Iran and Saudi Marching To Cyber War!

iranian-saudi-cyber-conflict-5-alt.png

Iran and Saudi Arabia, regional rivals in the Middle East, may be engaged in cyber warfare, according to a new report by threat intelligence firm Recorded Future. http://http://ow.ly/SsGv9

 

As the two powers vie for influence over the civil wars in Yemen and Syria and regional dominance, Tehran and Riyadh have begun using cyber attacks to release critical intelligence.

 WikiLeaks released on June 19 over half a million cables from the Saudi Foreign Ministry, including several "Top Secret" reports from the country's General Intelligence Services after a hack by a group calling itself the Yemeni Cyber Army. Recently, the Washington Post  reported that the theft of the Saudi Cables bore indications of Iranian hackers. 
"These events fit a pattern that looks and smells like Iranian-proxy actors," said Jen Weedon, manager of threat intelligence at FireEye, a firm specializing in cyber-security. The incident "definitely resembles past activity we've seen by Iranian groups."

Some analysis’s have suggested that the civil war in Yemen is effectively a proxy-war between the two regional powers, with the predominately-Shiite Iran backing the Houthi rebels while the Sunni Saudi Arabia supports the current government.

In 2014, Iranian hackers began a cyber operation against 16 countries, including the United States, targeting government organizations for information, according to FoxNews.com. Iran has increased cyber-attacks since the US and Israel halted the Iranian nuclear program with a computer virus in 2010.
"There has been a long running rivalry between Iran and Saudi Arabia, the Saudis see us as an ally, the Iranians see us as an adversary, that's always placed limitations on what they could do to one another," said Christopher Griffin, executive director of the Foreign Policy Initiative.

But in recent years, increasing sectarian tension along with civil wars in the region has allowed for greater antagonism between the countries.
"It's been this low-key cyber volleying back and forth at each other. It now looks like someone got tired of this and said 'look I'm going to yank up this game' to a different level," said Ahlberg to FoxNews.com. "When we look at this and take apart this Yemen Cyber Army and really try to understand who they are. They look a lot like other Iranian actors."

Ein News:  http://bit.ly/1Kq7Zxd

 

« North Korean Leader Has His Own Cellular Network
Spy Agencies Go Recruiting on LinkedIn »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

Libraesva

Libraesva

Libraesva specialize in Email Security. From Email Security, Phishing Awareness and Email Archiver. We can assist you with any email issues you may have.

FIRST Conference

FIRST Conference

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

SafeCharge

SafeCharge

SafeCharge is a global provider of technology-based multi-channel payments services and risk management solutions for demanding businesses.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

Cipher

Cipher

Founded in 2000, Cipher is a global cybersecurity company that delivers a wide range of Managed Security Services.

Risk Strategies

Risk Strategies

Risk Strategies is a leading specialty risk management consultancy and insurance broker offering smarter, practical approaches to risk mitigation including Cyber Liability insurance.

Enginsight

Enginsight

Enginsight provides a comprehensive solution for monitoring and securing your servers and clients.

NetTech

NetTech

NetTech’s Managed CyberSecurity and Compliance/HIPAA services are designed to help your company prevent security breaches and quickly remediate events if they do happen to occur.

MindWise

MindWise

MindWise is a comprehensive global threat monitoring solution with implementations for fraud prevention and enterprise threat intelligence.

Park Place Technologies

Park Place Technologies

Park Place Technologies' mission is to drive uptime, performance and value for critical IT infrastructure.

GTT Communications

GTT Communications

GTT are a global network provider that serves thousands of multinational and national enterprise, government and carrier customers with a portfolio of advanced connectivity and security services.

Buguard

Buguard

Buguard is a multi-award-winning supplier of Application Security Assessments and GRC services.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.