Iran Admits To Being Hit By Cyber Attack

Iran’s strategic computer and infrastructure networks reportedly fell under an extensive and powerful cyber-attack in the last several days, according to Israeli news reports on Wednesday 31st Oct. Analysts believe this attack is far more potent than the “Stuxnet” virus which hit Iranian networks a few years ago.

Speculation has fallen on Israel as the perpetrator of the attack, though Jerusalem remains tight-lipped

Gholamreza Jalali, head of Iran’s civil defense agency, told media outlets on Sunday that the government successfully neutralised “a new generation of Stuxnet which consisted of several parts… and was trying to enter our systems.”

The Iranians, however, did not reveal the extent of its damage. Israel, considered the Islamic Republic’s arch enemy, has been silent on the matter.

Eyal Wachsman, CEO of Israeli cyber-security company Cymulate, told The Media Line that “Iran has physically attacked civilian and military targets worldwide with bombs and guns, and in recent years, has taken the fight to the cyber world.

“The US and Israel, masters of cyber warfare, are believed to have been behind counterattacks against Iran in the past, including the Stuxnet virus in 2010,” Wachsman said. That virus sabotaged Iran’s nuclear enrichment efforts by speeding up and damaging its centrifuges.

“In 2012, the Flame virus was deployed targeting Iran’s computer networks that collect intelligence, and Duqu 2.0 was used in 2015 during the nuclear talks. There were presumably additional attacks which have received little to no attention,” Wachsman continued.

After U.S. sanctions against Iran come into full force on November 5, “Iran could feel cornered, and therefore might unleash a very severe cyber-attack, forcing the US and Israel to retaliate at the same level or possibly higher.”

The latest attack on Iran’s networks comes on the backdrop of two earlier security-related developments involving the Islamic Republic. A few hours before the attack, Israel’s Mossad intelligence agency helped Danish officials thwart an Iranian murder plot against three anti-regime Iranian dissidents living in Denmark.

Two days before that, Iranian officials acknowledged that Iranian President Hassan Rouhani’s mobile phone had been bugged by unknown hackers, the semi-official Iranian Students News Agency reported.

In response to the bugging, Iran’s Supreme Leader Ayatollah Ali Khamenei urged defense officials to step up counter-intelligence efforts against “the enemy’s complex practices,” according to a report on Iranian state TV. He also urged security organs to “confront infiltration through scientific, accurate, and up-to-date action.”

On Thursday, Iranian Foreign Minister Javad Zarif sent out a tweet citing the recent sequence of events, claiming Israel was behind it. “Incredible series of coincidences. Or, a simple chronology of a MOSSAD program to kill the JCPOA?” he wrote, referring to the 2015 Joint Comprehensive Plan of Action, also known as the Iran nuclear deal.

Asaf Romirowsky, a Middle East historian and Executive Director of Scholars for Peace in the Middle East, told The Media Line that in the last few months “Israeli intelligence was able to unearth 100,000 documents regarding Iran’s nuclear ambitions.”

The operation to infiltrate Iranian intelligence was part of ongoing attempts to prove what Iran has been doing despite its rhetoric of cooperation with European powers, which are trying to salvage the nuclear deal, Romirowsky explained.

“The Israelis showcasing their intelligence was key, because all along the debate, especially when it comes to American foreign policy toward Israel, was that Iran was not doing things under the table. But the Israelis uncovered actual data that proved the opposite. It was part of the tactic to show the world what Iran’s true intentions were.

“The latest attack in the cyber warfare taking place in the region is part of an effort to calm the region by whatever means necessary,” Romirowsky concluded.

Israel fiercely opposed the 2015 nuclear deal with Iran, claiming that it was Iran’s way of arriving at a nuclear bomb through cooperative means. Last May, US President Donald Trump withdrew from the accord and began re-imposing economic sanctions on Tehran.

As Iran and European powers work to salvage the deal, Israeli officials claim that Tehran is still pursuing aggressive policies through covert operations. Earlier this year, the Mossad claimed to have extracted a vast archive of documents from Tehran that details Iran’s nuclear ambitions.

Netanyahu revealed some findings from the stolen achieve at the UN General Assembly meeting in New York last September. He used graphics to pinpoint covert nuclear facilities inside Iran, Syria and Lebanon.

“What Iran hides, Israel will find,” Netanyahu said during his address to the assembly.

The Media Line:

You Might Also Read:

What Is Stuxnet And Who Created It?

« How To Avoid Facebook Phishing Scams
USB Devices Pose A Significant Threat To Industrial Facilities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

Leonardo

Leonardo

Leonardo (formerly Finmeccanica) is a global high-tech company in Aerospace, Defence, Security & Information Systems including Cybersecurity & ICT solutions.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

Cato Networks

Cato Networks

Cato connects your branch locations, physical and cloud datacenters, and mobile users into a secure and optimized global network in the cloud.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

ISA Security Compliance Institute (ISCI)

ISA Security Compliance Institute (ISCI)

ISCI, a not-for-profit automation controls industry consortium, manages the ISASecure™ conformance certification program for industrial automation and control systems.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications and Information Protection is the technical security and intelligence service of Ukraine, under the control of the President of Ukraine.

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

Tide Foundation

Tide Foundation

Tide's breakthrough multi-party-cryptography enables TRUE-zero-trust technology that unlocks cyber-herd immunity.

Fortiedge

Fortiedge

Fortiedge is an IT Security solution provider specializing in Cyber Security practices and solutions for our clients.

Protect AI

Protect AI

Protect AI is a cybersecurity company focused on AI & ML systems. Through innovative security products and thought leadership in MLSecOps, we help our customers build a safer AI powered world.

Seedcamp

Seedcamp

Seedcamp identify and invest early in world-class founders attacking large and global markets through disruptive technology in areas including AI, cybersecurity, and Fintech.

Ofcom

Ofcom

Ofcom is the UK's communications regulator. We regulate the TV, radio and video on demand sectors, fixed line telecoms, mobiles, postal services, plus the airwaves over which wireless devices operate.