Iran Adopts Russian Style CyberWar Tactics

Reports indicate that the Iranian regime has deployed online bots to push back against the people who want it dismantled and have relied on Internet access to organise protests.

Iran, like Russia, reportedly uses cyber trolls and bots to push its propaganda to sway and influence social media trends in its favor.

The Saudi news outlet Al-Arabiya claimed in a recent analysis piece that the Iranian regime has activated “all sleeping and active ‘fake persons’ in various social networks” in response to the widespread social uprisings throughout the Islamic republic.

The outlet notes that the objective of these bots and trolls is to combat information against the regime from members of Iran’s protesting civil society with their stream of pro-government propaganda and to intimidate Iranians who are intent on seeing the regime’s fall.

In January, Breitbart News reported, “Anti-regime Iranians intent on seeing the dismantling of Iran’s Islamic regime have gone to war against pro-regime loyalists over social media, reportedly using bots to saturate Twitter and Instagram with propaganda against those seeking true democracy and freedom.”

However, the Al-Arabiya analysis notes that the Iranian regime’s army of trolls differs from Russian trolls in that the Iranians are far less advanced than their Russian counterparts, including lacking the ability to create websites, pages, and communities on Facebook on a mass scale.

Furthermore, Iranian activists reportedly told Al-Arabiya that Iran may have approximately 5,000 government-affiliated trolls working on its behalf to undermine the second consecutive week of protests that seek to topple Iran’s dictatorial regime.

While social media platforms like Facebook, Twitter, YouTube, and Viber are blocked in Iran, requiring everyday Iranians to use VPNs to access them, the country’s leadership can use these same services without interruption.

In fact, Iran’s Supreme Leader Ayatollah Ali Khamenei sends out tweets from his account on a near-daily basis, as do President Hassan Rouhani and Foreign Minister Javad Zarif.

Al-Arabiya noted that sometimes, “Iranian government-backed trolls cooperate with Iranian government hackers.”

For example, thousands of American and Israeli citizens, mainly military, journalists, and experts based in Washington, DC, were reportedly targeted by these entities.

One such pro-regime bot on Twitter tweeted, “I’ve just arrived and no one is here. Why are you lying?” in response to thousands taking to the streets, throughout various cities in Iran, to protest Iran’s regime.

Ein News

You Might Also Read: 

Iran Turns Off The Internet:

Iran’s Cyber Capabilities:

Iran Wants To Collect All Social Network Data:

 

« Ethical Hacking Is A Great Career Option
The Role Of Blockchain In Helping Organisations Meet GDPR Compliance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

SBS CyberSecurity

SBS CyberSecurity

SBS CyberSecurity is a premier cybersecurity consulting and audit firm.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

Flix11

Flix11

Flix11 is a Cyber Security & ICT Solutions focused company. We provide a range of products and services in Cyber Security, Internet of Things (IoT) and infrastructure solutions.

CrowdSec

CrowdSec

CrowdSec is an open-source & participative IPS able to analyze visitor behavior by parsing logs & provide an adapted response to all kinds of attacks.

ITProTV

ITProTV

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets.

Surefire Cyber

Surefire Cyber

Surefire Cyber delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware, data theft, and other threats with end-to-end response capabilities.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

The Cyber Scheme

The Cyber Scheme

The Cyber Scheme provides NCSC certified and assured assessments, training and career support for security testers & technical cyber professionals.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (formerly SecurityMadeIn.lu) is the backbone of leading-edge cyber resilience in Luxembourg.

Surf Security

Surf Security

SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance.