Iran Fingered For Attack On Israeli Water Infrastructure

Iranian hackers are reported to have used American servers in a recent attack on Israel's water and sewage infrastructure, which Israeli officials say  did not disrupt water supply. The original attack took place on April 24-25 on numerous water and sewage facilities across the country. The original attack on numerous water and sewage facilities across the country  took place on April 24th.

Israeli media sources claim that te attempted breach was aimed at operational systems and mechanisms for adding chlorine to the the water supply in numerous locations.  

The US Department of Energy said that the US government is  committed to protecting allies from cyber attacks but would not comment on the specific incident, saying an investigation was ongoing. The Israel National Cyber Directorate confirmed the “attempted cyber breach on water command and control systems.” Employees at water plants were alerted to change their passwords and safeguard their systems after the attempt was detected, specifically those overseeing the chlorination of wells. 

Israel and Iran have engaged in covert cyber warfare for over a decade, including reported efforts by the Jewish state and US to remotely sabotage the Islamic Republic’s nuclear program using the notorious Stuxnet worm. 

Israel has  stepped up a bombing campaign on Iran-linked forces in Syria seeking to push out the Islamic Republic, which is already smarting from one of the world’s most severe COVID-19 outbreaks. Experts have recently warned that the coronavirus pandemic has created a perfect storm for cyber-attacks, with millions of people working in unfamiliar, less secure circumstances and eager for information about the virus and with new organisational policies being implemented.

The US Department of Homeland Security issued an alert last month warning that the pandemic has increased threats and that “cyber actors may send emails with malicious attachments or links to fraudulent websites to trick victims into revealing sensitive information.” 

Al Araby:     Times of Israel:     Haaretz:       JPost:

You Might Also Read: 

Iran's Cutting Edge Cyberwar Capabilities:

 

« Darktrace Moves Towards A Massive IPO
Cyber Security Market Slowdown Blamed On Coronavirus »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

Oodrive

Oodrive

Oodrive is the first trusted European collaborative suite allowing users to collaborate, communicate and streamline business with transparent tools that ensure security.

Netsafe

Netsafe

Netsafe is an independent, non-profit New Zealand organisation focused on online safety. We help people stay safe online by providing online safety education, advice and support.

iFluids Engineering

iFluids Engineering

iFluids Engineering is a leading engineering consulting and risk management firm providing a full range of services including Cyber Security for Industrial Control Systems.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Emagined Security

Emagined Security

Emagined Security is a leading provider of professional services for Information Security and Compliance solutions.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

ClassNK Consulting Service (NKCS)

ClassNK Consulting Service (NKCS)

ClassNK Consulting provides consulting services to the maritime industry with a focus on safety, security and compliance.

Accolite Digital

Accolite Digital

Accolite is an innovative, design thinking software company that guarantees seamless digital experiences with maximum results.

Redhorse

Redhorse

Redhorse provides top-tier consulting to help clients address mission-critical government problems in National Security, Networking Technology, Energy and the Environment.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

Synoptek

Synoptek

Synoptek is a global systems integrator and managed IT services provider (MSP). We offer comprehensive IT management and consultancy services to organizations worldwide.

Covenant Technologies

Covenant Technologies

Make Covenant Technologies the only choice for your IT and cybersecurity recruitment needs. We deliver quality candidates at the forefront of the cybersecurity and IT industry.

Cambridge International Systems

Cambridge International Systems

For more than 25 years, Cambridge has been fighting bad actors in both the cyber and physical worlds.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.