Iran Admits To Being Hit By Cyber Attack

Iran’s strategic computer and infrastructure networks reportedly fell under an extensive and powerful cyber-attack in the last several days, according to Israeli news reports on Wednesday 31st Oct. Analysts believe this attack is far more potent than the “Stuxnet” virus which hit Iranian networks a few years ago.

Speculation has fallen on Israel as the perpetrator of the attack, though Jerusalem remains tight-lipped

Gholamreza Jalali, head of Iran’s civil defense agency, told media outlets on Sunday that the government successfully neutralised “a new generation of Stuxnet which consisted of several parts… and was trying to enter our systems.”

The Iranians, however, did not reveal the extent of its damage. Israel, considered the Islamic Republic’s arch enemy, has been silent on the matter.

Eyal Wachsman, CEO of Israeli cyber-security company Cymulate, told The Media Line that “Iran has physically attacked civilian and military targets worldwide with bombs and guns, and in recent years, has taken the fight to the cyber world.

“The US and Israel, masters of cyber warfare, are believed to have been behind counterattacks against Iran in the past, including the Stuxnet virus in 2010,” Wachsman said. That virus sabotaged Iran’s nuclear enrichment efforts by speeding up and damaging its centrifuges.

“In 2012, the Flame virus was deployed targeting Iran’s computer networks that collect intelligence, and Duqu 2.0 was used in 2015 during the nuclear talks. There were presumably additional attacks which have received little to no attention,” Wachsman continued.

After U.S. sanctions against Iran come into full force on November 5, “Iran could feel cornered, and therefore might unleash a very severe cyber-attack, forcing the US and Israel to retaliate at the same level or possibly higher.”

The latest attack on Iran’s networks comes on the backdrop of two earlier security-related developments involving the Islamic Republic. A few hours before the attack, Israel’s Mossad intelligence agency helped Danish officials thwart an Iranian murder plot against three anti-regime Iranian dissidents living in Denmark.

Two days before that, Iranian officials acknowledged that Iranian President Hassan Rouhani’s mobile phone had been bugged by unknown hackers, the semi-official Iranian Students News Agency reported.

In response to the bugging, Iran’s Supreme Leader Ayatollah Ali Khamenei urged defense officials to step up counter-intelligence efforts against “the enemy’s complex practices,” according to a report on Iranian state TV. He also urged security organs to “confront infiltration through scientific, accurate, and up-to-date action.”

On Thursday, Iranian Foreign Minister Javad Zarif sent out a tweet citing the recent sequence of events, claiming Israel was behind it. “Incredible series of coincidences. Or, a simple chronology of a MOSSAD program to kill the JCPOA?” he wrote, referring to the 2015 Joint Comprehensive Plan of Action, also known as the Iran nuclear deal.

Asaf Romirowsky, a Middle East historian and Executive Director of Scholars for Peace in the Middle East, told The Media Line that in the last few months “Israeli intelligence was able to unearth 100,000 documents regarding Iran’s nuclear ambitions.”

The operation to infiltrate Iranian intelligence was part of ongoing attempts to prove what Iran has been doing despite its rhetoric of cooperation with European powers, which are trying to salvage the nuclear deal, Romirowsky explained.

“The Israelis showcasing their intelligence was key, because all along the debate, especially when it comes to American foreign policy toward Israel, was that Iran was not doing things under the table. But the Israelis uncovered actual data that proved the opposite. It was part of the tactic to show the world what Iran’s true intentions were.

“The latest attack in the cyber warfare taking place in the region is part of an effort to calm the region by whatever means necessary,” Romirowsky concluded.

Israel fiercely opposed the 2015 nuclear deal with Iran, claiming that it was Iran’s way of arriving at a nuclear bomb through cooperative means. Last May, US President Donald Trump withdrew from the accord and began re-imposing economic sanctions on Tehran.

As Iran and European powers work to salvage the deal, Israeli officials claim that Tehran is still pursuing aggressive policies through covert operations. Earlier this year, the Mossad claimed to have extracted a vast archive of documents from Tehran that details Iran’s nuclear ambitions.

Netanyahu revealed some findings from the stolen achieve at the UN General Assembly meeting in New York last September. He used graphics to pinpoint covert nuclear facilities inside Iran, Syria and Lebanon.

“What Iran hides, Israel will find,” Netanyahu said during his address to the assembly.

The Media Line:

You Might Also Read:

What Is Stuxnet And Who Created It?

« How To Avoid Facebook Phishing Scams
USB Devices Pose A Significant Threat To Industrial Facilities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ComSec LLC

ComSec LLC

ComSec perform threat assessments to identify vulnerabilities and help protect businesses against corporate espionage via electronic eavesdropping.

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

Packet Ninjas

Packet Ninjas

Packet Ninjas is a niche cyber security agency with specialized expertise in the use of digital intelligence to strengthen cyber security.

NordForsk

NordForsk

NordForsk facilitates and provides funding for Nordic research cooperation and research infrastructure. Project areas include digitalisation and digital security.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.

SafeAeon

SafeAeon

SafeAeon is a leading Cybersecurity-as-a-Service provider, offering 24x7 premium Managed Security Services with AI-powered and Human-driven 24x7 SOC.