Iran Adopts Russian Style CyberWar Tactics

Reports indicate that the Iranian regime has deployed online bots to push back against the people who want it dismantled and have relied on Internet access to organise protests.

Iran, like Russia, reportedly uses cyber trolls and bots to push its propaganda to sway and influence social media trends in its favor.

The Saudi news outlet Al-Arabiya claimed in a recent analysis piece that the Iranian regime has activated “all sleeping and active ‘fake persons’ in various social networks” in response to the widespread social uprisings throughout the Islamic republic.

The outlet notes that the objective of these bots and trolls is to combat information against the regime from members of Iran’s protesting civil society with their stream of pro-government propaganda and to intimidate Iranians who are intent on seeing the regime’s fall.

In January, Breitbart News reported, “Anti-regime Iranians intent on seeing the dismantling of Iran’s Islamic regime have gone to war against pro-regime loyalists over social media, reportedly using bots to saturate Twitter and Instagram with propaganda against those seeking true democracy and freedom.”

However, the Al-Arabiya analysis notes that the Iranian regime’s army of trolls differs from Russian trolls in that the Iranians are far less advanced than their Russian counterparts, including lacking the ability to create websites, pages, and communities on Facebook on a mass scale.

Furthermore, Iranian activists reportedly told Al-Arabiya that Iran may have approximately 5,000 government-affiliated trolls working on its behalf to undermine the second consecutive week of protests that seek to topple Iran’s dictatorial regime.

While social media platforms like Facebook, Twitter, YouTube, and Viber are blocked in Iran, requiring everyday Iranians to use VPNs to access them, the country’s leadership can use these same services without interruption.

In fact, Iran’s Supreme Leader Ayatollah Ali Khamenei sends out tweets from his account on a near-daily basis, as do President Hassan Rouhani and Foreign Minister Javad Zarif.

Al-Arabiya noted that sometimes, “Iranian government-backed trolls cooperate with Iranian government hackers.”

For example, thousands of American and Israeli citizens, mainly military, journalists, and experts based in Washington, DC, were reportedly targeted by these entities.

One such pro-regime bot on Twitter tweeted, “I’ve just arrived and no one is here. Why are you lying?” in response to thousands taking to the streets, throughout various cities in Iran, to protest Iran’s regime.

Ein News

You Might Also Read: 

Iran Turns Off The Internet:

Iran’s Cyber Capabilities:

Iran Wants To Collect All Social Network Data:

 

« Ethical Hacking Is A Great Career Option
The Role Of Blockchain In Helping Organisations Meet GDPR Compliance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Nuix

Nuix

Nuix specialise in extracting knowledge from unstructured data. Applications include Digital Forensics, Cybersecurity Intelligence, Information Governance, eDiscovery.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

Cyber Future Foundation (CFF)

Cyber Future Foundation (CFF)

CFF was established to create a cyberspace where digital commerce and innovation can thrive based on trust and respect to individual privacy.

Haltdos

Haltdos

Haltdos is an AI driven website protection service that secures websites against today's cyber threats.

Neupart

Neupart

Neupart provides Information Security Management System, Secure ISMS, allowing organisations to automate IT Governance, Risk and Compliance management.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

Cyberens

Cyberens

Cyberens provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT.

SHIELD

SHIELD

SHIELD is an established end-to-end fraud management solution that blocks fraudulent activities such as account takeovers, fake accounts creation, fraudulent payments, loyalty fraud and more.

International Accreditation Forum (IAF)

International Accreditation Forum (IAF)

The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment.

Griffiss Institute (GI)

Griffiss Institute (GI)

GI's primary role is to advocate and facilitate the co-operation of private industry, academia, and the Air Force Research Laboratory in developing solutions to critical cyber security problems.

Australian Cyber Collaboration Centre (A3C)

Australian Cyber Collaboration Centre (A3C)

A3C assists business to understand and navigate the cyber ecosystem to address their specific cyber needs. It is a central connection point for businesses looking to improve their cyber resilience.

CyGlass

CyGlass

CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

Secmation

Secmation

Secmation are an agile engineering services firm providing advanced DoD level security design and consultation services for both commercial and defense hardware and software applications.

Capital Network Solutions

Capital Network Solutions

Capital Network Solutions are a highly accredited managed IT services and consultancy provider, specialising in cyber security, infrastructure and communications.

Paperclip

Paperclip

Paperclip provides paperless solutions while enabling compliance and security for the exchange of critical content.

TerraEagle

TerraEagle

Terraeagle is a boutique cyber security services company providing tailor-made solutions. Our core competency is in SOCaaS, MDRaaS & and Incident Response Retainer Services.