Iran and Saudi Marching To Cyber War!

iranian-saudi-cyber-conflict-5-alt.png

Iran and Saudi Arabia, regional rivals in the Middle East, may be engaged in cyber warfare, according to a new report by threat intelligence firm Recorded Future. http://http://ow.ly/SsGv9

 

As the two powers vie for influence over the civil wars in Yemen and Syria and regional dominance, Tehran and Riyadh have begun using cyber attacks to release critical intelligence.

 WikiLeaks released on June 19 over half a million cables from the Saudi Foreign Ministry, including several "Top Secret" reports from the country's General Intelligence Services after a hack by a group calling itself the Yemeni Cyber Army. Recently, the Washington Post  reported that the theft of the Saudi Cables bore indications of Iranian hackers. 
"These events fit a pattern that looks and smells like Iranian-proxy actors," said Jen Weedon, manager of threat intelligence at FireEye, a firm specializing in cyber-security. The incident "definitely resembles past activity we've seen by Iranian groups."

Some analysis’s have suggested that the civil war in Yemen is effectively a proxy-war between the two regional powers, with the predominately-Shiite Iran backing the Houthi rebels while the Sunni Saudi Arabia supports the current government.

In 2014, Iranian hackers began a cyber operation against 16 countries, including the United States, targeting government organizations for information, according to FoxNews.com. Iran has increased cyber-attacks since the US and Israel halted the Iranian nuclear program with a computer virus in 2010.
"There has been a long running rivalry between Iran and Saudi Arabia, the Saudis see us as an ally, the Iranians see us as an adversary, that's always placed limitations on what they could do to one another," said Christopher Griffin, executive director of the Foreign Policy Initiative.

But in recent years, increasing sectarian tension along with civil wars in the region has allowed for greater antagonism between the countries.
"It's been this low-key cyber volleying back and forth at each other. It now looks like someone got tired of this and said 'look I'm going to yank up this game' to a different level," said Ahlberg to FoxNews.com. "When we look at this and take apart this Yemen Cyber Army and really try to understand who they are. They look a lot like other Iranian actors."

Ein News:  http://bit.ly/1Kq7Zxd

 

« North Korean Leader Has His Own Cellular Network
Spy Agencies Go Recruiting on LinkedIn »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

Asoftnet

Asoftnet

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

Venrock

Venrock

Venrock helps entrepreneurs build some of the world's most disruptive, successful companies. We invest in technology: Security, Cloud Services, Big Data, Healthcare IT, AdTech.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

MalwareFox

MalwareFox

MalwareFox is an advanced, yet simple-to-use anti-malware solution for Windows computers. We provide aggressive detection capabilities and an effective malware removal tool to keep your systems safe.

BreachQuest

BreachQuest

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.

PayPal Ventures

PayPal Ventures

PayPal Ventures invests in companies at the forefront of innovation in fintech, payments, commerce enablement, artificial intelligence, blockchain and cryptocurrency, regulatory and cyber technology.

Token

Token

Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication.