Iranian Hackers Attack The US, Not Very Badly

United States security agencies are seeing an increase in cyber security threats, as Iranian officials vow revenge against the US, for killing a top general.

The Department of Homeland Security’s cybersecurity team released an advisory  on Monday 6th warning public and private sector organisations of increased cyberattacks after the United States using a drone strike in Baghdad killed Iranian General Qasem Soleimani, a very influential leader in the Middle East. 

The guidance from DHS’ Cybersecurity and Infrastructure Security Agency, which is charged with protecting critical infrastructure from cyberattacks, recommended that organisations review their emergency preparedness plans and stay up to date on current threat intelligence. 

The advisory comes as CISA and other government entities prepare for retaliatory action from Iran that has attacked US bases in Iraq and other attacks that experts say has already included cyberattacks on the US.

The city of Las Vegas experienced a cyber compromise at 4:30 a.m local time on Tuesday 7th. The city’s Information Technologies Department is assessing the extent of the compromise. When aware of the attempt, the city immediately took steps to protect its data systems. People interfacing with the city may experience brief interruptions of service, but so far those interruptions have been minimal. The city will have a clearer picture of the extent of the compromise over the next 24 hours.

The breach in Las Vegas comes amid tensions with Iran and a warning from Homeland Security of "potentially disruptive and destructive" Iranian cyber operations.

Texas Governor Greg Abbott warned citizens to be “particularly vigilant” regarding potential cyberterrorism from Iran, suggesting that heightened tensions with the country have caused an increase in attempted attacks on state agencies.
“This is something that everybody in the state of Texas needs to be concerned, prepared and be able to address,” Abbott said Tuesday 7th January during a meeting of the Domestic Terrorism Task Force. This is the force he formed after last year’s anti-Hispanic deadly mass shooting in El Paso. “I think it’s very important that everybody be particularly vigilant about what may happen out of Iran.” he was quoted in the Texas Tribune.

On the same day as he spoke a group of self-described Iranian hackers defaced a Texas government department website.
A website defacement is typically a low-skilled hack in order to spread a particular message and normally doesn't pose any other tangible security risks. However, these defacements are likely to receive more attention at this moment due to heightening tensions between the US and Iran and the fact that they are visible on public websites. 

Obviously this come after last week’s US attack when President Trump ordered the assassination of Iranian military commander Qassem Soleimani, which Iran has vowed to respond to. "Hacked by Iranian Hacker," the defacement on the site of the Texas Department of Agriculture reads, along with an image of Soleimani. The defacement claims "Shield Iran" carried it out. Other recent defacements, including those against the Sierra Leone Commercial Bank. 

Even though the defacement itself attributed responsibility to a particular group, it is difficult from the outset to know exactly who carried it out.

The defacement shouted-out several different nicknames. A Google search of one of those led to another, previous defacement, which said "Long live Ashiyane." Ashiyane was an established Iranian hacking forum. A Google search for terms included in the defacement led to several other websites with the same or similar image. One for the Parikrma Humanity Foundation, a non-profit in Bangalore, contained largely the same defacement but also included a rap music track. The site for the South Alabama Veterans Council was also hit.   

Another US government website was also hit. This was the Federal Depository Library Program, included an image of President Trump being punched in the face. "Hacked by Iran Cyber Security Group Hackers," the defacement read.
Although Iran does not have the same calibre of cyber capability as Russia, China, or the US, its hackers can still do damage and be particularly aggressive.

In 2012 hackers working for Iran knocked out 30,000 computers belonging to Saudi state oil company Saudi Aramco. 

Vice      Texas Tribune:       Fifth Domain:        NBC News 3 LV:

You might Also Read: 

Iran's Cyberwar Response To Its General's Killing:
 

 

« 2020: Top Issues In Cyber Security
British National Cyber Security Chief Steps Down »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

Learn about the top cloud security trends in 2024 and beyond, along with solutions and controls you can implement as part of your security strategy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Centre for Secure Information Technologies (CSIT)

Centre for Secure Information Technologies (CSIT)

CSIT is a UK Innovation and Knowledge Centre (IKC) for secure information technologies. Our vision is to be a global innovation hub for cyber security.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

GE Digital

GE Digital

GE Digital is a leading software company for the Industrial Internet. Products include Industrial Cyber Security for Operational Technology (OT).

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

BlueHalo

BlueHalo

BlueHalo is purpose-built to provide industry capabilities in the domains of Space Superiority and Directed Energy, Missile Defense and C4ISR, and Cyber and Intelligence.

Air IT

Air IT

Air IT are a responsive, client-focused and award-winning Managed Service Provider, helping clients achieve success and transformation through their IT and communications.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.