Big Cyber Attack Hits Iran

Internet connectivity in Iran has dropped  to 75%  as a senior Iranian telecommunication official said that a "powerful" distributed denial-of-service (DDoS) attack that targeted Iran's telecom services on Saturday 8th February morning. National news agency sources claim the attack has now been as been aborted. 

The deputy director of Iran's Telecommunications Infrastructure Company (TCI) , Sajjab Bonabi, said that, despite cyber-attacks, the country will guarantee Internet service due to the strength of its technology, however, ttempts to access the officail TCI website for conformations have been unsuccessful to date.

According to NetBlocks, Iran has lost 25% of its Internet access as a result of cyber-attacks on the country’s infrastructure. After the precautions taken, Internet access returned to a normal setting after 7 hours. The DDoS attack was dealt with immediately using the Iranian Information Technology Fortress, known as DEJFA.

Mapping Internet freedom in real time, NetBlocks confirmed that there was a major glitch in Iran’s telecommunications network on the morning of February 8. NetBlocks, which detected flaws and critical cyber-attacks in real time, said that the Internet usage in the country has dropped up to 75%. in a post on Twitter.

Its is though the reason for losing about 25% of the internet in the country is due to the fact that Iranian authorities activated the “Digital Fortress” cyber defense mechanism known as DZHAFA. The NetBlocks report is also said to have implemented DEZHFA activation to “repel a cyber-attack on the country’s infrastructure”. It took 7 hours for the Internet connection to return to a normal setting.

After this outage, which affected both fixed and mobile network providers, it took 7 hours for normal internet connection to restart. 

Sadjad Bonabi, a spokesperson for the Telecommunications Infrastructure Company, which provides telecommunications infrastructure to all private and public operators in Iran, said in his statements on Twitter that the attacks on the country’s internet were a type of cyber-attack called ‘DDoS’ and returned to normal by DZHAFA intervention.

DDoS, which is a type of attack that prevents the system from serving and accessing users, is actually not unusual for countries. In December 2019, China used a similar method to coordinate protests in Hong Kong. We can say that this is the most recent example of the latest attack against the Iranian infrastructure.

In July last year the US launched a cyber-attack on Iran targeting the computer systems for controlling rocket and missile launches. 

The launch of the ‘Iran Zafar’ observation satellite, which will be launched into orbit on the same day, has been delayed. Iranian officials say there is no problem with launching the satellite and it will be launched at the earliest opportunity.  It is not yet known whether the launch lag and cyber-attack are related.

SOMAG News:        XinhuaNet:        PRENSA:          Mangalorean


You Might Also Read:

US Cyber Command Is A Tool Of Foreign Policy:

 


 

« The Geopolitics Of Cybersecurity
Fake News Uses Coronavirus To Spread Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

Smoothwall

Smoothwall

Smoothwall develop intelligent web filtering, Monitoring and security solutions designed to protect users worldwide.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

H-ON Consulting

H-ON Consulting

H-ON Consulting develops and applies robust cyber security procedures enabling control systems to be secure.

NSO Group

NSO Group

NSO Group develops technology that enables government intelligence and law enforcement agencies to prevent and investigate terrorism and crime.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst helps Canadians and Canadian companies seize the opportunities and tackle the challenges of cybersecurity.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

FPG Technologies & Solutions

FPG Technologies & Solutions

FPG Technology is a technology solutions provider and systems integrator, specializing in delivering IT Consulting, IT Security, Cloud, Mobility, Infrastructure solutions and services.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.