The Growing Cyber Threat From Iran

There are some big names in the cyber-warfare world: the United States, obviously, as well as Israel, Russia, China, and a few others. In recent years, however, the Islamic Republic of Iran has been steadily developing its cyber offensive capabilities, and already poses a veritable threat.

Iran’s development of its cyber potential began quite recently. The Islamic Republic started on this course following the wave of protests that erupted after the 2009 election.

Heavy investment into social media platforms, cyber-welfare programmes, and surveillance operations brought about a tectonic change in how Iran does technology. Tehran poured more than $1 billion into developing cyber infrastructure, recruitment (reportedly more than 100,000 personnel were taken on), and procurement of surveillance technology, mainly from China.

Then, in 2012, the Supreme Council on Cyberspace was established under orders from Iran’s supreme leader, Ayatollah Ali Khamenei.

Under the Council’s charge, Iran’s cyber policy solidified as offensive and proactive. Unable to win a full-out war against its adversaries, and knowing it, Iran developed the fourth largest cyber army in the world. “We have armed ourselves with new tools, because a cyber war is more dangerous than a physical war,” said Abdollah Araqi, deputy commander of ground forces in the Islamic Revolutionary Guard Corps (IRGC), according to the Iranian Students’ News Agency.

Israel’s Institute for National Security Studies (INSS) said that, “IRGC clearly makes the country one of the best and most advanced nation when it comes to cyberwarfare. In a case of escalation between Iran and the West, Iran will likely aim to launch a cyberattack against critical infrastructures in the United States and its allies, including energy infrastructure, financial institutions, transportation systems, and other.”

Two demonstrations of Tehran’s offensive cyber capabilities clearly affirm Iran’s position as a cyber force to be reckoned with. The computer systems of major American financial institutions were attacked in 2013 at an unprecedented level. US intelligence officials clearly stated that they found a link between the attacks and the Islamic Republic, as well as the “Shamoon” virus that attacked the computers of Saudi Arabia’s Aramco oil corporation.

Iran is quickly adapting to the modern world, utilising its tools to both control dissent within the country, and to project its force outside of it. The world would be foolish to not take notice.

I-HLS

« ‘Eye In The Sky’: The Reality Of Drone Warfare Revealed
Seven Profiles Of Highly Risky Insiders »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

PETRAS IoT Hub

PETRAS IoT Hub

PETRAS is a consortium of 12 research institutions and the world’s largest socio-technical research centre focused on the future implementation of the IoT.

NetGuardians

NetGuardians

NetGuardians is a leading Fintech company recognized for its unique approach to fraud and risk assurance solutions.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

CGII is the Computer Incident Management Center of the State of Bolivia.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

Infosec Global

Infosec Global

Infosec Global provides technology innovation, thought leadership and expertise in cryptographic life-cycle management.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

MindWise

MindWise

MindWise is a comprehensive global threat monitoring solution with implementations for fraud prevention and enterprise threat intelligence.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

InfoSec4TC

InfoSec4TC

InfoSec4tc is an online Information Security Courses, Training, and Consultancy provider.

KBE Information Security

KBE Information Security

KBE is a global consulting firm, with offices in Toronto and Milan, which specializes in the area of IT and information security with over 20 years of experience.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.

Utilize

Utilize

Utilize is an award-winning technology company with over 25 years of industry expertise, we support hundreds of businesses across London and the South East.

CNNECT

CNNECT

CNNECT are specialists in cloud, collaboration and cybersecurity, constantly evolving the way in which we understand, advise and deploy these technologies