Iranian Petrol Stations Suffer A Massive Attack

A significant cyber attack has hit Iran’s online petrol distribution system, affecting fuel stations across the country and causing long lines of frustrated motorists.

Iranian news sources have said that a foreign country was probably behind the attack and n Iranian state television account online has shared images of long queues of cars waiting to fill up in Tehran.

The Iranian ISNA news agency, which called the incident a cyber attack, said it saw those trying to buy fuel with a government-issued card through the machines instead receive a message reading 'cyber attack 64411'. 

Most Iranians rely on those subsidies to fuel their vehicles, particularly amid the country’s economic problems.
The widespread attack came shortly before the second anniversary of the November 2019 nationwide protests against an overnight petrol price rise. At the time, petrol prices as much as tripled, sparking the protests that Amnesty International has said led to the deaths of more than 300 people.

Internet access was also shut down across the country for almost a week during the protests. Some areas where protests were still continuing experienced weeks of internet disruptions.

With the details still unclear there is speculation about whether the purported attack came from the US, Israel or from local Iranian anti-regime groups. According to reports, messages were posted in some systems that were hacked, addressing Iran’s Supreme Leader Ayatollah Ali Khamenei directly and demanding to know, “Where is the gas?” The attack comes some two years after nationwide protests over gas shortages in fall 2019... The disruption at the refueling system of gas stations... in the past few hours, was caused by a cyber attack,” the state Iranian national  broadcaster said. “Technical experts are fixing the problem and soon the refueling process... will return to normal.”

The Oil Ministry said only sales with smart cards used for cheaper, rationed gasoline were disrupted and that clients could still buy fuel at higher rates.

Possible Retaliation

Iran recently carried out a complex and coordinated strike on US forces in Syria using up to five armed drones to attack a strategic point near the Jordan-Iraq border. The attack was the latest in a series of drone strikes on US forces. In a press briefing recently, the US Envoy on Iran mentioned possible US action to deter Iranian aggression in the region. although he declined to elaborate what those actions might be.

The US is considered to be the world’s most potent cyber power but it has often been hesitant to use its offensive cyber capabilities against groups other than ISIS, for fear of cyber retaliation.

Under the Trump administration, the US did hack major Iranian intelligence maritime operations to deter Iran from attacking American allies at sea. The Biden administration is not thought to have  done so to date, although Israel has reportedly hacked Iran’s Shahid Rajaee Port on May 9, 2020, as a counter strike for an attempted Iranian cyber strike on Israel’s water supply system

Iran has also accused the Mossad, the US and European intelligence agencies of using the STUXNET virus to hack its Natanz nuclear facility in 2009-2010.

Former an Israeli Security Agency official said that there was a good chance that a nation-state actor could carry out such a broad and successful attack, however, recent events have  shown that amateur hackers can cause major disruption to the US and European powers with sophisticated ransomware and other means. 

In August, Check Point Software Technologies issued a report stating that an Iranian dissident group called Indra, not Israel, executed the large scale attack on the Islamic Republic’s train system in July. Check Point said Indra’s hack was “an example for governments around the world of how a single group can create disruption on critical infrastructure.” 

If non-state groups are traditionally thought of as lacking the capability to do more than hack websites and data, this was an example of such a non-state group causing profound real-world damage.

Indra’s tools destroyed data without direct means to recover it by using a “wiper,” or malware designed to wipe the entire data system of critical infrastructure, making the recovery process complicated, locking users out of machines, changing passwords, and replacing wallpapers to custom messages crafted by the attackers. The hack included posting of fake messages about train delays and cancellations on display boards across Iran.

JPost:     Heimdal Security:       Al Jazeera:       KashmirWalla:      Bloomberg:      Oodaloop

You Might Also Read:

Israeli Hospital Attacked With Ransomware:

 

« A Short Guide To Ransomware
Police Arrest 150 Suspects In Dark Web Operation »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

SEC Consult

SEC Consult

SEC Consult is a leading European consultancy for application security services and information security.

Corvus Insurance

Corvus Insurance

Corvus' mission is to create a safer, more productive world through technology-enabled commercial insurance.

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

ThriveDX

ThriveDX

ThriveDX, the world’s premier EdTech provider (formerly HackerU), champions digital transformation training as a means of empowering individuals to thrive in the age of digital disruption.

World Informatix Cyber Security (WICS)

World Informatix Cyber Security (WICS)

World Informatix Cyber Security provides a range of cyber security services to protect valuable information assets to global business and governments.

CyberHunter Solutions

CyberHunter Solutions

CyberHunter is a leading website security company that provides penetration testing, Network Vulnerability Assessments, cyber security consulting services to prevent cyber attacks.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

Smoothstack

Smoothstack

Smoothstack is a technology talent incubator whose immersive training program kick starts IT careers and delivers a fresh source of IT talent.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

Apex Systems

Apex Systems

Apex Systems is a world-class technology services business that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business