New US Cyber Attacks On Iran

The United States could launch a new cyber-attack on Iran in response to the recent drone attack on two major oil facilities in Saudi Arabia. According to NBC News, the Trump administration is considering a cyber attack or a physical strike on Iranian oil facilities or assets of the Revolutionary Guard Corps, a branch of the country’s Armed Forces.

Following news of the attack, President Trump tweeted that the US is “locked and loaded,” but NBC says a covert cyber-attack or increased sanctions are more likely as Trump and the Department of Defense are deeply reluctant when it comes to a military response. Others believe that President Trump might not be satisfied with a cyber-attack. 

“Even if a potential measured response was identified, perhaps a cyber attack on Iranian facilities, for which no one claims responsibility, it would be harder to effect when Mr Trump sees discretion as an absurdity and demands personal glory at every turn,” British Guardian newspaper.

This would not be the first time the US has launched a cyber-attack on Iran.  In June, reports emerged that the United States has already conducted a hacker attack on Iran’s missile control systems and a spy network in response to the shooting down of an American surveillance drone.

The cyber-attack included a hack on the database used by the Revolutionary Guard to plot attacks on oil tankers in the Gulf, is said to have caused significant damage, but so far the Iranians have denied the claims.  

The US and Israel is also said to be responsible for the 2010 Stuxnet attack on Iranian nuclear facilities. It was revealed recently that an Iranian mole recruited by Dutch intelligence helped the United States and Israel plant the Stuxnet malware.   

The US has also reportedly launched cyber-attacks against North Korea and Russia, and the government of Venezuela has blamed their power outages that occurred earlier this year on a cyber sabotage operation conducted by the United States, although many experts are sceptical about those claims.

Although Iran has denied involvement in the recent attacks, but now senior US officials told the media that Tehran launched both drones and cruise missiles against the Saudi oil facilities. The attack disrupted global oil supplies which led to a spike in oil prices.

Security Week:         NBC News:

You Might Also Read:

Cyber War In The Middle East Is Escalating:

 

 

« Confidential Data On 24.3m Patients Found Exposed Online
Russian Government Hacking Groups Often Work Alone »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

GlobalSign

GlobalSign

GlobalSign is an identity services company providing cloud-based, PKI solutions for enterprises needing to conduct safe commerce, communications, content delivery and community interactions.

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

F-Secure

F-Secure

F-Secure defends enterprises and consumers against everything from opportunistic ransomware infections to advanced cyber attacks.

Portnox

Portnox

In 2007, Portnox set out to create one of the world’s easiest to use, most loved, value-driven network security solutions — and our customers will tell you we’ve succeeded.

One Identity

One Identity

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

Kalima Systems

Kalima Systems

Kalima’s mission is to securely collect, transport, store and share Industrial IoT (IIoT) trusted data in real time with devices, services and mobile workers.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

Cycurion

Cycurion

Cycurion is a global leading provider of Network Communications and Information Technology Security Solutions.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

CampusGuard

CampusGuard

CampusGuard focuses on the cybersecurity and compliance needs of campus-based organizations including higher education, healthcare, and state and local government.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.