Iranian Spy Ship Hacked

The United States has recently conducted a hack on the computer systems of an Iranian military ship that had been collecting intelligence on cargo vessels in the Red Sea and the Gulf of Aden. Naval analysts believe that the ship has served as a staging point and command post for the Islamic Revolutionary Guard Corps' operations in Yemen.

Iran is the primary foreign sponsor of Yemen's Houthi rebel group, supplying the group with them with ballistic missiles, air defence systems and suicide drones.

The US Navy and US Coast Guard have repeatedly intercepted shipments of advanced Iranian armaments bound for Yemen. The cyber attack was part of the US response to the drone attack by Iranian-backed militias in Iraq that killed three US service members in Jordan and wounded dozens of others recently.

The operation was intended to inhibit the Iranian ship’s ability to share intelligence with Houthi rebels in Yemen who have been firing missiles and drones at cargo ships in the Red Sea, the officials said. US officials say Iran uses the ship to provide targeting information to the Houthis so their attacks on the ships can be more effective. Over 10% of global shipping passes through the Red Sea every day

US analysts had suspected for weeks that the ship, the MV Behshad, was operating near the African port of Djibouti, which lies across a strait from Yemen, to spy on nearby ships and pass that information to Iran-backed Houthi rebels. 

The Houthis, who control northern Yemen, have been firing missiles and drones at vessels in the Red Sea and Gulf of Aden. Iranian officials have denied the allegations. Houthi leaders  have vowed to continue the attacks until Israel halts its military operations in the Gaza Strip. 

The US has likely used cyber warfare capabilities to target Iran before. The infamous Stuxnet worm was perhaps the first major nation-state cyber attack, and it reportedly set back operations in Iran's uranium enrichment program by targeting industrial control systems. The attack has never been officially acknowledged.

NBC News     |     Reuters     |     New York Times     |     Just Security     |     Hellenic Shipping News     |    

The Maritime Executive     |     FDD     |     Yahoo    |

Image: Ismail Saidi

You Might Also Read:  

US Navy Will Use Data Analytics For Maritime Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Criminals Use CAPTCHA To Spread Malware
Rhysida Ransomware Cracked & Decrypted »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BMC Software

BMC Software

BMC provide solutions for IT service management, Cloud management, IT workload automation, IT operations, and mainframe system management.

Outpost24

Outpost24

Outpost24 provides easy to deploy and intuitive solutions to continuously identify, remediate and mitigate vulnerabilities in your network.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

Norwegian Information Security laboratory (NISlab)

Norwegian Information Security laboratory (NISlab)

NISlab conducts international competitive research in information and cyber security and operates study programs in this area.

Oznet Cyber Security

Oznet Cyber Security

Oznet Cyber Security is dedicated to offering integral solutions oriented to the support and security of information.

Sphonic

Sphonic

Sphonic provides regulated institutions of any size a powerful compliance & risk platform to quickly and securely onboard new customers and manage ongoing AML and Fraud & Risk trends.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

Hackuity

Hackuity

Hackuity is a breakthrough technology solution that rethinks the way of managing IT vulnerabilities in enterprises.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

GoPro Consultants

GoPro Consultants

GoPro Consultants is an IT Consultancy and IT Managed services provider Globally with immeasurable expertise of IT professionals in Hardware/Support & Consultancy and Project Planning.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

Stacklok

Stacklok

Stacklok are an Open Source first security company enabling safe Open Source Software consumption.

Neya Systems

Neya Systems

Neya Systems, a leader in advanced off-road autonomy and high-level multi-robot mission planning, provides innovative solutions for uncrewed ground, aerial, and surface vehicles.

Secolve

Secolve

Secolve is Australia’s next generation OT specialist cyber security firm, working with key industries to protect the nation’s critical infrastructure.