The Growing Cyber Threat From Iran

There are some big names in the cyber-warfare world: the United States, obviously, as well as Israel, Russia, China, and a few others. In recent years, however, the Islamic Republic of Iran has been steadily developing its cyber offensive capabilities, and already poses a veritable threat.

Iran’s development of its cyber potential began quite recently. The Islamic Republic started on this course following the wave of protests that erupted after the 2009 election.

Heavy investment into social media platforms, cyber-welfare programmes, and surveillance operations brought about a tectonic change in how Iran does technology. Tehran poured more than $1 billion into developing cyber infrastructure, recruitment (reportedly more than 100,000 personnel were taken on), and procurement of surveillance technology, mainly from China.

Then, in 2012, the Supreme Council on Cyberspace was established under orders from Iran’s supreme leader, Ayatollah Ali Khamenei.

Under the Council’s charge, Iran’s cyber policy solidified as offensive and proactive. Unable to win a full-out war against its adversaries, and knowing it, Iran developed the fourth largest cyber army in the world. “We have armed ourselves with new tools, because a cyber war is more dangerous than a physical war,” said Abdollah Araqi, deputy commander of ground forces in the Islamic Revolutionary Guard Corps (IRGC), according to the Iranian Students’ News Agency.

Israel’s Institute for National Security Studies (INSS) said that, “IRGC clearly makes the country one of the best and most advanced nation when it comes to cyberwarfare. In a case of escalation between Iran and the West, Iran will likely aim to launch a cyberattack against critical infrastructures in the United States and its allies, including energy infrastructure, financial institutions, transportation systems, and other.”

Two demonstrations of Tehran’s offensive cyber capabilities clearly affirm Iran’s position as a cyber force to be reckoned with. The computer systems of major American financial institutions were attacked in 2013 at an unprecedented level. US intelligence officials clearly stated that they found a link between the attacks and the Islamic Republic, as well as the “Shamoon” virus that attacked the computers of Saudi Arabia’s Aramco oil corporation.

Iran is quickly adapting to the modern world, utilising its tools to both control dissent within the country, and to project its force outside of it. The world would be foolish to not take notice.

I-HLS

« ‘Eye In The Sky’: The Reality Of Drone Warfare Revealed
Seven Profiles Of Highly Risky Insiders »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

Gurucul

Gurucul

Gurucul predictive security analytics protects against insider threats, account compromise and data exfiltration on-premises and in the cloud.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

miniOrange

miniOrange

miniOrange is a cloud and on-premise based identity and access management (IAM) solution provider.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Sigma IT

Sigma IT

SIGMA IT is one of the largest IT services organizations in EMEA region providing a full range of solutions and services including cybersecurity, data protection and business continuity.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

US Department of State - Bureau of Cyberspace & Digital Policy

US Department of State - Bureau of Cyberspace & Digital Policy

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Leaf IT

Leaf IT

Leaf IT are a pioneering cloud-first MSP, dedicated to helping businesses in the UK and Ireland. We focus on delivering tangible results for our clients through IT transformation.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

Verosint

Verosint

Verosint (formerly 443ID) provides real-time account fraud prevention that reveals fraudsters hiding in user accounts and proactively blocks them before their attacks can cause harm.