The United States spent 150 billion yen to destroy Iran's nuclear facilities, and a Dutch spy organization carried out the operation, but the Dutch government may not have been aware of the situation.



The United States and Israel are known to have led efforts to sabotage Iran's nuclear testing facilities in the late 2000s, and the sabotage used the malware `` Staxnet '' developed by the United States and Israel. Officials have testified that the person who infiltrated Stuxnet into the target of the attack was a spy from the Dutch intelligence agency AIVD . It was newly reported that 1 billion dollars (approximately 150 billion yen) had been invested in the development of Stuxnet, and that the Dutch government was not aware of AIVD's involvement.

Sabotage in Iran: een missie in duisternis
https://www.volkskrant.nl/kijkverder/v/2024/sabotage-in-iran-een-missie-in-duisternis~v989743/

'Dutch engineer carried out Iranian nuclear sabotage': VK - DutchNews.nl
https://www.dutchnews.nl/2024/01/dutch-engineer-carried-out-iranian-nuclear-sabotage-vk/

Dutch Engineer Used Water Pump to Get Billion-Dollar Stuxnet Malware Into Iranian Nuclear Facility: Report - SecurityWeek
https://www.securityweek.com/dutch-engineer-used-water-pump-to-get-billion-dollar-stuxnet-malware-into-iranian-nuclear-facility-report/

It was in the 2010s that sabotage efforts by the United States and Israel against Iran's nuclear testing facilities came to light. Malware called ``Stuxnet'' was discovered in multiple countries including Iran in 2010, but in 2012, the New York Times reported that ``Stuxnet is linked to the US National Security Agency (NSA) and Israel's It was developed by the intelligence agency Unit 8200. Furthermore, in 2016, the United States and Israel launched a cyber operation called 'NITRO ZEUS' against Iran, which targeted Iran's air defense network, communication systems, power grid, and other important facilities. It has also been revealed that it was developed as part of Nitro Zeus.

Existence of US electronic warfare plan ``NITRO ZEUS'' against Iran revealed - GIGAZINE


by Christiaan Colen

Even after the existence of Stuxnet was revealed, it remained unclear who planted Stuxnet in Iran's nuclear testing facility, but in 2019 a source said, ``A spy hired by AIVD. revealed that around 2007, Stuxnet stored on a USB memory was installed at a nuclear testing facility.

Details that the cyber attack on Iran's nuclear fuel facility was carried out by infiltrating a ``Dutch spy'' - GIGAZINE


by kalhh

Newly, the Dutch newspaper 'de Volkskrant' has reported details of the spy who planted Staxnet at Iran's nuclear test facility. According to reports, the spy's name is 'Eric van Sabben,' his gender is male, and he works in Iran and is married to an Iranian woman. Eric van Sabben allegedly planted Stuxnet in the water pumps of a nuclear test facility in Natanz, Iran, on instructions from the AIVD, but the Dutch government was not aware of the AIVD's operation. It is also reported that Eric van Sabben died in a motorcycle accident in the United Arab Emirates two years after carrying out the operation.

de Volkskrant also reported that the development cost of Stuxnet was between $1 billion and $2 billion (150 billion yen to 300 billion yen). However, Kostin Raiu, a former security expert at the security company Kaspersky, points out that ``it is unrealistic that it cost more than $1 billion.''




in Security, Posted by log1o_hf