Iran Admits To Being Hit By Cyber Attack

Iran’s strategic computer and infrastructure networks reportedly fell under an extensive and powerful cyber-attack in the last several days, according to Israeli news reports on Wednesday 31st Oct. Analysts believe this attack is far more potent than the “Stuxnet” virus which hit Iranian networks a few years ago.

Speculation has fallen on Israel as the perpetrator of the attack, though Jerusalem remains tight-lipped

Gholamreza Jalali, head of Iran’s civil defense agency, told media outlets on Sunday that the government successfully neutralised “a new generation of Stuxnet which consisted of several parts… and was trying to enter our systems.”

The Iranians, however, did not reveal the extent of its damage. Israel, considered the Islamic Republic’s arch enemy, has been silent on the matter.

Eyal Wachsman, CEO of Israeli cyber-security company Cymulate, told The Media Line that “Iran has physically attacked civilian and military targets worldwide with bombs and guns, and in recent years, has taken the fight to the cyber world.

“The US and Israel, masters of cyber warfare, are believed to have been behind counterattacks against Iran in the past, including the Stuxnet virus in 2010,” Wachsman said. That virus sabotaged Iran’s nuclear enrichment efforts by speeding up and damaging its centrifuges.

“In 2012, the Flame virus was deployed targeting Iran’s computer networks that collect intelligence, and Duqu 2.0 was used in 2015 during the nuclear talks. There were presumably additional attacks which have received little to no attention,” Wachsman continued.

After U.S. sanctions against Iran come into full force on November 5, “Iran could feel cornered, and therefore might unleash a very severe cyber-attack, forcing the US and Israel to retaliate at the same level or possibly higher.”

The latest attack on Iran’s networks comes on the backdrop of two earlier security-related developments involving the Islamic Republic. A few hours before the attack, Israel’s Mossad intelligence agency helped Danish officials thwart an Iranian murder plot against three anti-regime Iranian dissidents living in Denmark.

Two days before that, Iranian officials acknowledged that Iranian President Hassan Rouhani’s mobile phone had been bugged by unknown hackers, the semi-official Iranian Students News Agency reported.

In response to the bugging, Iran’s Supreme Leader Ayatollah Ali Khamenei urged defense officials to step up counter-intelligence efforts against “the enemy’s complex practices,” according to a report on Iranian state TV. He also urged security organs to “confront infiltration through scientific, accurate, and up-to-date action.”

On Thursday, Iranian Foreign Minister Javad Zarif sent out a tweet citing the recent sequence of events, claiming Israel was behind it. “Incredible series of coincidences. Or, a simple chronology of a MOSSAD program to kill the JCPOA?” he wrote, referring to the 2015 Joint Comprehensive Plan of Action, also known as the Iran nuclear deal.

Asaf Romirowsky, a Middle East historian and Executive Director of Scholars for Peace in the Middle East, told The Media Line that in the last few months “Israeli intelligence was able to unearth 100,000 documents regarding Iran’s nuclear ambitions.”

The operation to infiltrate Iranian intelligence was part of ongoing attempts to prove what Iran has been doing despite its rhetoric of cooperation with European powers, which are trying to salvage the nuclear deal, Romirowsky explained.

“The Israelis showcasing their intelligence was key, because all along the debate, especially when it comes to American foreign policy toward Israel, was that Iran was not doing things under the table. But the Israelis uncovered actual data that proved the opposite. It was part of the tactic to show the world what Iran’s true intentions were.

“The latest attack in the cyber warfare taking place in the region is part of an effort to calm the region by whatever means necessary,” Romirowsky concluded.

Israel fiercely opposed the 2015 nuclear deal with Iran, claiming that it was Iran’s way of arriving at a nuclear bomb through cooperative means. Last May, US President Donald Trump withdrew from the accord and began re-imposing economic sanctions on Tehran.

As Iran and European powers work to salvage the deal, Israeli officials claim that Tehran is still pursuing aggressive policies through covert operations. Earlier this year, the Mossad claimed to have extracted a vast archive of documents from Tehran that details Iran’s nuclear ambitions.

Netanyahu revealed some findings from the stolen achieve at the UN General Assembly meeting in New York last September. He used graphics to pinpoint covert nuclear facilities inside Iran, Syria and Lebanon.

“What Iran hides, Israel will find,” Netanyahu said during his address to the assembly.

The Media Line:

You Might Also Read:

What Is Stuxnet And Who Created It?

« How To Avoid Facebook Phishing Scams
USB Devices Pose A Significant Threat To Industrial Facilities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

CyberSecurity Malaysia

CyberSecurity Malaysia

CyberSecurity Malaysia is the national cyber security specialist agency under the Ministry of Science, Technology and Innovation (MOSTI).

Entreda

Entreda

Entreda offers a unified platform to automate cybersecurity and compliance policy enforcement for your devices, users, networks, applications.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

MindPoint Group (MPG)

MindPoint Group (MPG)

MindPoint Group is a specialist Information Security Consulting firm.

Templar Executives

Templar Executives

Templar Executives is a leading, expert and dynamic Cyber Security company trusted by Governments and multi-national organisations to deliver business transformation.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

Spirit Technology Solutions

Spirit Technology Solutions

Spirit Technology Solutions is a modern workplace services provider committed to delivering solutions that embody our core principles of security, sustainability, and scalability.

NetDescribe

NetDescribe

NetDescribe, part of Xantaro Group, advises and supports companies in building secure and stable IT environments.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.