Big Cyber Attack Hits Iran

Internet connectivity in Iran has dropped  to 75%  as a senior Iranian telecommunication official said that a "powerful" distributed denial-of-service (DDoS) attack that targeted Iran's telecom services on Saturday 8th February morning. National news agency sources claim the attack has now been as been aborted. 

The deputy director of Iran's Telecommunications Infrastructure Company (TCI) , Sajjab Bonabi, said that, despite cyber-attacks, the country will guarantee Internet service due to the strength of its technology, however, ttempts to access the officail TCI website for conformations have been unsuccessful to date.

According to NetBlocks, Iran has lost 25% of its Internet access as a result of cyber-attacks on the country’s infrastructure. After the precautions taken, Internet access returned to a normal setting after 7 hours. The DDoS attack was dealt with immediately using the Iranian Information Technology Fortress, known as DEJFA.

Mapping Internet freedom in real time, NetBlocks confirmed that there was a major glitch in Iran’s telecommunications network on the morning of February 8. NetBlocks, which detected flaws and critical cyber-attacks in real time, said that the Internet usage in the country has dropped up to 75%. in a post on Twitter.

Its is though the reason for losing about 25% of the internet in the country is due to the fact that Iranian authorities activated the “Digital Fortress” cyber defense mechanism known as DZHAFA. The NetBlocks report is also said to have implemented DEZHFA activation to “repel a cyber-attack on the country’s infrastructure”. It took 7 hours for the Internet connection to return to a normal setting.

After this outage, which affected both fixed and mobile network providers, it took 7 hours for normal internet connection to restart. 

Sadjad Bonabi, a spokesperson for the Telecommunications Infrastructure Company, which provides telecommunications infrastructure to all private and public operators in Iran, said in his statements on Twitter that the attacks on the country’s internet were a type of cyber-attack called ‘DDoS’ and returned to normal by DZHAFA intervention.

DDoS, which is a type of attack that prevents the system from serving and accessing users, is actually not unusual for countries. In December 2019, China used a similar method to coordinate protests in Hong Kong. We can say that this is the most recent example of the latest attack against the Iranian infrastructure.

In July last year the US launched a cyber-attack on Iran targeting the computer systems for controlling rocket and missile launches. 

The launch of the ‘Iran Zafar’ observation satellite, which will be launched into orbit on the same day, has been delayed. Iranian officials say there is no problem with launching the satellite and it will be launched at the earliest opportunity.  It is not yet known whether the launch lag and cyber-attack are related.

SOMAG News:        XinhuaNet:        PRENSA:          Mangalorean


You Might Also Read:

US Cyber Command Is A Tool Of Foreign Policy:

 


 

« The Geopolitics Of Cybersecurity
Fake News Uses Coronavirus To Spread Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

Proact IT Group

Proact IT Group

Proact is Europe's leading independent data centre and Cloud services enabler. We deliver flexible, accessible and secure IT solutions and services.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Sprint Networks

Sprint Networks

Sprint Networks is a trusted compliance and risk program advisor which deliver cost-effective technology to reduce enterprise-wide risk.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

Vali Cyber

Vali Cyber

Vali Cyber was founded in 2020 with the mission of addressing the specific cybersecurity needs of Linux.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.

Orca Technology

Orca Technology

Orca is a UK-based Managed Service Provider delivering end-to-end managed IT services, support, hosted desktop, cloud solutions and strategic guidance.

Disecto Technologies

Disecto Technologies

At Disecto, we provide SaaS based Data Discovery, Classification and a remediation solution for data privacy compliance.

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.