, electronic armies, especially US and Israeli, have huge resources and employ high-level specialists.
The US e-command last May became a combat unit within the US military with a multi-billion dollar budget. In Israel, the famous 8200 electronic unit attracts the best programmers out there.
The defense expert explains that when cyber attackers “identify the entry point”, they “enter the network with messages with malicious software that are very aggressive and neutralize the air defense network at least in part”.
“They are blocking either the detection process, nothing can be seen, either the interceptor, identification and destruction systems of the surface-to-air missile batteries, or all together, and that is the overwhelming attack”, he said.
In March 2017, researcher at the French Institute for International Relations, Remi Himez, raised the Israeli army’s use of a program called “Sater” to bypass Syrian defenses in 2007 and bomb a center believed to have a nuclear reactor.
Himez said the move outlined how the cyber weapons could contribute to the success of an air strike.
“Such a process, and such a process that targeted Iran recently, according to US officials, takes months or years of preparation”, he said.
“The US National Security Agency has developed plans with well-trained teams and has set up huge budgets to get all the equipment purchased from Outside, even if the cost is very high”.