New revelations and intrigues about Stuxnet
The tale of Stuxnet, the software that disrupted the Iranian nuclear program and was subsequently dubbed the first known cyberweapon, is being discussed more than 15 years later.
De Volksrant, a Dutch daily, conducted an investigation that really exposed the whereabouts of the Dutch spy who entered the uranium enrichment plant in Natanz and introduced the virus that eventually destroyed the centrifuges. However, the newspaper claims that the Dutch intelligence agency, AIVD, which had planned the operation following discussions with the CIA, was not entirely aware of all the specifics. Politicians in the nation, however, were even less conscious of the consequences.
According to an investigation by De Volksrant and Yahoo News in 2019, there was also a little Dutch involvement in the highly coordinated cyber sabotage operation known as the Olympic Games, which had Iran as the objective and the USA and Israel as the major actors. But a lot more information was released today. To begin with, who exactly transported Stuxnet to Natanz, which was shielded from prying eyes and had no internet connection, is a mystery.
In actuality, the AIVD made the bold decision to hire Erik van Sabben, a Dutch engineer who had an Iranian wife, resided in Dubai, and worked for a transport firm that conducted business with Iran. Put succinctly, it was an ideal cover.
In 2007, Van Sabben entered Natanz and installed Stuxnet-carrying equipment. A few weeks after he hurriedly and furiously left Iran at the end of 2008, the engineer perished in a motorcycle accident in Dubai. Though several Secret Service agents expressed doubts about his abrupt passing following the procedure, there is no proof that the accident was anything more.
This was the first instance where dangerous malware—which could have destroyed an important industrial plant—had been disseminated by some nations against others, as far as we are aware.
The use of Stuxnet for sabotage had significant global repercussions. Other nations started to build digital weapons once the operation was made public, with Iran leading the way.
According to De Volkskrant, national lawmakers were unaware of the AIVD's plan to undermine Iran's nuclear program in this way. Political assessment of the operation's hazards or legality would not have occurred as a result.
However, not even the AIVD operatives participating in the operation were aware that the equipment on its way to Natanz was carrying a digital weapon.
In actuality, the Dutch understanding of digital operations extended beyond Stuxnet. The AIVD breached the computers of the Cozy Bear hacking organization in 2014 and 2015, allowing them to see firsthand how the Russians were infiltrating the networks of American Democrats and informing the FBI of the incident.
While the Dutch police have taken the lead in a number of cyber operations to combat crime, breaking into dark web marketplaces and taking down cryptophone networks.