Iranian Spy Ship Hacked

The United States has recently conducted a hack on the computer systems of an Iranian military ship that had been collecting intelligence on cargo vessels in the Red Sea and the Gulf of Aden. Naval analysts believe that the ship has served as a staging point and command post for the Islamic Revolutionary Guard Corps' operations in Yemen.

Iran is the primary foreign sponsor of Yemen's Houthi rebel group, supplying the group with them with ballistic missiles, air defence systems and suicide drones.

The US Navy and US Coast Guard have repeatedly intercepted shipments of advanced Iranian armaments bound for Yemen. The cyber attack was part of the US response to the drone attack by Iranian-backed militias in Iraq that killed three US service members in Jordan and wounded dozens of others recently.

The operation was intended to inhibit the Iranian ship’s ability to share intelligence with Houthi rebels in Yemen who have been firing missiles and drones at cargo ships in the Red Sea, the officials said. US officials say Iran uses the ship to provide targeting information to the Houthis so their attacks on the ships can be more effective. Over 10% of global shipping passes through the Red Sea every day

US analysts had suspected for weeks that the ship, the MV Behshad, was operating near the African port of Djibouti, which lies across a strait from Yemen, to spy on nearby ships and pass that information to Iran-backed Houthi rebels. 

The Houthis, who control northern Yemen, have been firing missiles and drones at vessels in the Red Sea and Gulf of Aden. Iranian officials have denied the allegations. Houthi leaders  have vowed to continue the attacks until Israel halts its military operations in the Gaza Strip. 

The US has likely used cyber warfare capabilities to target Iran before. The infamous Stuxnet worm was perhaps the first major nation-state cyber attack, and it reportedly set back operations in Iran's uranium enrichment program by targeting industrial control systems. The attack has never been officially acknowledged.

NBC News     |     Reuters     |     New York Times     |     Just Security     |     Hellenic Shipping News     |    

The Maritime Executive     |     FDD     |     Yahoo    |

Image: Ismail Saidi

You Might Also Read:  

US Navy Will Use Data Analytics For Maritime Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Criminals Use CAPTCHA To Spread Malware
Rhysida Ransomware Cracked & Decrypted »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

KrCERT/CC

KrCERT/CC

KrCERT/CC is the National Computer Emergency Response Team in Korea.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

Support Link Technologies (SLT)

Support Link Technologies (SLT)

Support Link Technologies are an IT Solutions Company committed to achieving customer satisfaction through excellent customer service.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.

Kaesim Cybersecurity

Kaesim Cybersecurity

Kaesim are a global team of cybersecurity experts protecting businesses since 2015. We stop bad people damaging your business, your data and your reputation.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.

Fortreum

Fortreum

Fortreum aim to simplify cybersecurity in the marketplace to accelerate your business outcomes.

CaseMatrix

CaseMatrix

Discover a new era of legal intelligence with CaseMatrix. We identify potential class action cases arising from cyber incidents and data breaches.

SecureClaw

SecureClaw

SecureClaw offers specialized cybersecurity consultation, various products, and a range of services to meet your company's business domain needs.

Klarytee

Klarytee

Protect your data wherever it goes. Klarytee is a SaaS platform that builds security into sensitive content to enable granular control in AI, public cloud and SaaS.

Deloitte Denmark

Deloitte Denmark

Swift incident management, worldwide support, and advanced defense strategies ensure comprehensive recovery and enterprise security with our IR service.

Aurascape AI

Aurascape AI

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.

Whiteswan Identity Security

Whiteswan Identity Security

At Whiteswan, we are committed to protecting the digital landscapes of modern enterprises with adaptive, identity-first security solutions that ensure trust, compliance, and resilience.