US Cyber Attack On Iran

Mistrust and hostilities between Iran and the US are increasing with the attacks on drones, shipping and cyber hacking and the countries are certainly getting closer to outright war. Tensions between Iran and the US have increased since the United States came out of the Nuclear Agreement between Iran and global powers and now Iran says it will breach, on 27 June, the limit on its stockpile of enriched uranium that was set in the Nuclear Agreement of 2015. 

Now Iran has recently said it had exposed a large cyber espionage network it alleged was run by the US Central Intelligence Agency (CIA), and that several US spies had been arrested in different countries as the result of this action. Security analysts say that Iran has used hackers to send phishing emails to a series of US targets. 

US-Iran tensions are growing following accusations by US President Donald Trump’s administration that Tehran attacked two oil tankers in the Gulf of Oman, a vital oil shipping route and the taking down of a US drone. 

Now US Cyber Command has launched a reciprocal digital strike against an Iranian spy group that supported the recent limpet mine attacks on commercial ships, according to two former intelligence officials who were interviewed by some of the US press.

The United States has also deployed a carrier strike group and bombers to the and announced plans to deploy 1,500 troops to the Middle East, prompting fears of a conflict. 

The Iranian group, which has ties to the Iranian Revolutionary Guard Corps, has over the past several years digitally tracked and targeted military and civilian ships passing through the economically important Strait of Hormuz, through which pass 17.4 million barrels of oil per day. Those capabilities, which have advanced over time, enabled attacks on vessels in the region for several years.

Though sources did not provide any further details of the retaliatory cyber operation, the response highlights how the Persian Gulf has become a staging ground for escalating digital, as well as conventional, conflict, with both the United States and Iran trying to get the upper hand with cyber capabilities.

The retaliatory cyber response follows several weeks of mounting tension in the region, which appeared set to boil over after last week’s attacks on two oil tankers in the Gulf. 

US officials blamed Iran for the attacks and threatened to strike back if US interests in the region were harmed. Then, on Thursday 20th June, Iranians shot down a $240 million US military drone.In response, President Trump initially authorised, but then decided against, targeted military strikes. His tweets on Friday morning said that he pulled back before any missiles were launched when he learned 150 Iranians might die.

Meanwhile, multiple private US cyber intelligence firms have reported attempts by Iranian hackers in recent weeks to infiltrate American organisations. US officials have said they fear heightened escalations not only in physical space but in cyberspace as well.

The National Security Council declined to comment on the Iranian cyber group or the US Cyber Command response. 
Iran’s cyber capabilities are not the most sophisticated, at least compared to the United States’, but they are getting better. 
Tehran’s ability to gather information and unleash offensive operations has developed significantly in the last decade or so, particularly after Iranian centrifuges at the Natanz uranium enrichment plant were struck by a malicious computer worm created by US and Israeli intelligence and first revealed in 2010. 

In 2010, the so-called Stuxnet virus disrupted the operation of thousands of centrifuges at a uranium enrichment facility in Iran. Iran accused the US and Israel of trying to undermine its nuclear program through covert operations.

“After the Stuxnet event, Iran really cranked up its capability,” said Gary Brown, who served as the first senior legal counsel for US Cyber Command and is currently a professor on cyber law at the National Defense University. Brown cited Iran’s cyber-attacks on global financial institutions, Saudi Aramco and the Sands Casino. 

Yahoo:         CBS:         Reuters:

You Might Also Read:

Iranian Cyber-Espionage Exposed:

US Under Attack By Chinese & Iranian Hackers:

 

« British Police Forensics Attacked
SMEs Need A Disaster Recovery Plan »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSIRT.CZ

CSIRT.CZ

CSIRT.CZ is the National Computer Security Incident Response Team of the Czech Republic.

Bulletproof Cyber

Bulletproof Cyber

Bulletproof offer a range of security services, from penetration testing and vulnerability assessments to 24/7 security monitoring, and consultancy.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

Nucleon

Nucleon

Nucleon enables cybersecurity tools, organizations and software developers to become proactive by blocking threats before they become breaches.

Guardian Data Destruction

Guardian Data Destruction

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services.

Sixgill

Sixgill

Sixgill, an IoT sensor platform company, builds the universal data service and smart process automation software allowing any organization to effectively govern its IoE assets.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

DigitalWell

DigitalWell

DigitalWell provide fully managed IT and communications solutions for a truly innovative end-to-end experience - for your customers and teams.

Cyber-Security Council Germany

Cyber-Security Council Germany

The German Cyber Security Council's objective is to consult businesses, government agencies and political decision-makers and to support them against cybercrime.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

C2 Risk

C2 Risk

C2 Risk are focussed on risk analytics for information assurance, privacy and ESG (Environmental, Social, and Governance).

Hartman Executive Advisors

Hartman Executive Advisors

Hartman Executive Advisors is an unbiased IT and cyber advisory firm uniquely designed to help mid-market executives maximize their IT investments.

AmiViz

AmiViz

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, designed specially to serve the interests of enterprise resellers and vendors.