Iranian Hackers Attack After US Air Strikes

Just hours after US President Donald Trump announced airstrikes on three key Iranian nuclear sites, a wave of cyber hacks linked to pro-Iranian groups began to surface. Iranian hackers are reported to have hit US banks, defence contractors and oil industry companies after the US attacks on Iranian nuclear facilities.

So far they have not caused serious problems to critical infrastructure or the US economy, although some analysts think that  the US strikes could even prompt Iran, Russia, China and North Korea to increase their cyber warfare activities.

America may be militarily dominant, but its reliance on digital technology poses a vulnerability. Two pro-Palestinian hacking groups claimed they targeted more than a dozen aviation firms, banks and oil companies following the US airborne strikes. 

The hackers have detailed their work in a post on the Telegram messaging service and urged other hackers to follow their lead, according to researchers at the SITE Intelligence Group, which tracks the groups' activity.

The attacks were denial-of-service attacks, in which a hacker tries to disrupt a website or online network.
“We increase attacks from today,” one of the hacker groups, known as Mysterious Team, posted recently.

  • US Federal authorities say they are on guard for additional attempts by hackers to penetrate US networks and the Department of Homeland Security (DHS) has recently published a public statement warning of increased Iranian cyber threats.
  • The Cybersecurity and Infrastructure Security Agency (CISA) has issued a statement urging organisations that operate critical infrastructure like water systems, pipelines or power plants to stay vigilant. “The ongoing Iran conflict is causing a heightened threat environment in the United States. Low-level cyber attacks against US networks by pro-Iranian hacktivists are likely, and cyber actors affiliated with the Iranian government may conduct attacks against US networks."

Iran also has a long-standing commitment to target those US Government officials whom it views as responsible for the death of an Iranian military commander killed in January 2020. “The likelihood of violent extremists in the Homeland independently mobilising to violence in response to the conflict would likely increase if Iranian leadership issued a religious ruling calling for retaliatory violence against targets in the Homeland... Multiple recent Homeland terrorist attacks have been motivated by anti-Semitic or anti-Israel sentiment, and the ongoing Israel-Iran conflict could contribute to US-based individuals plotting additional attacks”, says the DHS statement.

While Iran is thought to lack the ultimate technical abilities of China or Russia, Iran has long been effective when it comes to using cyber attacks to steal secrets, score political points or frighten opponents. 

Cyber attacks mounted by Iran's government may end if a ceasefire holds as Iran looks to avoid another confrontation with the US, however hacker groups could still retaliate on Iran's behalf. In some cases, these groups have ties to military or intelligence agencies. In other cases, they act entirely independently. 

Iran is almost certain to try use hacking to predict President Donald Trump’s next moves. In 2024 federal authorities charged three Iranian operatives with trying to hack Trump’s presidential campaign and it would be wrong to assume Iran has given up on these kinds of cyber attack. Ironically, the need to to strengthen America's digital defences come at at a time when the Trump administration has moved to cut some cybersecurity programs as part of its effort to shrink the size of government.

It appears that the cyber conflict will continue long after military action has ceased, and while the ceasefire between Iran and Israel appears to be holding, cyber security analysts warn that the cyberwar will continue and possibly increase. 

Experts stress the need for robust investments in cyber security, not just at the federal level but across private industries and critical infrastructure, as the digital battlefield becomes increasingly persistent.

ABC  |  DHS  |  APNews  |  Industrial Cyber  |    CNN  |   eSecurity Planet  

Image: Ideogram

You Might Also Read: 

Still The International Cyber Super Power:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« The UK’s Software Security Code Of Practice Is More Than Just A Guidance
Cybersecurity Threats In The Automotive Industry »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

United Biometrics

United Biometrics

United Biometrics is an anonymous and real-time authentication platform designed to stop the fraud for mobile payments, e-Commerce and applications.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.

Collabera Digital

Collabera Digital

Collabera Digital engineer the next generation of solutions that power tech-forward organizations and create an impact on people and communities.

Silk Security

Silk Security

Silk is the first platform that enables enterprises to take a strategic, sustainable approach to resolving code, infrastructure and application risk.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.

Mitra Informatics Integration (MII)

Mitra Informatics Integration (MII)

Mitra Informatics Integration is the information communication technology solution business of the Metrodata Group.

Seamfix

Seamfix

Seamfix helps businesses and their customers globally to seamlessly create, verify and access trusted digital identities and services.