Iran Likely To Retaliate With Cyberattacks

Iran is likely to respond with cyberattacks against Western businesses in response to the Trump administration's withdrawal from the nuclear deal, cybersecurity experts say. Recent research suggests attacks could come "within months, if not faster," according to security firm Recorded Future.
 
The research paints a detailed picture of how Iran uses contractors and universities to staff its offensive cyber-security operations, or hacking efforts, against foreign targets.
 
A former insider with knowledge of Iran's hacking operations said the attacks are likely to be launched by contractors and thus pose a greater risk of spinning out of control.
 
Recently, President Donald Trump announced the US would withdraw from the Iran nuclear deal, a pact of Western nations that pledged to lift economic sanctions against Iran in exchange for limiting its nuclear program. The UN's nuclear verification agency said Iran had complied with the agreement. Although there has been no evidence or intelligence to suggest a cyber-attack is in the works, researchers say they predict, based on Iran's past cyber activities, that retaliatory cyber-attacks are likely.
 
"We assess that within months, if not sooner, American companies in the financial, critical infrastructure, oil, and energy sectors will likely face aggressive and destructive cyber-attacks by Iranian state-sponsored actors," said Priscilla Moriuchi, a former NSA analyst, now at Recorded Future.
 
"The Islamic Republic may utilise contractors that are less politically and ideologically reliable, and trusted, and as a result, could be more difficult to control," she said.
 
Countries allied with the US and Europe, like Saudi Arabia and Israel, are also at risk, the report said. Levi Gundert, who co-authored the research, told ZDNet the attacks will likely aim for "maximum impact," such as a malware attack rather than a denial-of-service attack. Much of the research is centered on Iran's long-known history of targeting Western businesses and governments with cyber-attacksin response to sanctions, largely because of how quickly the hackers could turn around an attack.
 
Tehran began strengthening its cyber capabilities following the Green Revolution, a period of intense protests in Iran against the incumbent government during the Arab Spring in 2009.  The government responded with a heavy crackdown, with an increased focus on cyber operations.
 
But some of the best hackers available were primarily young and financially driven, said the report. This led to mistrust and fears that the hackers could be bought by foreign intelligence agencies. According to the former insider, that led to a tiered trust system that centered Tehran's hacking efforts around a central team of trusted and ideologically aligned middle management that dishes out assignments to contractors, often pitting teams against each other, who get paid only when the work is completed. 
 
The government also uses compartmentalisation, giving one team an infiltration mission and using another to launch a remote code execution attack.
 
It's estimated that at least 50 organisations are competing for government hacking work, the research said, including contractors and universities to conduct hacking operations.
 
One such institution, Imam Hossein University, was sanctioned by the US Treasury for its connections to the Islamic Revolutionary Guard Corps (IRGC), Iran's military intelligence unit. But because some of Iran's best operators "are not always the most devout or loyal to the regime," the researchers warn they "could be more difficult to control." That may lead to the IRGC choosing a less ideologically driven contractor, capable of delivering a destructive attack in a short period of time, instead of a trusted and less politically driven contractor.
 
"It is possible that this dynamic could limit the ability of the government to control the scope and scale of these destructive attacks once they are unleashed," the researchers said.  
 
Recorded Future isn't the only company warning of incoming Tehran-backed cyberattacks. Security firm FireEye warned that Iranian hackers were "probing Western critical infrastructure in multiple industries for future attack."
 
"These efforts did not entirely disappear with the agreement, but they did refocus on Iran's neighbors in the Middle East," said John Hultquist, FireEye's director of intelligence analysis, in an email to ZDNet.
 
"With the dissolution of the agreement, we anticipate that Iranian cyberattacks will once again threaten Western critical infrastructure," he said.
 
ZDNet
 
You Might Also Read:
 
Iran’s Cyber Capabilities:
 
The Resurgent Cyber Threat From Iran:
 
 
« Hacker Reveals What He’s Learned
Three Ways That Automation & Machine Learning Are Changing Data Centres »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

European Organisation for Security (EOS)

European Organisation for Security (EOS)

EOS represents all domains of security solutions and services.providers including ICT information and communications technologies.

Network Integrated Business Solutions (NIBS)

Network Integrated Business Solutions (NIBS)

NIBS is an IT services provider offering a range of services with the aim of simplifying and securing technology.

Industrial Cybersecurity Center (CCI)

Industrial Cybersecurity Center (CCI)

CCI is the first center of its kind that comes from industry without subsidies, independent and non-profit, to promote and contribute to the improvement of Industrial Cybersecurity.

Proximity

Proximity

Proximity is a leading professional services organisation providing consulting, legal and commercial advisory solutions with a focus on government and regulated industries.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

Wib

Wib

Wib is an API security leader. We are the only company providing a solution for the entire API development lifecycle.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

Highen Fintech

Highen Fintech

Highen is a blockchain software development company with offices in the United States and development centers in India.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

ClearSky Cyber Security

ClearSky Cyber Security

ClearSky cyber security provides cyber solutions, focused on threat intelligence services, mainly for the financial sector, critical infrastructure, public sector and the pharma sector.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.

London AI Safety Research (LASR)

London AI Safety Research (LASR)

London AI Safety Research Labs is a technical AI Safety research programme focussed on reducing the risk of loss of control to advanced AI.