Iranian Hackers Attack After US Air Strikes

Just hours after US President Donald Trump announced airstrikes on three key Iranian nuclear sites, a wave of cyber hacks linked to pro-Iranian groups began to surface. Iranian hackers are reported to have hit US banks, defence contractors and oil industry companies after the US attacks on Iranian nuclear facilities.

So far they have not caused serious problems to critical infrastructure or the US economy, although some analysts think that  the US strikes could even prompt Iran, Russia, China and North Korea to increase their cyber warfare activities.

America may be militarily dominant, but its reliance on digital technology poses a vulnerability. Two pro-Palestinian hacking groups claimed they targeted more than a dozen aviation firms, banks and oil companies following the US airborne strikes. 

The hackers have detailed their work in a post on the Telegram messaging service and urged other hackers to follow their lead, according to researchers at the SITE Intelligence Group, which tracks the groups' activity.

The attacks were denial-of-service attacks, in which a hacker tries to disrupt a website or online network.
“We increase attacks from today,” one of the hacker groups, known as Mysterious Team, posted recently.

  • US Federal authorities say they are on guard for additional attempts by hackers to penetrate US networks and the Department of Homeland Security (DHS) has recently published a public statement warning of increased Iranian cyber threats.
  • The Cybersecurity and Infrastructure Security Agency (CISA) has issued a statement urging organisations that operate critical infrastructure like water systems, pipelines or power plants to stay vigilant. “The ongoing Iran conflict is causing a heightened threat environment in the United States. Low-level cyber attacks against US networks by pro-Iranian hacktivists are likely, and cyber actors affiliated with the Iranian government may conduct attacks against US networks."

Iran also has a long-standing commitment to target those US Government officials whom it views as responsible for the death of an Iranian military commander killed in January 2020. “The likelihood of violent extremists in the Homeland independently mobilising to violence in response to the conflict would likely increase if Iranian leadership issued a religious ruling calling for retaliatory violence against targets in the Homeland... Multiple recent Homeland terrorist attacks have been motivated by anti-Semitic or anti-Israel sentiment, and the ongoing Israel-Iran conflict could contribute to US-based individuals plotting additional attacks”, says the DHS statement.

While Iran is thought to lack the ultimate technical abilities of China or Russia, Iran has long been effective when it comes to using cyber attacks to steal secrets, score political points or frighten opponents. 

Cyber attacks mounted by Iran's government may end if a ceasefire holds as Iran looks to avoid another confrontation with the US, however hacker groups could still retaliate on Iran's behalf. In some cases, these groups have ties to military or intelligence agencies. In other cases, they act entirely independently. 

Iran is almost certain to try use hacking to predict President Donald Trump’s next moves. In 2024 federal authorities charged three Iranian operatives with trying to hack Trump’s presidential campaign and it would be wrong to assume Iran has given up on these kinds of cyber attack. Ironically, the need to to strengthen America's digital defences come at at a time when the Trump administration has moved to cut some cybersecurity programs as part of its effort to shrink the size of government.

It appears that the cyber conflict will continue long after military action has ceased, and while the ceasefire between Iran and Israel appears to be holding, cyber security analysts warn that the cyberwar will continue and possibly increase. 

Experts stress the need for robust investments in cyber security, not just at the federal level but across private industries and critical infrastructure, as the digital battlefield becomes increasingly persistent.

ABC  |  DHS  |  APNews  |  Industrial Cyber  |    CNN  |   eSecurity Planet  

Image: Ideogram

You Might Also Read: 

Still The International Cyber Super Power:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« The UK’s Software Security Code Of Practice Is More Than Just A Guidance
Cybersecurity Threats In The Automotive Industry »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

Zero Networks

Zero Networks

With Zero Network, you can achieve affordable, airtight network access security at scale.

SHIELD

SHIELD

SHIELD are the world’s leading cybersecurity company specializing in cyber fraud and identity solutions.

CIBR Warriors

CIBR Warriors

CIBR Warriors are a leading cyber security and networking staffing company that provides workforce solutions with businesses nationwide in the USA.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

NetWitness

NetWitness

NetWitness empowers security teams to rapidly detect today’s targeted and sophisticated attacks with unparalleled visibility.

Obscure Technologies

Obscure Technologies

Obscure Technologies is a firm of experts, specialised in brokering the best security solutions to market.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.

Novem CS

Novem CS

Novem CS are bespoke cyber security specialists providing a highly effective and specialised approach to solving your cyber security challenges.

ACDS (Advanced Cyber Defence Systems)

ACDS (Advanced Cyber Defence Systems)

ACDS was founded in the belief that cyber security can be done better. We’re combining emerging technologies and proven methods to bring a new approach to tackling the growing threat landscape.

Harness

Harness

Harness delivers an end-to-end software delivery platform that helps engineering teams achieve the highest levels of engineering excellence.

LiveAction

LiveAction

LiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of their network.