Iranian Spy Ship Hacked

The United States has recently conducted a hack on the computer systems of an Iranian military ship that had been collecting intelligence on cargo vessels in the Red Sea and the Gulf of Aden. Naval analysts believe that the ship has served as a staging point and command post for the Islamic Revolutionary Guard Corps' operations in Yemen.

Iran is the primary foreign sponsor of Yemen's Houthi rebel group, supplying the group with them with ballistic missiles, air defence systems and suicide drones.

The US Navy and US Coast Guard have repeatedly intercepted shipments of advanced Iranian armaments bound for Yemen. The cyber attack was part of the US response to the drone attack by Iranian-backed militias in Iraq that killed three US service members in Jordan and wounded dozens of others recently.

The operation was intended to inhibit the Iranian ship’s ability to share intelligence with Houthi rebels in Yemen who have been firing missiles and drones at cargo ships in the Red Sea, the officials said. US officials say Iran uses the ship to provide targeting information to the Houthis so their attacks on the ships can be more effective. Over 10% of global shipping passes through the Red Sea every day

US analysts had suspected for weeks that the ship, the MV Behshad, was operating near the African port of Djibouti, which lies across a strait from Yemen, to spy on nearby ships and pass that information to Iran-backed Houthi rebels. 

The Houthis, who control northern Yemen, have been firing missiles and drones at vessels in the Red Sea and Gulf of Aden. Iranian officials have denied the allegations. Houthi leaders  have vowed to continue the attacks until Israel halts its military operations in the Gaza Strip. 

The US has likely used cyber warfare capabilities to target Iran before. The infamous Stuxnet worm was perhaps the first major nation-state cyber attack, and it reportedly set back operations in Iran's uranium enrichment program by targeting industrial control systems. The attack has never been officially acknowledged.

NBC News     |     Reuters     |     New York Times     |     Just Security     |     Hellenic Shipping News     |    

The Maritime Executive     |     FDD     |     Yahoo    |

Image: Ismail Saidi

You Might Also Read:  

US Navy Will Use Data Analytics For Maritime Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Criminals Use CAPTCHA To Spread Malware
Rhysida Ransomware Cracked & Decrypted »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Purple Team

Purple Team

Purple Team is an expert cybersecurity and managed security service provider focused on arming your IT infrastructure with both red team and blue team services.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

Edge Security

Edge Security

Edge Security is an information security research and consulting firm of expert hackers.

Chorus

Chorus

Chorus are a leading Managed Security Service Provider (MSSP), and member of the Microsoft Intelligent Security Association (MISA), with three Microsoft Advanced Specialisations in security.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.