Iran and Saudi Marching To Cyber War!

iranian-saudi-cyber-conflict-5-alt.png

Iran and Saudi Arabia, regional rivals in the Middle East, may be engaged in cyber warfare, according to a new report by threat intelligence firm Recorded Future. http://http://ow.ly/SsGv9

 

As the two powers vie for influence over the civil wars in Yemen and Syria and regional dominance, Tehran and Riyadh have begun using cyber attacks to release critical intelligence.

 WikiLeaks released on June 19 over half a million cables from the Saudi Foreign Ministry, including several "Top Secret" reports from the country's General Intelligence Services after a hack by a group calling itself the Yemeni Cyber Army. Recently, the Washington Post  reported that the theft of the Saudi Cables bore indications of Iranian hackers. 
"These events fit a pattern that looks and smells like Iranian-proxy actors," said Jen Weedon, manager of threat intelligence at FireEye, a firm specializing in cyber-security. The incident "definitely resembles past activity we've seen by Iranian groups."

Some analysis’s have suggested that the civil war in Yemen is effectively a proxy-war between the two regional powers, with the predominately-Shiite Iran backing the Houthi rebels while the Sunni Saudi Arabia supports the current government.

In 2014, Iranian hackers began a cyber operation against 16 countries, including the United States, targeting government organizations for information, according to FoxNews.com. Iran has increased cyber-attacks since the US and Israel halted the Iranian nuclear program with a computer virus in 2010.
"There has been a long running rivalry between Iran and Saudi Arabia, the Saudis see us as an ally, the Iranians see us as an adversary, that's always placed limitations on what they could do to one another," said Christopher Griffin, executive director of the Foreign Policy Initiative.

But in recent years, increasing sectarian tension along with civil wars in the region has allowed for greater antagonism between the countries.
"It's been this low-key cyber volleying back and forth at each other. It now looks like someone got tired of this and said 'look I'm going to yank up this game' to a different level," said Ahlberg to FoxNews.com. "When we look at this and take apart this Yemen Cyber Army and really try to understand who they are. They look a lot like other Iranian actors."

Ein News:  http://bit.ly/1Kq7Zxd

 

« North Korean Leader Has His Own Cellular Network
Spy Agencies Go Recruiting on LinkedIn »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Avanan

Avanan

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click.

Lynx Software Technologies

Lynx Software Technologies

Lynx provide secure software and operating systems for use in mission critical applications such as aerospace, medical, transportation and IoT.

ODVA

ODVA

ODVA is a global trade and standards development organization whose members comprise the world’s leading industrial automation companies.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

ESL Bangladesh

ESL Bangladesh

ESL is the Largest IT Infrastructure & Telecom Service Provider in Bangladesh.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

Mvine

Mvine

Mvine's primary business is authoring and selling Cyber-Secure Platforms for Collaboration Portals and for Identity Management as well as delivering cloud support services.

ENAC

ENAC

ENAC is the national accreditation body for Spain. The directory of members provides details of organisations offering certification services for ISO 27001.

Data Destruction London

Data Destruction London

Data Destruction London offers fast, confidential and compliant expert data destruction services to businesses and organisations in London.

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum is a catalyst platform designed to create a more resilient and better cyberworld for all.

Vumetric Cybersecurity

Vumetric Cybersecurity

Vumetric is an ISO9001 certified company offering penetration testing, IT security audits and specialized cybersecurity services.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.

Chainguard

Chainguard

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.