Israel & Iran Locked In Cyber Conflict

Millions of people in Iran and Israel have found themselves in the crossfire as a result of the cyber conflict between their countries.

The shadow war between Israel and Iran is increasingly being fought in cyberspace and civilians are the latest targets in this long-running conflict. 

Where once only so-called hard targets, like weapons systems and critical infrastructure, would be regarded as fair game, now small businesses and even members of the public are finding themselves at risk.

Currently Israelis are assessing the wreckage after attacks by a suspected Iranian-linked hackers group Black Shadow on a medical institute which compromised  nearly thousands of patients medical files and Black Shadow also hacked a dating website that meant the leaking of tens of thousands of Israelis private data.

The exchange points to a new trend of targeting civilians and the two attacks appear to be the first that caused widespread harm to civilians, auguring an escalation in the cyber conflict as softer targets are drawn into the line of fire. “Black Shadow is a cover for an Iranian attack group which operates under a criminal cover,” Harel Menashri, an official with Israel’s internal security service Shin Bet, told the Kan television network. “Iran works through the cyber systems from a strategic point of view - to damage Israel’s financial and intelligence sectors.”

Iran-Israel cyber war has been going strong since at least April 2020. This comes on the heels of a recent cyber attack that disrupted people from purchasing  petrol at approximately 4,300 stations in Iran. The attack incapacitated a system used by Iranians to purchase gas at a subsidised rate, taking approximately 12 days before operations were fully restored. Iran as well as at least two US defense officials have pointed to Israel’s culpability in the attack.

In the past several months, those strikes have escalated. Fuel supply systems, railway controls, and an airline in Iran have all faced attacks. At the same time, hackers have posted the personal information of a million Israeli LGBTQ dating app users, and exposed certain details about the Israeli army. 

The high-profile hacks on Iranian infrastructure have been wide-ranging in their targets and attributed to both state-sponsored actors and independent hacking groups. But they have one thing in common: They’ve caused chaos and confusion for ordinary people and businesses in the country. Moreover, the offensive cyber warfare that Israel is encouraging attests to the fact that it is finding it difficult to understand the codes that guide the Iranian leadership. 

Israel  has  experienced cyber security failures in protecting its own facilities, while Iran has been retaliating, targeting Israeli targets. Iranian actors are alleged to have conducted attacks against Israeli water distribution plants that attempted to modify chlorine levels in the water supplied to Israeli homes.

While the two countries have engaged one another covertly in air, land, sea, and cyberspace, for the past year both have appeared to move away from traditional symbols of state power such as military sites, individuals of interest, or government facilities, to civilian infrastructure. A closer look at this new type of Israeli-Iranian exchange suggests that cyber warfare is maturing into a new phase, where new rules of engagement and deterrence are in the process of being established.

The intent of these attacks is quite clear: to inflict pain on the civilian communities in their respective countries in a show that neither government can protect them.

Whether one thinks of climate change, international terrorism, or cyber threats, all such challenging contemporary phenomena necessitate a framework for international co-operation. Even as cyber warfare becomes more established and moves into the public view, it is still an uncontrolled realm. There are no hard international rules resembling the accepted conventions of armed conflict. This leaves state actors to push boundaries, with dangerous margins for error.

Oodaloop:     Haaretz:      NYT:       Wired:       Foreign Policy:     CCDOOE / NATO   

Independent:       ArabNews:       BDNews:     Times Of Israel

You Might Also Read: 

Cyber Warfare Is The New Frontier:

 

« Best Programming Languages For Cyber Security In 2022
Volvo Falls Victim To Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cloudbric

Cloudbric

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package.

Uniscon

Uniscon

Uniscon is a leading provider of cloud security solutions in Europe.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

TBCA

TBCA

TBCA provides SMEs, Startups and Large Enterprises access to top quality consultants. Areas of expertise include technology and cyber security.

Kippeo Technologies

Kippeo Technologies

Kippeo is a security systems integrator providing innovative solutions that look at all the parameters and connect all the dots.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

CS3STHLM

CS3STHLM

CS3STHLM is the Stockholm international summit on Cyber Security in SCADA and Industrial Control Systems.

Cyber Talents

Cyber Talents

CyberTalents is on a mission to close the gap of cyber security professionals shortage across the globe.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

Code Intelligence

Code Intelligence

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure.

Squad

Squad

Squad provides leading expertise to ensure protection against the most complex cyber threats. Combining the best practices of DevOps and Cybersecurity, we are committed to create a secured cyber space

Cyberplc

Cyberplc

Cyberplc is a global cybersecurity consulting firm providing services to government, the public sector and enterprises.

Cyphershield

Cyphershield

Cyphershield is a blockchain security and smart contract audit company with experienced professionals with a passion for surgical scrutiny.