The Israeli nuclear program has been subject to multiple security vulnerabilities since its establishment in the early 1980s.
Israel’s weapons production program was largely under the radar until the mid-2000s when it was exposed for the first time in a high-profile attack.
The first attack was attributed to the PLO, which had previously claimed responsibility for a string of nuclear explosions in the Palestinian territories.
But the next was attributed not to the group, but to the government of Prime Minister Benjamin Netanyahu, which was accused of orchestrating a cover-up that resulted in the assassination of the Israeli ambassador to the United States.
Now the Israeli government is also facing a threat that is even more insidious.
According to security experts, the Israeli military may be using a bug that can be used to steal sensitive information.
And since the last attack, security experts believe the government is using it to sabotage sensitive systems, as well as launch cyberattacks that are intended to compromise the nuclear program’s core infrastructure.
The Israeli security apparatus is a “tremendous challenge” to the ability of adversaries to conduct their operations, Aviv Gushman, director of the Israel-US Program at the Middle East Institute, told Al Jazeera.
“I think the most interesting thing about this vulnerability is that it’s the first that we have seen.
We know it exists and we know how to fix it.”
Gushmans assessment is based on research conducted in the past six years by a team of researchers from the Institute for National Security Studies, Israel’s top nuclear research agency.
This team found that a bug in the Israeli state’s Nuclear Security Authority (NSA) – the countrys largest security agency – allows attackers to bypass the agency’s security controls by using a remote program.
The researchers have discovered that the vulnerability exists in an operating system that is built into the RSA algorithm, which is the core cryptographic foundation for most of the world’s encryption systems.
The flaw is particularly worrisome given that the RSA encryption algorithm was designed for use in commercial and commercial-grade computers and used in some of the biggest and most complex systems in the world.
The vulnerabilities were found by a group of researchers at the Hebrew University of Jerusalem and Tel Aviv University, who wrote a paper in January titled “A vulnerability in the RSA cryptographic library allows a remote attacker to perform remote code execution.”
The researchers say that the attack can be carried out via the RSA crypto library in Linux operating systems, Windows operating systems and other platforms.
The attacks can be made using the software installed on a targeted machine.
This is in addition to the attack that is being used to carry out the previous attack.
If the attackers manage to gain access to the system, they can use it to remotely access critical parts of the nuclear infrastructure, including nuclear facilities, the researchers say.
It is unclear whether the flaw exists in the code of the software, which may or may not be vulnerable.
But, the research team is hopeful that they will be able to exploit it and then carry out further attacks against the nuclear industry.
“The research team has not yet determined the severity of the attack, but we expect it to be very serious,” Gushmen told Aljazeera.
“We believe that the system that’s vulnerable could be used for many purposes.”
The authors of the paper said that the flaws could be exploited by a number of different attackers.
One possible scenario is for attackers to steal information from a nuclear facility by using an exploit known as a “shellshock”.
This exploit would allow the attackers to read files from the affected system and execute malicious code that would cause the system to reboot.
Another possible scenario would be for the attackers in the Mossad to steal data from the nuclear facility and execute the exploit.
The authors also say that another possible scenario involves a group in the military, using the exploit to launch cyber attacks on a nuclear power plant, which could be a way to compromise sensitive nuclear systems.
“This is something that’s not easy to detect, because we don’t have any physical access to any nuclear plant,” Goshman said.
“There are some ways to exploit this vulnerability, but it is a very difficult one.”
As part of their research, the team used the RSA-128 cipher suite, which encodes information that is transmitted between computers in the internet.
This enables the team to break into the cryptographic libraries of other cryptographic algorithms, and exploit the weaknesses in those algorithms, the authors wrote in their paper.
Gushmann said that he believes that the researchers were able to identify a weakness in the cryptographic algorithms of RSA and ECC-19.
“They have a strong security posture,” he said.
Goshmann added that he hopes that the research can help other researchers in the field.
“Hopefully, other researchers will also come forward and see this vulnerability and be able see how they can exploit it,” he told AlJazeera.
The research paper is available at https://jms.mit.edu/~gushman/papers/jms-2016-0025