The Growing Cyber Threat From Iran

There are some big names in the cyber-warfare world: the United States, obviously, as well as Israel, Russia, China, and a few others. In recent years, however, the Islamic Republic of Iran has been steadily developing its cyber offensive capabilities, and already poses a veritable threat.

Iran’s development of its cyber potential began quite recently. The Islamic Republic started on this course following the wave of protests that erupted after the 2009 election.

Heavy investment into social media platforms, cyber-welfare programmes, and surveillance operations brought about a tectonic change in how Iran does technology. Tehran poured more than $1 billion into developing cyber infrastructure, recruitment (reportedly more than 100,000 personnel were taken on), and procurement of surveillance technology, mainly from China.

Then, in 2012, the Supreme Council on Cyberspace was established under orders from Iran’s supreme leader, Ayatollah Ali Khamenei.

Under the Council’s charge, Iran’s cyber policy solidified as offensive and proactive. Unable to win a full-out war against its adversaries, and knowing it, Iran developed the fourth largest cyber army in the world. “We have armed ourselves with new tools, because a cyber war is more dangerous than a physical war,” said Abdollah Araqi, deputy commander of ground forces in the Islamic Revolutionary Guard Corps (IRGC), according to the Iranian Students’ News Agency.

Israel’s Institute for National Security Studies (INSS) said that, “IRGC clearly makes the country one of the best and most advanced nation when it comes to cyberwarfare. In a case of escalation between Iran and the West, Iran will likely aim to launch a cyberattack against critical infrastructures in the United States and its allies, including energy infrastructure, financial institutions, transportation systems, and other.”

Two demonstrations of Tehran’s offensive cyber capabilities clearly affirm Iran’s position as a cyber force to be reckoned with. The computer systems of major American financial institutions were attacked in 2013 at an unprecedented level. US intelligence officials clearly stated that they found a link between the attacks and the Islamic Republic, as well as the “Shamoon” virus that attacked the computers of Saudi Arabia’s Aramco oil corporation.

Iran is quickly adapting to the modern world, utilising its tools to both control dissent within the country, and to project its force outside of it. The world would be foolish to not take notice.

I-HLS

« ‘Eye In The Sky’: The Reality Of Drone Warfare Revealed
Seven Profiles Of Highly Risky Insiders »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

OpenText

OpenText

OpenText is a leader in Enterprise Information Management software and a portfolio of related solutions for Information Governance, Compliance, Information Security and Privacy.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

Cube 5

Cube 5

The Cube 5 incubator, located at the Horst Görtz Institute for IT Security (HGI), supports IT security startups and people interested in starting a business in IT security.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

Protek International

Protek International

Protek International delivers world-class Digital Forensics, eDiscovery, Cyber Security, and related Advisory services.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

Pathway Communications

Pathway Communications

Established in 1995, Pathway Communications – is part of the Pathway Group of Companies, a Canadian IT Managed Services organization.

Wing Security

Wing Security

Wing fosters a stronger security culture by engaging SaaS end-users and enabling easy communication with security teams.

Dig Security

Dig Security

Dig Security offers the first data detection and response (DDR) solution, providing real-time visibility, control and protection of your data assets across any cloud.

Oligo Security

Oligo Security

Oligo aims to streamline the usage of open source by making it secure and easy to protect. Through focusing developers on the relevant vulnerabilities we make the fixing process significantly shorter.

Myntex

Myntex

Myntex® is a leading encrypted phone provider, managing a world-class on-site Canadian data center. Our solutions protect against data breaches, digital surveillance, and cybercrime.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.