Iran Admits To Being Hit By Cyber Attack

Iran’s strategic computer and infrastructure networks reportedly fell under an extensive and powerful cyber-attack in the last several days, according to Israeli news reports on Wednesday 31st Oct. Analysts believe this attack is far more potent than the “Stuxnet” virus which hit Iranian networks a few years ago.

Speculation has fallen on Israel as the perpetrator of the attack, though Jerusalem remains tight-lipped

Gholamreza Jalali, head of Iran’s civil defense agency, told media outlets on Sunday that the government successfully neutralised “a new generation of Stuxnet which consisted of several parts… and was trying to enter our systems.”

The Iranians, however, did not reveal the extent of its damage. Israel, considered the Islamic Republic’s arch enemy, has been silent on the matter.

Eyal Wachsman, CEO of Israeli cyber-security company Cymulate, told The Media Line that “Iran has physically attacked civilian and military targets worldwide with bombs and guns, and in recent years, has taken the fight to the cyber world.

“The US and Israel, masters of cyber warfare, are believed to have been behind counterattacks against Iran in the past, including the Stuxnet virus in 2010,” Wachsman said. That virus sabotaged Iran’s nuclear enrichment efforts by speeding up and damaging its centrifuges.

“In 2012, the Flame virus was deployed targeting Iran’s computer networks that collect intelligence, and Duqu 2.0 was used in 2015 during the nuclear talks. There were presumably additional attacks which have received little to no attention,” Wachsman continued.

After U.S. sanctions against Iran come into full force on November 5, “Iran could feel cornered, and therefore might unleash a very severe cyber-attack, forcing the US and Israel to retaliate at the same level or possibly higher.”

The latest attack on Iran’s networks comes on the backdrop of two earlier security-related developments involving the Islamic Republic. A few hours before the attack, Israel’s Mossad intelligence agency helped Danish officials thwart an Iranian murder plot against three anti-regime Iranian dissidents living in Denmark.

Two days before that, Iranian officials acknowledged that Iranian President Hassan Rouhani’s mobile phone had been bugged by unknown hackers, the semi-official Iranian Students News Agency reported.

In response to the bugging, Iran’s Supreme Leader Ayatollah Ali Khamenei urged defense officials to step up counter-intelligence efforts against “the enemy’s complex practices,” according to a report on Iranian state TV. He also urged security organs to “confront infiltration through scientific, accurate, and up-to-date action.”

On Thursday, Iranian Foreign Minister Javad Zarif sent out a tweet citing the recent sequence of events, claiming Israel was behind it. “Incredible series of coincidences. Or, a simple chronology of a MOSSAD program to kill the JCPOA?” he wrote, referring to the 2015 Joint Comprehensive Plan of Action, also known as the Iran nuclear deal.

Asaf Romirowsky, a Middle East historian and Executive Director of Scholars for Peace in the Middle East, told The Media Line that in the last few months “Israeli intelligence was able to unearth 100,000 documents regarding Iran’s nuclear ambitions.”

The operation to infiltrate Iranian intelligence was part of ongoing attempts to prove what Iran has been doing despite its rhetoric of cooperation with European powers, which are trying to salvage the nuclear deal, Romirowsky explained.

“The Israelis showcasing their intelligence was key, because all along the debate, especially when it comes to American foreign policy toward Israel, was that Iran was not doing things under the table. But the Israelis uncovered actual data that proved the opposite. It was part of the tactic to show the world what Iran’s true intentions were.

“The latest attack in the cyber warfare taking place in the region is part of an effort to calm the region by whatever means necessary,” Romirowsky concluded.

Israel fiercely opposed the 2015 nuclear deal with Iran, claiming that it was Iran’s way of arriving at a nuclear bomb through cooperative means. Last May, US President Donald Trump withdrew from the accord and began re-imposing economic sanctions on Tehran.

As Iran and European powers work to salvage the deal, Israeli officials claim that Tehran is still pursuing aggressive policies through covert operations. Earlier this year, the Mossad claimed to have extracted a vast archive of documents from Tehran that details Iran’s nuclear ambitions.

Netanyahu revealed some findings from the stolen achieve at the UN General Assembly meeting in New York last September. He used graphics to pinpoint covert nuclear facilities inside Iran, Syria and Lebanon.

“What Iran hides, Israel will find,” Netanyahu said during his address to the assembly.

The Media Line:

You Might Also Read:

What Is Stuxnet And Who Created It?

« How To Avoid Facebook Phishing Scams
USB Devices Pose A Significant Threat To Industrial Facilities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Kenna Security

Kenna Security

Kenna Security is a risk intelligence & vulnerability management platform that helps prioritize and remediate vulnerabilities.

Ministry of Defence Georgia - Cyber Security Bureau

Ministry of Defence Georgia - Cyber Security Bureau

The aim of the Cyber Security Bureau is to establish and develop stable, effective and secure Information and Communication Technology systems for the Civil Office of MoD of Georgia.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

Pipeline Security

Pipeline Security

Pipeline Security protects businesses with real-time threat data, threat detection & prevention, continuous cyber security monitoring and security analytics.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

At-Bay

At-Bay

At-Bay offer an end-to-end solution to cyber risk with comprehensive risk assessment, a tailored cyber insurance policy and year-long, active, risk-management service.

PeopleSec

PeopleSec

PeopleSec specializes in the human element of cybersecurity with a comprehensive set of services designed to maximize your security by educating your workforce as a whole.

Highland Capital Partners

Highland Capital Partners

Highland Capital Partners is an early stage venture capital firm focused on category-defining businesses in consumer and enterprise technology, including cybersecurity.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

Griffeshield

Griffeshield

Griffeshield is a company specialised in new information technologies used to protect Intellectual Property.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

PCI Security Standards Council (PCI SSC)

PCI Security Standards Council (PCI SSC)

The PCI Security Standards Council is a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.