Destructive Cyber Attack On Saudi Kingdom

State-sponsored hackers have conducted a "series of destructive attacks" on Saudi Arabia, erasing data and wreaking havoc at the agency running the country’s airports, and hitting five additional targets. 

According to a report, "thousands of computers were destroyed at the headquarters of Saudi’s General Authority of Civil Aviation, erasing critical data and bringing operations there to a halt for several days". This it was claimed was a false-flag operation by a foreign country aiming to escalate tensions between Iran and Saudi Arabia

Several US Internet security companies later suggested the attacks were carried out by hackers using a virus called "Shamoon", which has been linked to the Iranian government. 

Two theories may explain the attacks 

First, they may signify a false-flag operation by a foreign country aiming to escalate tensions between Iran and Saudi Arabia and, by association, the United States. One cannot discount the possibility of Israel’s involvement because Israel would largely benefit from the incident’s aftermath.

A director at the Centre for Strategic and International Studies in Washington maintained that "anyone who did this attack knows it has implications for the nuclear deal - between Iran and the world powers". 

Other states in play

Meanwhile, it is important to remember that Israel has a history of hacking operations. In 2010, the Israelis together with the Americans collaborated in an attack on Iran’s nuclear enrichment plant using the Stuxnet virus.

Second, according to early reports from a Saudi probe - which obviously can be biased - "digital evidence" suggests the attacks emanated from Iran.

Rogue radical elements in the Iranian government could have intentionally acted to create a foreign policy crisis for the Rouhani administration but, Iran's president, Hassan Rouhani, seeks de-escalation in the international relations arena. He relies on the benefits of sanctions relief but requires a peaceful environment to bring Iran out of international economic obscurity, attract foreign investment and end the severe economic recession engulfing the country. 

The actualisation of the Iran nuclear deal between Iran and the world powers, the so-called Joint Comprehensive Plan of Action (JCPOA), strengthened Rouhani’s and the moderate current’s position as a whole in Iran.

The Shamoon virus was the same that devastated Saudi oil company Aramco in 2012. According to the report, Shamoon "overwrites files and renders the infected computers inoperable by destroying the master boot record". It spreads quickly "throughout a network, causing destruction like the digital version of a wildfire".

A secret document from April 2013, written by the US National Security Agency and revealed by the whistleblower Edward Snowden, pointed the finger directly at Iran.

It said: "Iran’s destructive cyber-attack against Saudi Aramco in August 2012, during which data was destroyed on tens of thousands of computers, was the first such attack NSA has observed from this adversary.

It spreads quickly "throughout a network, causing destruction like the digital version of a wildfire"

"Iran, having been a victim of a similar cyber-attack against its own oil industry in April 2012, has demonstrated a clear ability to learn from the capabilities and actions of others." In the past, there have been other suspicious incidents aimed at sabotaging Iran’s foreign relations.

MiddleEastEye:           The Growing Cyber Threat From Iran:         Iran Ministry Of Defense Hacked By Saudi Hacker:
 

 

« Yahoo Hack Affects 1 Billion Accounts
Insurers Are Handling 'hundreds' Of Breach Claims »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

AVR International

AVR International

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Paladion

Paladion

Paladion is a provider of managed IT security services.

Tigerscheme

Tigerscheme

Tigerscheme is a certification scheme for information security specialists, backed by University standards and covering a wide range of expertise.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Chainlink

Chainlink

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

Silicon Labs

Silicon Labs

Silicon Labs are a leader in secure, intelligent wireless technology for a more connected world. We provide award-winning hardware and software security to help safeguard connected devices.

Dr Web

Dr Web

Since 1992 the Russian anti-virus Dr.Web has been helping companies to keep their digital assets protected and operate in a secure digital environment.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.

Cyphershield

Cyphershield

Cypershield is a Security and Smart Contract audit company providing professional smart contract auditing services for varied Crypto projects.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.

CyberForce Global

CyberForce Global

CyberForce Global are at the forefront of start-up technology recruitment in areas including cybersecurity, IT infrastructure, software, fintech, blockchain and more.