Iran Adopts Russian Style CyberWar Tactics

Reports indicate that the Iranian regime has deployed online bots to push back against the people who want it dismantled and have relied on Internet access to organise protests.

Iran, like Russia, reportedly uses cyber trolls and bots to push its propaganda to sway and influence social media trends in its favor.

The Saudi news outlet Al-Arabiya claimed in a recent analysis piece that the Iranian regime has activated “all sleeping and active ‘fake persons’ in various social networks” in response to the widespread social uprisings throughout the Islamic republic.

The outlet notes that the objective of these bots and trolls is to combat information against the regime from members of Iran’s protesting civil society with their stream of pro-government propaganda and to intimidate Iranians who are intent on seeing the regime’s fall.

In January, Breitbart News reported, “Anti-regime Iranians intent on seeing the dismantling of Iran’s Islamic regime have gone to war against pro-regime loyalists over social media, reportedly using bots to saturate Twitter and Instagram with propaganda against those seeking true democracy and freedom.”

However, the Al-Arabiya analysis notes that the Iranian regime’s army of trolls differs from Russian trolls in that the Iranians are far less advanced than their Russian counterparts, including lacking the ability to create websites, pages, and communities on Facebook on a mass scale.

Furthermore, Iranian activists reportedly told Al-Arabiya that Iran may have approximately 5,000 government-affiliated trolls working on its behalf to undermine the second consecutive week of protests that seek to topple Iran’s dictatorial regime.

While social media platforms like Facebook, Twitter, YouTube, and Viber are blocked in Iran, requiring everyday Iranians to use VPNs to access them, the country’s leadership can use these same services without interruption.

In fact, Iran’s Supreme Leader Ayatollah Ali Khamenei sends out tweets from his account on a near-daily basis, as do President Hassan Rouhani and Foreign Minister Javad Zarif.

Al-Arabiya noted that sometimes, “Iranian government-backed trolls cooperate with Iranian government hackers.”

For example, thousands of American and Israeli citizens, mainly military, journalists, and experts based in Washington, DC, were reportedly targeted by these entities.

One such pro-regime bot on Twitter tweeted, “I’ve just arrived and no one is here. Why are you lying?” in response to thousands taking to the streets, throughout various cities in Iran, to protest Iran’s regime.

Ein News

You Might Also Read: 

Iran Turns Off The Internet:

Iran’s Cyber Capabilities:

Iran Wants To Collect All Social Network Data:

 

« Ethical Hacking Is A Great Career Option
The Role Of Blockchain In Helping Organisations Meet GDPR Compliance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Hyper Recruitment Solutions

Hyper Recruitment Solutions

Hyper Recruitment Solutions is a specialist and highly compliant recruitment consultancy dedicated to the Science and Technology sectors.

BruCERT

BruCERT

BruCERT is the referral agency for dealing with computer-related and internet-related security incidents in Brunei Darussalam.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

D3 Security

D3 Security

D3's Smart SOAR platform is at the forefront of the security automation revolution, helping clients around the world to rapidly identify, analyze, and resolve advanced threats.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

Urbane Security

Urbane Security

Urbane Security is a premier information security consultancy empowering the Fortune 500, small and medium enterprise, and high-tech startups.

Safetech Innovations

Safetech Innovations

Safetech Innovations is a team of cyber security experts, always at your service. We use human and cyber intelligence to help your business in uncertain times.

StateRAMP

StateRAMP

StateRAMP reduces risk from unsecure cloud solutions and protects data by providing State and local governments a standardized approach for verifying and monitoring security postures.

Sunartek Labs

Sunartek Labs

Sunartek are equipped with expert resources and advanced technology to identify cyber threats and prevent any breach, bypassing the security network of your organization.

ACSG Corp

ACSG Corp

ACSG Corp is a Critical Infrastructure Protection Company with a multi-disciplinary focus on building analytics software for various industry sectors.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

Lab 1

Lab 1

Lab 1 turns criminal data breaches and attacks into insights. Get alerts of data breaches or ransomware attack incidents as they happen.

Centric Consulting

Centric Consulting

Centric Consulting is an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption.