Big Cyber Attack Hits Iran

Internet connectivity in Iran has dropped  to 75%  as a senior Iranian telecommunication official said that a "powerful" distributed denial-of-service (DDoS) attack that targeted Iran's telecom services on Saturday 8th February morning. National news agency sources claim the attack has now been as been aborted. 

The deputy director of Iran's Telecommunications Infrastructure Company (TCI) , Sajjab Bonabi, said that, despite cyber-attacks, the country will guarantee Internet service due to the strength of its technology, however, ttempts to access the officail TCI website for conformations have been unsuccessful to date.

According to NetBlocks, Iran has lost 25% of its Internet access as a result of cyber-attacks on the country’s infrastructure. After the precautions taken, Internet access returned to a normal setting after 7 hours. The DDoS attack was dealt with immediately using the Iranian Information Technology Fortress, known as DEJFA.

Mapping Internet freedom in real time, NetBlocks confirmed that there was a major glitch in Iran’s telecommunications network on the morning of February 8. NetBlocks, which detected flaws and critical cyber-attacks in real time, said that the Internet usage in the country has dropped up to 75%. in a post on Twitter.

Its is though the reason for losing about 25% of the internet in the country is due to the fact that Iranian authorities activated the “Digital Fortress” cyber defense mechanism known as DZHAFA. The NetBlocks report is also said to have implemented DEZHFA activation to “repel a cyber-attack on the country’s infrastructure”. It took 7 hours for the Internet connection to return to a normal setting.

After this outage, which affected both fixed and mobile network providers, it took 7 hours for normal internet connection to restart. 

Sadjad Bonabi, a spokesperson for the Telecommunications Infrastructure Company, which provides telecommunications infrastructure to all private and public operators in Iran, said in his statements on Twitter that the attacks on the country’s internet were a type of cyber-attack called ‘DDoS’ and returned to normal by DZHAFA intervention.

DDoS, which is a type of attack that prevents the system from serving and accessing users, is actually not unusual for countries. In December 2019, China used a similar method to coordinate protests in Hong Kong. We can say that this is the most recent example of the latest attack against the Iranian infrastructure.

In July last year the US launched a cyber-attack on Iran targeting the computer systems for controlling rocket and missile launches. 

The launch of the ‘Iran Zafar’ observation satellite, which will be launched into orbit on the same day, has been delayed. Iranian officials say there is no problem with launching the satellite and it will be launched at the earliest opportunity.  It is not yet known whether the launch lag and cyber-attack are related.

SOMAG News:        XinhuaNet:        PRENSA:          Mangalorean


You Might Also Read:

US Cyber Command Is A Tool Of Foreign Policy:

 


 

« The Geopolitics Of Cybersecurity
Fake News Uses Coronavirus To Spread Malware »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cloudera

Cloudera

Cloudera provide the world’s fastest, easiest, and most secure data platform built on Hadoop.

CyberTrap

CyberTrap

CyberTrap is an advanced highly-interactive deception technology allowing real-time analysis and control of security breaches.

Ivanti

Ivanti

Ivanti provide user-centered IT solutions designed to increase user productivity while reducing IT security risk.

CryptoTec

CryptoTec

CryptoTec is a provider of security concepts and encryption solutions for secure communication between decentralized computerized systems.

Zivaro

Zivaro

Zivaro provides transformational consulting and technology services to help clients attain real business value from their technology investments.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

Dualog

Dualog

Dualog provides a maritime digital platform which ensures that services work reliably and securely onboard.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

ID North

ID North

ID North is a Nordic service provider offering identity security to its customers by providing world class expertise and best-in-class solutions and services.

Lasso Security

Lasso Security

Lasso Security is a pioneer cybersecurity company ensuring comprehensive protection for businesses leveraging generative AI and other large language model technologies.

CyberHive

CyberHive

CyberHive offer a complete suite of threat protection modules that seamlessly integrate to block current, as well as future threats.

Sectricity

Sectricity

As independent ethical hackers, Sectricity go beyond traditional security, uncovering every vulnerability - testing both systems and employees to eliminate weak spots.