Iran Admits To Being Hit By Cyber Attack

Iran’s strategic computer and infrastructure networks reportedly fell under an extensive and powerful cyber-attack in the last several days, according to Israeli news reports on Wednesday 31st Oct. Analysts believe this attack is far more potent than the “Stuxnet” virus which hit Iranian networks a few years ago.

Speculation has fallen on Israel as the perpetrator of the attack, though Jerusalem remains tight-lipped

Gholamreza Jalali, head of Iran’s civil defense agency, told media outlets on Sunday that the government successfully neutralised “a new generation of Stuxnet which consisted of several parts… and was trying to enter our systems.”

The Iranians, however, did not reveal the extent of its damage. Israel, considered the Islamic Republic’s arch enemy, has been silent on the matter.

Eyal Wachsman, CEO of Israeli cyber-security company Cymulate, told The Media Line that “Iran has physically attacked civilian and military targets worldwide with bombs and guns, and in recent years, has taken the fight to the cyber world.

“The US and Israel, masters of cyber warfare, are believed to have been behind counterattacks against Iran in the past, including the Stuxnet virus in 2010,” Wachsman said. That virus sabotaged Iran’s nuclear enrichment efforts by speeding up and damaging its centrifuges.

“In 2012, the Flame virus was deployed targeting Iran’s computer networks that collect intelligence, and Duqu 2.0 was used in 2015 during the nuclear talks. There were presumably additional attacks which have received little to no attention,” Wachsman continued.

After U.S. sanctions against Iran come into full force on November 5, “Iran could feel cornered, and therefore might unleash a very severe cyber-attack, forcing the US and Israel to retaliate at the same level or possibly higher.”

The latest attack on Iran’s networks comes on the backdrop of two earlier security-related developments involving the Islamic Republic. A few hours before the attack, Israel’s Mossad intelligence agency helped Danish officials thwart an Iranian murder plot against three anti-regime Iranian dissidents living in Denmark.

Two days before that, Iranian officials acknowledged that Iranian President Hassan Rouhani’s mobile phone had been bugged by unknown hackers, the semi-official Iranian Students News Agency reported.

In response to the bugging, Iran’s Supreme Leader Ayatollah Ali Khamenei urged defense officials to step up counter-intelligence efforts against “the enemy’s complex practices,” according to a report on Iranian state TV. He also urged security organs to “confront infiltration through scientific, accurate, and up-to-date action.”

On Thursday, Iranian Foreign Minister Javad Zarif sent out a tweet citing the recent sequence of events, claiming Israel was behind it. “Incredible series of coincidences. Or, a simple chronology of a MOSSAD program to kill the JCPOA?” he wrote, referring to the 2015 Joint Comprehensive Plan of Action, also known as the Iran nuclear deal.

Asaf Romirowsky, a Middle East historian and Executive Director of Scholars for Peace in the Middle East, told The Media Line that in the last few months “Israeli intelligence was able to unearth 100,000 documents regarding Iran’s nuclear ambitions.”

The operation to infiltrate Iranian intelligence was part of ongoing attempts to prove what Iran has been doing despite its rhetoric of cooperation with European powers, which are trying to salvage the nuclear deal, Romirowsky explained.

“The Israelis showcasing their intelligence was key, because all along the debate, especially when it comes to American foreign policy toward Israel, was that Iran was not doing things under the table. But the Israelis uncovered actual data that proved the opposite. It was part of the tactic to show the world what Iran’s true intentions were.

“The latest attack in the cyber warfare taking place in the region is part of an effort to calm the region by whatever means necessary,” Romirowsky concluded.

Israel fiercely opposed the 2015 nuclear deal with Iran, claiming that it was Iran’s way of arriving at a nuclear bomb through cooperative means. Last May, US President Donald Trump withdrew from the accord and began re-imposing economic sanctions on Tehran.

As Iran and European powers work to salvage the deal, Israeli officials claim that Tehran is still pursuing aggressive policies through covert operations. Earlier this year, the Mossad claimed to have extracted a vast archive of documents from Tehran that details Iran’s nuclear ambitions.

Netanyahu revealed some findings from the stolen achieve at the UN General Assembly meeting in New York last September. He used graphics to pinpoint covert nuclear facilities inside Iran, Syria and Lebanon.

“What Iran hides, Israel will find,” Netanyahu said during his address to the assembly.

The Media Line:

You Might Also Read:

What Is Stuxnet And Who Created It?

« How To Avoid Facebook Phishing Scams
USB Devices Pose A Significant Threat To Industrial Facilities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

BGD E-GOV CIRT

BGD E-GOV CIRT

BGD e-GOV CIRT's mission is to support government efforts to develop ICT programs by establishing incident management capabilities within Bangladesh.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

Entel CyberSecure

Entel CyberSecure

Entel CyberSecure is a portfolio of Cybersecurity solutions and services for the protection, defense, risk management and regulatory compliance of ICT Systems for corporations and Government.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

Moxa

Moxa

Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

CAT Labs

CAT Labs

CAT Labs is building digital asset recovery and cybersecurity tools to enable governments to fight crypto crime and to protect investors from hacks, fraud and scams.

Resmo

Resmo

Resmo is an all in one platform for SaaS app and access management for modern IT teams.

InterSources

InterSources

InterSources is a trusted partner, leading the way in Cloud Security, Cybersecurity, PLG Consulting, Digital Transformation, and Professional Services.

CHERI Alliance

CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.