اسب‌های تروای سایبری در آسیا: تحلیلی از رویارویی اسرائیل و ایران پس از حمله استاکس نت

نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانش آموخته کارشناسی ارشد علوم سیاسی، گروه علوم سیاسی، دانشگاه شیراز، شیراز ، ایران

2 استادیار روابط بین الملل، گروه علوم سیاسی، دانشگاه شیراز، شیراز، ایران

10.22099/ijas.2024.51157.1014

چکیده

رقابت اروپامحور قدرت‌های بزرگ برای دستیابی به قابلیت‌های هسته‌ای با گذر زمان به آسیا منتقل شد. اضافه شدن هند، پاکستان، کره شمالی و اسرائیل سبب شده که در حال حاضر دوسوم کشورهای هسته‌ای جهان، آسیایی باشند. هرچند رژیم ان‌پی‌تی جهت تضمین مدیریت صلح‌آمیز تهدیدات هسته‌ای تأسیس شد، برخی موجودیت‌های سیاسی همچون اسرائیل به‌صورت خودبنیاد، تهدیدهای هسته‌ای را مدیریت کردند. بررسی شیوه مدیریت تهدیدهای هسته‌ای توسط اسرائیل اهمیت دارد، زیرا یک دگرگونی در قلمرو تأمین امنیت را رقم زد. اسرائیل به کمک اسب‌های تروای سایبری، به‌ویژه به‌کارگیری کرم استاکس‌نت علیه برنامه هسته‌ای ایران، این تحول را شکل داد. در این مقاله، چنین تحولی در پرتو سؤال «حمله استاکس‌نت به برنامه هسته‌ای ایران چه تحولی را در قلمرو امنیت و منازعات ایران- اسرائیل رقم زد» بررسی شده‌ است. یافته‌ها نشان می‌دهد که پس از حمله استاکس‌نت، آسیا شاهد ورود موضوعات سایبری به قلمرو امنیت شد و ایران به‌عنوان کشور آماج این تهدیدها، به مدد تقویت زیرساخت‌های امنیت سایبری، تأسیس ارتش سایبری، بازنگری و سرمایه‌گذاری در توانمندی‌های سایبری به مدیریت این تهدیدها پرداخت. وقوع جنگ سایبری ایران- اسرائیل و عادی‌سازی کاربرد ترواها در آسیا پیامد اتخاذ این سیاست‌ها بوده است. روش مقاله حاضر توصیفی-تحلیلی است و از داده‌های کتابخانه‌ای بهره گرفته شده است.

کلیدواژه‌ها

موضوعات


عنوان مقاله [English]

Exploring Trojan Horses in Asia: An Analysis of Israeli-Iranian Confrontations Post the Stuxnet Attack

نویسندگان [English]

  • Masih Mirzaei 1
  • Yousof Qorashi 2
1 MA in Political Sciences, Political Sciences Department, Shiraz University, Shiraz, Iran
2 Assistant Professor of International Relations, Department of Political Science, Shiraz University, Shiraz, Iran
چکیده [English]

The competition among major powers to acquire nuclear capabilities has shifted from Europe to Asia over time. The addition of India, Pakistan, North Korea, and Israel has resulted in two-thirds of the world's nuclear countries being located in Asia. Although the NPT regime was established to ensure the peaceful management of atomic threats, some political entities, such as Israel, managed these threats independently. It is important to examine how Israel has managed nuclear threats because it signifies a transformation in the realm of security. Israel has influenced this development by utilizing cyber Trojan horses, particularly the Stuxnet worm, against Iran's nuclear program. In this article, the authors examine the impact of the Stuxnet attack on Iran's nuclear program and its influence on the realm of security and the Iran-Israel conflicts. The findings indicate that cyber issues have become part of security discussions in Asia after the Stuxnet attack. Iran, in response, aimed to deal with threats by bolstering its cybersecurity infrastructure, establishing a cyber army, and investing in its cyber capabilities. This has led to the occurrence of the Iran-Israel cyber war and the normalization of the use of Trojan horses in Asia as a consequence of these policies. This article relies on a descriptive-analytical method using library data.

کلیدواژه‌ها [English]

  • Asia
  • Cybersecurity
  • Iran
  • Israel
  • Stuxnet
  • Trojan Horse
حبیبی، رحمان، مجید یوسفی و علی رودباری (1400). تحلیل اسناد راهبردی رژیم صهیونیستی (استراتژی امنیت ملی، استراتژی آیزنکوت و استراتژی نظامی)، مطالعات بنیادین و کاربردی جهان اسلام، 3(8)، 9-38.
خلف‌رضایی، حسین (1392). حملات سایبری از منظر حقوق بین الملل (مطالعه موردی: استاکس نت). مجلس و راهبرد 73(20): 125-154.
خلیلی پور رکن‌آبادی، علی و یاسر نورعلی وند (1391) تهدیدات سایبری و تأثیر آن بر امنیت ملی،  فصلنامه مطالعات راهبردی 15, (56)، 167-196.‎
نامدار، سعید و غلامعلی قاسمی (1397). بررسی مفهوم دفاع مشروع در پرتو حملات سایبری (با تأکید بر حمله استاکس‌نت به تأسیسات هسته‌ای ایران)، مطالعات حقوقی 10(1): 199-235.
قرشی، سید یوسف و ناصر پورحسن (1400). واکاوی رفتارهای اسرائیل در سوریه در چهارچوب فرهنگ راهبردی (2020-2013)، پژوهش های روابط بین الملل، 11(4)، 141-148.
Ansari, A. M. (2006). Confronting Iran, London: Hurst & Company.
AP (2021) A cyberattack paralyzed every gas station in Iran, (October 18, 2023), at: https://www.npr.org/2021/10/27/1049566231/irans-president-says-cyberattack-was-meant-to-create-disorder-at-gas-pumps
Arad, U. (2023). Israel’s Policy Toward Iran’s Nuclear Program—Some Counterfactual Remarks, (15 March, 2024), at: https://jstribune.com/arad-israels-policy-toward-irans-nuclear-program/
Arghire, I. (2020). Iranian Hackers Target Israeli Companies with Pay2Key Ransomware, (December 21, 2023) at: https://www.securityweek.com/iranian-hackers-target-israeli-companies-pay2key-ransomware
Bendiek, A., and Tobias M. (2015). Deterrence theory in the cyber-century.
Buzan, B., and Hansen, L.  (2009) The evolution of international security studies, Cambridge University Press.
CBS (2011) Iran blames U.S., Israel for Stuxnet malware, (December 16, 2023), at: https://www.cbsnews.com/news/iran-blames-us-israel-for-stuxnet-malware/
CBS (2011) Iran claims the second major cyber attack, (December 12, 2023), at: https://www.cbsnews.com/news/iran-claims-second-major-cyber-attack/
Clear Sky (2020) Operation Quicksand, (October 15, 2023) at: https://www.clearskysec.com/operation-quicksand/
Creators, W. S. S. (2013). To Kill a Centrifuge, A Technical Analysis of What Stuxnet’s Creators Tried to Achieve, Munich: The Langner Group
Fassihi, F., Pérez-Peña, R., and Bergman, R. (2020) Iran Admits Serious Damage to Natanz Nuclear Site, Setting Back Program, (February 15, 2024) at: https://www.nytimes.com/2020/07/05/world/middleeast/iran-Natanz-nuclear-damage.html
FireEye Intelligence (2018). Suspected Iranian Influence Operation Leverages Network of Inauthentic News Sites & Social Media Targeting Audiences in U.S., UK, Latin America, Middle East, (August 21, 2023), at: https://www.fireeye.com/blog/threat-research/2018/08/suspected-iranian-influence-operation.html
Fox News (2011). Iran Admits Nuclear Sites Hit by 'Duqu' Cyberweapon, (November 14, 2023), at: https://www.foxnews.com/tech/iran-admits-nuclear-sites-hit-by-duqu-cyberweapon
Hounshell, B. (2011). Son of Stuxnet?, (December 19, 2023), at: https://foreignpolicy.com/2011/10/19/son-of-stuxnet/
i24NEWS (2023). Iran, Hezbollah behind cyber attack on Israeli hospital – investigation, (January 18, 2024), at: https://www.i24news.tv/en/news/israel-at-war/1702886863-iran-hezbollah-behind-cyber-attack-on-israeli-hospital-according-to-investigation
Ingram, D. (2018). Facebook and Twitter say they found an Iran-based propaganda effort, (January 20, 2024), at: https://www.nbcnews.com/news/amp/ncna902716
INNS (2016). The IDF Strategy, (December 25, 2023), at: https://www.inss.org.il/he/wp-content/uploads/sites/2/2017/04/IDF-Strategy.pdf
Kerr, P. K., Rollins, J., and Theohary, C. A. (2010). The Stuxnet computer worm: Harbinger of an emerging warfare capability, Congressional Research Service Washington, DC
Kim, Z. (2012). Wiper Malware That Hit Iran Left Possible Clues of Its Origins, (Aug 29, 2023) at: https://www.wired.com/2012/08/wiper-possible-origins/
Kivimaa, P., et al (2022). A socio-technical lens on security in sustainability transitions: Future expectations for positive and negative security., Futures, 141
Kushner, D. (2013). The Real Story of Stuxnet, (Feb 26, 2024), at: https://spectrum.ieee.org/the-real-story-of-stuxnet
Lindsay, Jon R. (2013). Stuxnet and the limits of cyber warfare. Security studies, 22(3): 365-404.
Lucas, G. R. (2014). Permissible preventive cyberwar: Restricting cyber conflict to justified military targets. The Ethics of Information Warfare, Springer: 73-83
Mattazaro, A. J. (2020). The future fight: Cyberwar at the operational level of war. Army Command And General Staff College Fort Leavenworth Ks, Tech. Rep.
Mellor, N. (2022). Arab Digital Journalism. Cybersecurity in the Middle East and North Africa by Valentina von Finckenstein.
Mills, E. (2012). Behind the 'Flame' malware spying on Mideast computers, (June 18, 2023) at: https://www.cnet.com/tech/services-and-software/behind-the-flame-malware-spying-on-mideast-computers-faq/
Nakashima, Ellen (2012) Iran acknowledges that Flame virus has infected computers nationwide, (June 29, 2023), at:
     https://www.washingtonpost.com/world/national-security/iran-acknowledges-that-flame-virus-has-infected-computers-nationwide/2012/05/29/gJQAzlEF0U_story.html
Nakashima, E. and Warrick, J. (2012) Stuxnet was work of U.S. and Israeli experts, officials say, (June 02, 2023), at:
    https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html
Nakashima, E., Miller, G. and Tate, J. (2012). U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say, (June 19, 2023), at: https://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html
Rashid, F. Y. (2011). Iran Claims Stars Virus a Second Cyber-Attack, (April 25, 2023), at: https://www.eweek.com/security/iran-claims-stars-virus-a-second-cyber-attack/
Reuters (2018). Iran's Khamenei calls for fight against enemy 'infiltration', (December 28, 2023), at: https://www.reuters.com/article/us-iran-khamenei/irans-khamenei-calls-for-fight-against-enemy-infiltration-idUSKCN1N20CN/
Reuters (2021). Iran says Israel, U.S. likely behind cyberattack on gas stations, (November 28, 2023), at:
     https://www.reuters.com/business/energy/iran-says-israel-us-likely-behind-cyberattack-gas-stations-2021-10-30/
Sanger, D. E. Iran Fights Malware Attacking Computers, (September 25, 2023), at:
     https://www.nytimes.com/2010/09/26/world/middleeast/26iran.html
Siobhán, O. (2021). What we know about the Natanz nuclear site attack, (April 14, 2023) at:
     https://www.washingtonpost.com/world/2021/04/12/faq-natanz-nuclear-site-attack-israel/
Srivastava, M. (2020). Israel-Iran attacks: ‘Cyber winter is coming’, (November 31, 2023) at: https://www.ft.com/content/3ea57426-40e2-42da-9e2c-97b0e39dd967
Brantly, A. F. (2018). The cyber deterrence problem. In 2018 10th International Conference on Cyber Conflict (CyCon), pp. 31-54. IEEE, 2018.
The Guardian (2021). ‘Cyber-attack’ hits Iran’s transport ministry and railways, (July 15, 2023) at:
     https://www.theguardian.com/world/2021/jul/11/cyber-attack-hits-irans-transport-ministry-and-railways
Time of Israel (2017). Unit 8200, (April 6, 2023), at:
     https://www.timesofisrael.com/topic/unit-8200/
ToI Staff (2020). 6 facilities said hit in Iran’s cyberattack on Israel’s water system in (April, 27 June, 2023) at: https://www.timesofisrael.com/6-facilities-said-hit-in-irans-cyberattack-on-israels-water-system-in-april/#:~:text=The%20Water%20Authority%20and%20Israel,incidents%20on%20April%2024%2D25.&text=Israel%20reportedly%20responded%20to%20the,chaos%20in%20the%20Islamic%20Republic.
ToI Staff and Agencies (2020). Iran cyberattack on Israel’s water supply could have sickened hundreds – report, 12 Kuly, 2023, at: https://www.timesofisrael.com/iran-cyberattack-on-israels-water-supply-could-have-sickened-hundreds-report/
Tzvi, J. (2022). Shin Bet uncovers Iranian attempts to lure Israeli businessmen, academics, (January 19, 2024, https://www.jpost.com/breaking-news/article-707147
UNAI (2023). How Iran Exports its Ideology, (June 26, 2024), https://www.unitedagainstnucleariran.com/sites/default/files/expansion/Iran%27s%20Ideological%20Expansion%20Final%20Report_11.28.23_JC_JMB_JC.pdf
Van Dine, A. (2017). After Stuxnet: Acknowledging the Cyber Threat to Nuclear Facilities. In Project on Nuclear Issues: A Collection of Papers from the 2016 Nuclear Scholars Initiative and PONI Conference Series. Center for Strategic and International Studies (CSIS) (pp. 101-114).
Warrick, J. and Nakashima, E. (2020 a) Foreign intelligence officials say attempted cyberattack on Israeli water utilities linked to Iran, (August 8, 2023), at: https://www.washingtonpost.com/national-security/intelligence-officials-say-attempted-cyberattack-on-israeli-water-utilities-linked-to-iran/2020/05/08/f9ab0d78-9157-11ea-9e23-6914ee410a5f_story.html
Warrick, J. and Nakashima, E. (2020 b) Officials: Israel linked to a disruptive cyberattack on Iranian port facility, (August 8, 2023), at: https://www.washingtonpost.com/national-security/officials-israel-linked-to-a-disruptive-cyberattack-on-iranian-port-facility/2020/05/18/9d1da866-9942-11ea-89fd-28fb313d1886_story.html
Warrick, J., Mekhennet, S. and Hendrix, S. (2020). Signs increasingly point to sabotage in fiery explosion at Iranian nuclear complex, (August 8, 2023), at: https://www.washingtonpost.com/national-security/signs-increasingly-point-to-sabotage-in-fiery-explosion-at-iranian-nuclear-complex/2020/07/06/d1035e84-bfce-11ea-b178-bb7b05b94af1_story.html
Weimann, G. (2006). Terror on the Internet: The new arena, the new challenges, US Institute of Peace Press.
Yong, W. (2011). Iran Discovers New Cyberattack, (June 18, 2023), at: https://www.nytimes.com/2011/04/26/world/middleeast/26iran.html
Ziv, A. (2020). Iranian Hackers Hit 80 Israeli Firms as Massive Cyberattack Continues, (Dec 16, 2023), at: https://www.haaretz.com/israel-news/tech-news/.premium-iranian-hackers-hit-over-80-israeli-firms-as-massive-cyberattack-continues-1.9375486