Iran Likely To Retaliate With Cyberattacks

Iran is likely to respond with cyberattacks against Western businesses in response to the Trump administration's withdrawal from the nuclear deal, cybersecurity experts say. Recent research suggests attacks could come "within months, if not faster," according to security firm Recorded Future.
 
The research paints a detailed picture of how Iran uses contractors and universities to staff its offensive cyber-security operations, or hacking efforts, against foreign targets.
 
A former insider with knowledge of Iran's hacking operations said the attacks are likely to be launched by contractors and thus pose a greater risk of spinning out of control.
 
Recently, President Donald Trump announced the US would withdraw from the Iran nuclear deal, a pact of Western nations that pledged to lift economic sanctions against Iran in exchange for limiting its nuclear program. The UN's nuclear verification agency said Iran had complied with the agreement. Although there has been no evidence or intelligence to suggest a cyber-attack is in the works, researchers say they predict, based on Iran's past cyber activities, that retaliatory cyber-attacks are likely.
 
"We assess that within months, if not sooner, American companies in the financial, critical infrastructure, oil, and energy sectors will likely face aggressive and destructive cyber-attacks by Iranian state-sponsored actors," said Priscilla Moriuchi, a former NSA analyst, now at Recorded Future.
 
"The Islamic Republic may utilise contractors that are less politically and ideologically reliable, and trusted, and as a result, could be more difficult to control," she said.
 
Countries allied with the US and Europe, like Saudi Arabia and Israel, are also at risk, the report said. Levi Gundert, who co-authored the research, told ZDNet the attacks will likely aim for "maximum impact," such as a malware attack rather than a denial-of-service attack. Much of the research is centered on Iran's long-known history of targeting Western businesses and governments with cyber-attacksin response to sanctions, largely because of how quickly the hackers could turn around an attack.
 
Tehran began strengthening its cyber capabilities following the Green Revolution, a period of intense protests in Iran against the incumbent government during the Arab Spring in 2009.  The government responded with a heavy crackdown, with an increased focus on cyber operations.
 
But some of the best hackers available were primarily young and financially driven, said the report. This led to mistrust and fears that the hackers could be bought by foreign intelligence agencies. According to the former insider, that led to a tiered trust system that centered Tehran's hacking efforts around a central team of trusted and ideologically aligned middle management that dishes out assignments to contractors, often pitting teams against each other, who get paid only when the work is completed. 
 
The government also uses compartmentalisation, giving one team an infiltration mission and using another to launch a remote code execution attack.
 
It's estimated that at least 50 organisations are competing for government hacking work, the research said, including contractors and universities to conduct hacking operations.
 
One such institution, Imam Hossein University, was sanctioned by the US Treasury for its connections to the Islamic Revolutionary Guard Corps (IRGC), Iran's military intelligence unit. But because some of Iran's best operators "are not always the most devout or loyal to the regime," the researchers warn they "could be more difficult to control." That may lead to the IRGC choosing a less ideologically driven contractor, capable of delivering a destructive attack in a short period of time, instead of a trusted and less politically driven contractor.
 
"It is possible that this dynamic could limit the ability of the government to control the scope and scale of these destructive attacks once they are unleashed," the researchers said.  
 
Recorded Future isn't the only company warning of incoming Tehran-backed cyberattacks. Security firm FireEye warned that Iranian hackers were "probing Western critical infrastructure in multiple industries for future attack."
 
"These efforts did not entirely disappear with the agreement, but they did refocus on Iran's neighbors in the Middle East," said John Hultquist, FireEye's director of intelligence analysis, in an email to ZDNet.
 
"With the dissolution of the agreement, we anticipate that Iranian cyberattacks will once again threaten Western critical infrastructure," he said.
 
ZDNet
 
You Might Also Read:
 
Iran’s Cyber Capabilities:
 
The Resurgent Cyber Threat From Iran:
 
 
« Hacker Reveals What He’s Learned
Three Ways That Automation & Machine Learning Are Changing Data Centres »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Synovum

Synovum

Synovum was formed with the intention to provide high quality advice, consultancy, training and project management services to clients in all sectors of industry.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

Experian

Experian

Experian provide software solutions to help organizations prevent identity fraud and crime.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

Calian Group

Calian Group

Calian is a diverse Canadian company offering professional services in areas including Advanced Technologies, Health, Learning and IT & Cyber Solutions.

TunnelBear

TunnelBear

TunnelBear is a Virtual Private Network services provider offering secure encrypted access to the internet.

CloudAlly

CloudAlly

CloudAlly provides online cloud to cloud backup and recovery solutions, which backs up daily changes in your SaaS to unlimited Amazon S3 storage and makes it available for restore or export.

Venrock

Venrock

Venrock helps entrepreneurs build some of the world's most disruptive, successful companies. We invest in technology: Security, Cloud Services, Big Data, Healthcare IT, AdTech.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Emagined Security

Emagined Security

Emagined Security is a leading provider of professional services for Information Security and Compliance solutions.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

Grindstone Ventures

Grindstone Ventures

Grindstone Ventures is a post-seed fund that supports post-seed equity and quasi-equity investments in early-stage innovation-driven and/or technology companies.

Red Alpha Cybersecurity

Red Alpha Cybersecurity

At Red Alpha, we specialize in recruiting and rigorously training individuals passionate about cybersecurity.