Iranian Hackers Attack The US, Not Very Badly

United States security agencies are seeing an increase in cyber security threats, as Iranian officials vow revenge against the US, for killing a top general.

The Department of Homeland Security’s cybersecurity team released an advisory  on Monday 6th warning public and private sector organisations of increased cyberattacks after the United States using a drone strike in Baghdad killed Iranian General Qasem Soleimani, a very influential leader in the Middle East. 

The guidance from DHS’ Cybersecurity and Infrastructure Security Agency, which is charged with protecting critical infrastructure from cyberattacks, recommended that organisations review their emergency preparedness plans and stay up to date on current threat intelligence. 

The advisory comes as CISA and other government entities prepare for retaliatory action from Iran that has attacked US bases in Iraq and other attacks that experts say has already included cyberattacks on the US.

The city of Las Vegas experienced a cyber compromise at 4:30 a.m local time on Tuesday 7th. The city’s Information Technologies Department is assessing the extent of the compromise. When aware of the attempt, the city immediately took steps to protect its data systems. People interfacing with the city may experience brief interruptions of service, but so far those interruptions have been minimal. The city will have a clearer picture of the extent of the compromise over the next 24 hours.

The breach in Las Vegas comes amid tensions with Iran and a warning from Homeland Security of "potentially disruptive and destructive" Iranian cyber operations.

Texas Governor Greg Abbott warned citizens to be “particularly vigilant” regarding potential cyberterrorism from Iran, suggesting that heightened tensions with the country have caused an increase in attempted attacks on state agencies.
“This is something that everybody in the state of Texas needs to be concerned, prepared and be able to address,” Abbott said Tuesday 7th January during a meeting of the Domestic Terrorism Task Force. This is the force he formed after last year’s anti-Hispanic deadly mass shooting in El Paso. “I think it’s very important that everybody be particularly vigilant about what may happen out of Iran.” he was quoted in the Texas Tribune.

On the same day as he spoke a group of self-described Iranian hackers defaced a Texas government department website.
A website defacement is typically a low-skilled hack in order to spread a particular message and normally doesn't pose any other tangible security risks. However, these defacements are likely to receive more attention at this moment due to heightening tensions between the US and Iran and the fact that they are visible on public websites. 

Obviously this come after last week’s US attack when President Trump ordered the assassination of Iranian military commander Qassem Soleimani, which Iran has vowed to respond to. "Hacked by Iranian Hacker," the defacement on the site of the Texas Department of Agriculture reads, along with an image of Soleimani. The defacement claims "Shield Iran" carried it out. Other recent defacements, including those against the Sierra Leone Commercial Bank. 

Even though the defacement itself attributed responsibility to a particular group, it is difficult from the outset to know exactly who carried it out.

The defacement shouted-out several different nicknames. A Google search of one of those led to another, previous defacement, which said "Long live Ashiyane." Ashiyane was an established Iranian hacking forum. A Google search for terms included in the defacement led to several other websites with the same or similar image. One for the Parikrma Humanity Foundation, a non-profit in Bangalore, contained largely the same defacement but also included a rap music track. The site for the South Alabama Veterans Council was also hit.   

Another US government website was also hit. This was the Federal Depository Library Program, included an image of President Trump being punched in the face. "Hacked by Iran Cyber Security Group Hackers," the defacement read.
Although Iran does not have the same calibre of cyber capability as Russia, China, or the US, its hackers can still do damage and be particularly aggressive.

In 2012 hackers working for Iran knocked out 30,000 computers belonging to Saudi state oil company Saudi Aramco. 

Vice      Texas Tribune:       Fifth Domain:        NBC News 3 LV:

You might Also Read: 

Iran's Cyberwar Response To Its General's Killing:
 

 

« 2020: Top Issues In Cyber Security
British National Cyber Security Chief Steps Down »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

VerifyMe

VerifyMe

VerifyMe is a global technology solutions company delivering brand protection offerings to mitigate counterfeiting, product diversion, and illicit trade.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Nemko

Nemko

Nemko offers testing, inspection, and certification services worldwide, mainly concerning products and systems, but also for machinery, installations, and personnel.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

Brace168

Brace168

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned to provide a vast experience in managed security services to meet the needs of all business types.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

CornerStone

CornerStone

CornerStone is an award winning, independent risk, cyber and security consulting firm providing a range of Risk Management, Security Design and Implementation Management Services.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

Ronet Cyber Security

Ronet Cyber Security

Ronet Cyber Security offers crypto forensics services for regulators, law enforcement, companies and individuals to ensure that your transactions are safe and secure.

Vana Solutions

Vana Solutions

Vana Solutions is an Information Technology Services company. We help commercial & federal organizations select, adapt, and integrate the right technology solution so you can move faster.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.