Although the Iranian regime remains vulnerable to more cyber attacks in the aftermath of the "Stuxnet" worm that disrupted its uranium enrichment work, Tehran may be receiving help from Russian proxies for its digital security, some analysts say.
- Report: Flame virus gets order to self destruct
- IDF says 'defined essence of cyber warfare'
Kuwaiti imam: Cyber jihad effective
The nuclear program is "really not that well protected" from more digital assaults and Iran will be hard-pressed to safeguard its uranium enrichment efforts from tainted software, said David Albright, president of the Institute for Science and International Security (ISIS).
"With Stuxnet, they lost about a year. And it caused a lot of confusion. They really didn't know what hit them," he said. "It looks like a viable way to disrupt their program."
The US, which reportedly masterminded the Stuxnet operation along with Israel, has every incentive to press ahead with a cyber campaign to undermine Iran's atomic ambitions, according to analysts.
- For more on the raging cyber war click here
The next cyber attack, possibly in combination with more traditional spy craft, could shut off valves or issue incorrect orders that might cause an explosion at a sensitive site.
"I think that it could get more violent," Albright said. "I would expect more facilities to blow up."
A major explosion at a missile plant in Iran in November sparked speculation that the incident was the result of sabotage.
"There is of course the possibility of sending in a team to modify a system in a way that would make it vulnerable, and then use a cyber weapon at a later date as a trigger event," said David Lindahl, research engineer at the Swedish Defense Research Agency.
A new wave of cyber attacks could involve inserting hardware with infected chips into the industrial process, possibly through an agent or a duped employee, or penetrating diagnostic software used to gauge uranium enrichment or other work, Lindahl said.
But some cyber security experts suspect Russian proxies could be assisting Iran with its digital defenses, and possibly helped Tehran trace the origins of Stuxnet.
"The part that we probably miscalculated on in Stuxnet was the (possible) assistance of the Russians in attribution," said James Lewis, senior fellow at the Centre for Strategic and International Studies.
"The Iranians never would have figured this out on their own," said Lewis, a former senior government official with the Departments of State and Commerce.
By pushing the boundaries of cyber warfare, the US has left itself open to retaliation. But US officials clearly view the risks associated with digital strikes as dwarfed by the dangers of an all-out war with Iran.
Bombing raids are "more likely to explode the region and certainly could lead to a conflict with Iran, and that would be very messy", said Lewis. "Cyber is much cleaner."
- Receive Ynetnews updates
directly to your desktop