Iran and Saudi Marching To Cyber War!

iranian-saudi-cyber-conflict-5-alt.png

Iran and Saudi Arabia, regional rivals in the Middle East, may be engaged in cyber warfare, according to a new report by threat intelligence firm Recorded Future. http://http://ow.ly/SsGv9

 

As the two powers vie for influence over the civil wars in Yemen and Syria and regional dominance, Tehran and Riyadh have begun using cyber attacks to release critical intelligence.

 WikiLeaks released on June 19 over half a million cables from the Saudi Foreign Ministry, including several "Top Secret" reports from the country's General Intelligence Services after a hack by a group calling itself the Yemeni Cyber Army. Recently, the Washington Post  reported that the theft of the Saudi Cables bore indications of Iranian hackers. 
"These events fit a pattern that looks and smells like Iranian-proxy actors," said Jen Weedon, manager of threat intelligence at FireEye, a firm specializing in cyber-security. The incident "definitely resembles past activity we've seen by Iranian groups."

Some analysis’s have suggested that the civil war in Yemen is effectively a proxy-war between the two regional powers, with the predominately-Shiite Iran backing the Houthi rebels while the Sunni Saudi Arabia supports the current government.

In 2014, Iranian hackers began a cyber operation against 16 countries, including the United States, targeting government organizations for information, according to FoxNews.com. Iran has increased cyber-attacks since the US and Israel halted the Iranian nuclear program with a computer virus in 2010.
"There has been a long running rivalry between Iran and Saudi Arabia, the Saudis see us as an ally, the Iranians see us as an adversary, that's always placed limitations on what they could do to one another," said Christopher Griffin, executive director of the Foreign Policy Initiative.

But in recent years, increasing sectarian tension along with civil wars in the region has allowed for greater antagonism between the countries.
"It's been this low-key cyber volleying back and forth at each other. It now looks like someone got tired of this and said 'look I'm going to yank up this game' to a different level," said Ahlberg to FoxNews.com. "When we look at this and take apart this Yemen Cyber Army and really try to understand who they are. They look a lot like other Iranian actors."

Ein News:  http://bit.ly/1Kq7Zxd

 

« North Korean Leader Has His Own Cellular Network
Spy Agencies Go Recruiting on LinkedIn »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

OmniNet

OmniNet

OmniNet delivers the next generation of cybersecurity and is the only provider in the market to move the edge of small businesses to a virtual, omnipresent perimeter.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

UKAS

UKAS

UKAS is the national accreditation body for the UK. The directory of members provides details of organisations offering certification services for ISO 27001.

National CyberWatch Center - USA

National CyberWatch Center - USA

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange is an intellectual hub and community of researchers with the common goal of advancing academic and industrial efforts in the science and engineering of quantum information.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

DeFY Security

DeFY Security

DeFY Security is a Cyber Security solutions provider with more than 20 years of experience securing financial institutions, healthcare, manufacturing and retail.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

Profian

Profian

Profian’s hardware-based solutions maintain your data's confidentiality and integrity in use, providing true confidential computing to meet regulatory and audit requirements.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.