Cyberwar: Covert Cyber Attack Campaign Is Underway

Amid rising tensions with Iran following the country’s downing of a US surveillance drone in June, President Trump ordered and then called off military strikes against targets in Iran. News reports indicated that, in lieu of those strikes, US Cyber Command had taken offensive action against Iranian targets.

The operation was first reported and described as a “retaliatory digital strike against an Iranian spy group.” Shortly afterward, several other outlets picked up the story.

According to reports, the target organisation was a “spy group, which has ties to the Islamic Revolutionary Guard Corps,” and the “online strike targeted an Iranian spy group’s computer software that was used to track the tankers that were targeted in the Gulf of Oman on June 13.” 

Iran threatens Israel 
"Iran has recently threatened the destruction of Israel," Benjamin Netanyahu said on Tuesday (July 9), filmed in front of an F35 fighter jet at the Nevatim Air Force Base near Be'er Sheva...... "But these planes," he warned, "can reach anywhere in the Middle East, including Iran and Syria."

Meanwhile, Israel's cyber capabilities have not been held back. Almost all of the real action is taking place behind the scenes, as the integration of cyber and conventional warfare has developed this year as never before.

This has introduced a new media dynamic, what is being seen is one dimension, one slice, you see what those controlling the narrative want you to see.

Israeli President Netanyahu has responded publicly to the threat made a week earlier by Mojtaba Zolnour, head of Iran's National Security and Foreign Policy Commission, that "if the US attacks Iran, Israel will have only half an hour left to live."
State media rhetoric apart, the real backdrop to this latest exchange is Iran's breach of the 2015 limits on uranium enrichment, the International Atomic Energy Agency (IAEA) verified Iran's "enriching uranium above 3.67% U-235," and Israel's warning that Iran faces (unilateral, if necessary) military action if it continues to break nuclear limits. 

Iran's breach remains well below weapons-grade enrichment, but the direction of travel is sending a message. And that message has been received and so the cyber conflict is now well underway.

Although sometimes this will (deliberately) hit the headlines, as with last month's US retaliatory cyber-attack on Iran's command and control systems, mostly it won't. The message sent with that attack was that "we can reach into your most secure networks when needed," with execution requiring more than clever coding and cyber superiority. 

Behind such an attack is the implication of significant action on the ground, usually entailing the compromise of individuals or physical equipment or the placement of an infected storage device into a live system. Headlines may pause between publicised incidents, activity does not.

Teheran has now responded with the hurried introduction of a command and control unit designed to withstand cyberattacks. Time will tell whether that is effective, but unless there has been a material collaboration with a foreign power, most likely Russia or China. Teheran has made its cyber relationship with Beijing headline news at the same time, with ICT Minister Mohammad Javad Azari Jahromi telling the media that "Iran and China are now standing in a united front to confront US unilateralism and hegemony."

At a June cyber conference in Israel, Netanyahu described the US as Israel's "great and irreplaceable ally," with the two countries "cooperating on cybersecurity like never before." The prime minister openly said that the investments being made are necessitated by "national defense." In the world of offensive cyber, Israel sits at the grown-up's table, with its Unit 8200 having achieved legendary status and a cyber startup landscape near Be'er Sheva intended to replicate hotspots is Maryland and Cheltenham.

While offensive actions on foreign powers will remain, usually, under wraps, Israel has decided that as a proxy it can promote its cyber expertise in combatting terrorist activity in Israel as well as in "dozens of countries" around the world.

It's a message to the world. This is an international effort, with a common focus and a common enemy, and it has an extensive reach. In his cyber presentation, Netanyahu referenced the foiling of an attack on an A380, bound for Abu Dhabi from Sydney, and said that "if you multiply that fifty-times, it will give you an idea of the contribution Israel has made to prevent major terrorist activities, mainly by ISIS, in dozens of countries, and most were foiled by our cyber activities." Netanyahu was not addressing his audience he was addressing the media beyond the walls of the auditorium.

A documentary recently broadcast in Israel  continued the theme. It again referenced the fifty-plus ISIS attacks that have been foiled by intelligence and cyber, even including a dozen such attacks in Turkey, despite the suspension of diplomatic ties between the countries under President Erdogan's stance over the issue of Palestine. 

There are parallels here with the level of collaboration taking place behind the scenes in the Middle East between Israel and surrounding Arab states, where the theory of "my enemy's enemy" has forged some fast collaborations (if not alliances, quite yet), most notably with Saudi Arabia.

Make no mistake, as the world sits and watches and waits to see what happens next in the Middle East, the cyber sphere in its more usual non-public guise is running at full speed. Networks are being probed, weaknesses and vulnerabilities are being tested and exploited, offensive actions are being planned.

Meanwhile, Iran is more than happy to focus its cyber efforts on soft industrial and civilian targets rather than hardened military ones, seen by Teheran as the soft underbelly it can attack on a low-effort, high-impact basis. In June, the Cybersecurity and Infrastructure Security Agency (CISA) within US Dept of Homelanf Security issued a warning about a "recent rise in malicious cyber activity directed at United States industries and government agencies by Iranian regime actors and proxies."

This year has seen the integration of conventional and cyber warfare as never before. That hybrid, mix and match approach has significantly increased the operational flexibility on both sides, but it has also increased the risks. 

With Russia and China actively sitting on the sidelines, both carrying a cyber threat far beyond Iran's wildest dreams, those risks can escalate as quickly as conventional ones, albeit much less visibly.

Forbes:           TimesofIsrael:           Lawfare:     

You Might Also Read:

The Destabilizing Danger Of Cyberattacks On Missile Systems:

US Cyber Strike On Iran Is A Step Change:

 

 

« Business Is Starting To Believe That AI Is The Best Defence
Lancaster University Hit By Data Thieves »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZDL Group

ZDL Group

At ZDL (formerly ZeroDayLab) we take a comprehensive view of our clients cyber security risks and provide quality services to address those risk

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

SPARTA Consortium

SPARTA Consortium

SPARTA tackles hard innovation challenges, leading the way in building transformative capabilities and forming a world-leading cybersecurity competence network across the EU.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

Cyber Security & Cloud Expo

Cyber Security & Cloud Expo

The Cyber Security & Cloud Expo is an international event series in London, Amsterdam and Silicon Valley.

Privacyware

Privacyware

Privacyware's ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted IIS traffic and web application threats.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Moore ClearComm

Moore ClearComm

Moore ClearComm is part of Moore Kingston Smith a leading UK firm of accountants and business advisers. Our services include Data Privacy, Cyber Security, Business Continuity and Information Security.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.

DataGuard

DataGuard

DataGuard is a security and compliance software company trusted by organisations across the globe.