The Growing Cyber Threat From Iran

There are some big names in the cyber-warfare world: the United States, obviously, as well as Israel, Russia, China, and a few others. In recent years, however, the Islamic Republic of Iran has been steadily developing its cyber offensive capabilities, and already poses a veritable threat.

Iran’s development of its cyber potential began quite recently. The Islamic Republic started on this course following the wave of protests that erupted after the 2009 election.

Heavy investment into social media platforms, cyber-welfare programmes, and surveillance operations brought about a tectonic change in how Iran does technology. Tehran poured more than $1 billion into developing cyber infrastructure, recruitment (reportedly more than 100,000 personnel were taken on), and procurement of surveillance technology, mainly from China.

Then, in 2012, the Supreme Council on Cyberspace was established under orders from Iran’s supreme leader, Ayatollah Ali Khamenei.

Under the Council’s charge, Iran’s cyber policy solidified as offensive and proactive. Unable to win a full-out war against its adversaries, and knowing it, Iran developed the fourth largest cyber army in the world. “We have armed ourselves with new tools, because a cyber war is more dangerous than a physical war,” said Abdollah Araqi, deputy commander of ground forces in the Islamic Revolutionary Guard Corps (IRGC), according to the Iranian Students’ News Agency.

Israel’s Institute for National Security Studies (INSS) said that, “IRGC clearly makes the country one of the best and most advanced nation when it comes to cyberwarfare. In a case of escalation between Iran and the West, Iran will likely aim to launch a cyberattack against critical infrastructures in the United States and its allies, including energy infrastructure, financial institutions, transportation systems, and other.”

Two demonstrations of Tehran’s offensive cyber capabilities clearly affirm Iran’s position as a cyber force to be reckoned with. The computer systems of major American financial institutions were attacked in 2013 at an unprecedented level. US intelligence officials clearly stated that they found a link between the attacks and the Islamic Republic, as well as the “Shamoon” virus that attacked the computers of Saudi Arabia’s Aramco oil corporation.

Iran is quickly adapting to the modern world, utilising its tools to both control dissent within the country, and to project its force outside of it. The world would be foolish to not take notice.

I-HLS

« ‘Eye In The Sky’: The Reality Of Drone Warfare Revealed
Seven Profiles Of Highly Risky Insiders »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

Cybersecurity Advisors Network (CyAN)

Cybersecurity Advisors Network (CyAN)

CyAN provides a not-for-profit platform that helps private and public organisations as well as governments to identify trusted advisors in the area of Cyber Security and Cyber Crime.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

IOTA Foundation

IOTA Foundation

The IOTA Foundation is a non-profit R&D organisation focused on developing the next generation of protocols for the connected world.

NT Cyfence

NT Cyfence

CAT Cyfence is the IT Security services business unit of CAT Telecoms.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

Accelerator Frankfurt

Accelerator Frankfurt

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups.

Startup Capital Ventures

Startup Capital Ventures

Startup Capital Ventures is an early stage venture capital firm with a focus on FinTech, Cloud/SaaS, Security, Healthcare IT, and IoT.

Cisco Networking Academy

Cisco Networking Academy

Cisco Networking Academy is the world's largest classroom, bringing technology education, 21st-century skills, and improved jobs prospects since 1997.

Hayes Connor Solicitors

Hayes Connor Solicitors

Hayes Connor Solicitors is a specialist data breach and cybercrime law firm. We act for clients on individual data breaches and also where a group has been compromised as part of a targeted attack.

Casepoint

Casepoint

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs.

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.