Iranian Spy Ship Hacked

The United States has recently conducted a hack on the computer systems of an Iranian military ship that had been collecting intelligence on cargo vessels in the Red Sea and the Gulf of Aden. Naval analysts believe that the ship has served as a staging point and command post for the Islamic Revolutionary Guard Corps' operations in Yemen.

Iran is the primary foreign sponsor of Yemen's Houthi rebel group, supplying the group with them with ballistic missiles, air defence systems and suicide drones.

The US Navy and US Coast Guard have repeatedly intercepted shipments of advanced Iranian armaments bound for Yemen. The cyber attack was part of the US response to the drone attack by Iranian-backed militias in Iraq that killed three US service members in Jordan and wounded dozens of others recently.

The operation was intended to inhibit the Iranian ship’s ability to share intelligence with Houthi rebels in Yemen who have been firing missiles and drones at cargo ships in the Red Sea, the officials said. US officials say Iran uses the ship to provide targeting information to the Houthis so their attacks on the ships can be more effective. Over 10% of global shipping passes through the Red Sea every day

US analysts had suspected for weeks that the ship, the MV Behshad, was operating near the African port of Djibouti, which lies across a strait from Yemen, to spy on nearby ships and pass that information to Iran-backed Houthi rebels. 

The Houthis, who control northern Yemen, have been firing missiles and drones at vessels in the Red Sea and Gulf of Aden. Iranian officials have denied the allegations. Houthi leaders  have vowed to continue the attacks until Israel halts its military operations in the Gaza Strip. 

The US has likely used cyber warfare capabilities to target Iran before. The infamous Stuxnet worm was perhaps the first major nation-state cyber attack, and it reportedly set back operations in Iran's uranium enrichment program by targeting industrial control systems. The attack has never been officially acknowledged.

NBC News     |     Reuters     |     New York Times     |     Just Security     |     Hellenic Shipping News     |    

The Maritime Executive     |     FDD     |     Yahoo    |

Image: Ismail Saidi

You Might Also Read:  

US Navy Will Use Data Analytics For Maritime Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Criminals Use CAPTCHA To Spread Malware
Rhysida Ransomware Cracked & Decrypted »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

Digital Ship

Digital Ship

Digital Ship provides news, information, conferences and events focused on digital ship systems, information technology and security relating to maritime operations.

Navarino

Navarino

Navarino is the maritime industry’s most advanced communications and connectivity company. We develop advanced technologies and innovative IT solutions including cyber security.

Monegasque Digital Security Agency (AMSN)

Monegasque Digital Security Agency (AMSN)

AMSN is the national authority in charge of the security of information systems in Monaco.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

Asimily

Asimily

Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.

Gleam Cloud Security Solutions (GCSS)

Gleam Cloud Security Solutions (GCSS)

GCSS Security is an information security firm providing cyber security protection with a highly skilled and experienced team focused on technology that creates best-in-class customer experiences.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.