US Cyber Attack Disabled Iran’s Ability To Target Shipping

The United States attacked and disabled a critical Iranian database used to target oil tankers in the Persian Gulf, according to the New York Times, citing several US security officials. The cyber strike on the Islamic Revolutionary Guards’ intelligence group diminished Iran’s ability to conduct covert attacks, the report quoted a senior official as saying. 

The attack destroyed a critical database, and at least temporarily prevented Iran from covertly targeting oil tankers.

The US launched the strike in July after Iran shot down an American drone. US President Donald Trump had called off a military strike 10 minutes it was to be carried out after being told some 150 people could die.

“I didn’t think it was proportionate,” he said in an interview at the time with NBC News. Instead, the US carried out a cyber-attack, part of a long-running cyber war between the US and Iran. The Stuxnet virus, discovered in 2010, is believed to have been engineered by Israel and the US to damage nuclear facilities in Iran. Tehran is believed to have stepped up its own cyber capabilities in the face of US efforts to isolate the Islamic Republic.

The report said that though the effects of the most recent operation were designed to be temporary, they have lasted longer than expected and Iran is still trying to repair critical communications systems and has not recovered the data lost in the attack, officials said. However, some US officials were critical of the cyber-attack, saying that in carrying it out, the US had lost access to the Revolutionary Guard’s network and exposed some of its capabilities.

The New York Times also said earlier reports that the hack targeted Iran’s ability to launch missiles was incorrect. The report said Iran has yet to respond to the cyber-attack although Iran has denied it was the victim of a cyber-attack in the wake of the drone downing.

Tensions between the US and Iran soared after Trump unilaterally withdrew America from Iran’s 2015 nuclear deal with world powers over a year ago.

This has meant that Iran has recently lost billions of dollars in trade previously allowed by the deal as the US re-imposed and created sanctions largely blocking Tehran from selling crude oil abroad, a crucial source of hard currency for the Islamic Republic.

In July Gibraltar seized an Iranian tanker, Grace 1, believed to be on its way to Syria with a sanctions breaking shipment. Iran has since changed the boat’s name to the Adrian Darya. and the vessel was released.Meanwhile, Iran continues to hold the British-flagged oil tanker Stena Impero, which it seized in a commando-style raid July 19 after the taking of the Adrian Darya. Analysts suggested the release of the Adrian Darya would see the Stena Impero released, but that has yet to happen.

TimesOf Israel:        AntiWar

You Might Also Read:

US Cyber Strike On Iran Is A Step Change:

 

 

« One in Four Workers Would Steal Company Information
A Major Breach In Biometrics Security Database »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Software Testing News

Software Testing News

Software Testing News provides the latest news in the industry; from the most up-to-date reports in web security to the latest testing tool that can help you perform better.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

Bit4id

Bit4id

Bit4id provides software and systems for security and identification based on PKI technology.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

ThreatQuotient

ThreatQuotient

ThreatQuotient delivers an open and extensible threat intelligence platform to provide defenders the context, customization and collaboration needed for increased security effectiveness.

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

Euro-Recycling

Euro-Recycling

Euro-Recycling is a leading UK provider of Secure On-Site Data Media Destruction Services.

Ergo

Ergo

Ergo is a world-class IT Partner of choice, leveraging the latest technology available in cloud, mobility, big data, analytics, and social media.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

Intuitive Research & Technology Corp

Intuitive Research & Technology Corp

Intuitive Research and Technology is an aerospace engineering and analysis firm providing services to the Department of Defense, government agencies, and commercial companies.

HashiCorp

HashiCorp

At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.