US Attackers Target Iran's Defense Networks

A US cyber-attack on Iranian missile systems in which the US claimed to have recently carried out  would have had to exploit a flaw in Iran's heavily-guarded military network. Citing US official sources, American media reported that the US Army Cyber Command had crippled the Iranian Revolutionary Guard’s air defense units after it had shot down a sophisticated drone on June 20.

Military computing security is usually “hardened” to defend against attack but highly-skilled computer scientists in cyber units of modern armies are always working to find a way in.

“The simplest way would be for a special forces member to plug in a USB carrying a virus to the right place,” Loic Guezo of the French Information Security Club told AFP. This is almost certainly how the well-known US-Israeli Stuxnet virus was introduced in 2010, into the computers of Iran’s nuclear complex, according to experts.

Iran at the time accused the US and Israel of using the virus to target its centrifuges used for uranium enrichment.
The Revolutionary Guards are believed to have since bolstered precautionary measures in a bid to isolate their military computer networks from the Internet. However, according to a military expert who requested anonymity, an “anti-aircraft defense system requires radars, control and command centers and ground-to-air missile sites to be inter-connected.”

Those components are connected by Intranet networks that “at one time or another” must be connected to the internet.
“In the past, there was no way to connect to a weapon system,” said Guezo. Today, however, he said most computer operating systems are commercial and vulnerable to attacks even if “everything is done to make them impenetrable.”
“Nothing is impenetrable,” said Guezo.

Modern cyber-crime units, especially American and Israeli, have massive resources at their disposal and recruit high-level experts. Cyber Command became a fully-fledged combat unit within the US army in May with a budget running into billions of dollars.

In Israel, the renowned electronic warfare Unit 8200 attracts the country’s best talent.When cyber attackers “have identified an entry point,” they “intrude the network with messages carrying hyper-aggressive malware which will at least partially cripple the air defense network,” said an anonymous military specialist.

In March 2017, researcher Remy Hemez of the French Institute for International Relations (IFRI) told of how the Israeli army had used a program called SUTER in 2007 to temporarily blind Syrian air defense radars. Operation Orchard, according to Hemez, showed how cyber weapons can successfully be used in battle. Israeli fighter jets had penetrated deep into Syrian air space to destroy a suspected nuclear facility after having disabled Syrian air defenses.

US claim of an attack on Iranian missile launching systems would have required months or even years of preparation, said Guezo. “You have to study the architecture of the equipment and then create attack plans,” Guezo said.

Timesof Israel

You Might Also Read: 

Stuxnet 2.0 - Iran Says Israel Has Launched New Cyber Attacks:

 

« Britain Wants More Women In Cyber Security
GDPR Is Now 1-Year Old »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

GOVCERT.lu

GOVCERT.lu

GOVCERT.lu is responsible for the treatment of all computer related incidents jeopardising the information systems of the government and defined critical infrastructure operators in Luxembourg.

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain accelerator is located in Washington D.C. which is one of the world's top cybersecurity ecosystems.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Digital Intelligence

Digital Intelligence

Digital Intelligence offer a full array of products, forensic and e-discovery consulting services and training.

CyberHub

CyberHub

CyberHub is an educational platform that offers professional courses and knowledge sharing through articles and videos to help students discover their potential in cybersecurity.

CNF Technologies

CNF Technologies

CNF Technologies is an award-winning cyber company providing technology-focused research and development to commercial, federal, and Department of Defense clients.

Rankiteo

Rankiteo

At Rankiteo, we are pioneers in cybersecurity risk management. Our mission is to empower organizations with the tools they need to assess, enhance, and safeguard their digital landscapes.