US Cyber Attack Disabled Iran’s Ability To Target Shipping

The United States attacked and disabled a critical Iranian database used to target oil tankers in the Persian Gulf, according to the New York Times, citing several US security officials. The cyber strike on the Islamic Revolutionary Guards’ intelligence group diminished Iran’s ability to conduct covert attacks, the report quoted a senior official as saying. 

The attack destroyed a critical database, and at least temporarily prevented Iran from covertly targeting oil tankers.

The US launched the strike in July after Iran shot down an American drone. US President Donald Trump had called off a military strike 10 minutes it was to be carried out after being told some 150 people could die.

“I didn’t think it was proportionate,” he said in an interview at the time with NBC News. Instead, the US carried out a cyber-attack, part of a long-running cyber war between the US and Iran. The Stuxnet virus, discovered in 2010, is believed to have been engineered by Israel and the US to damage nuclear facilities in Iran. Tehran is believed to have stepped up its own cyber capabilities in the face of US efforts to isolate the Islamic Republic.

The report said that though the effects of the most recent operation were designed to be temporary, they have lasted longer than expected and Iran is still trying to repair critical communications systems and has not recovered the data lost in the attack, officials said. However, some US officials were critical of the cyber-attack, saying that in carrying it out, the US had lost access to the Revolutionary Guard’s network and exposed some of its capabilities.

The New York Times also said earlier reports that the hack targeted Iran’s ability to launch missiles was incorrect. The report said Iran has yet to respond to the cyber-attack although Iran has denied it was the victim of a cyber-attack in the wake of the drone downing.

Tensions between the US and Iran soared after Trump unilaterally withdrew America from Iran’s 2015 nuclear deal with world powers over a year ago.

This has meant that Iran has recently lost billions of dollars in trade previously allowed by the deal as the US re-imposed and created sanctions largely blocking Tehran from selling crude oil abroad, a crucial source of hard currency for the Islamic Republic.

In July Gibraltar seized an Iranian tanker, Grace 1, believed to be on its way to Syria with a sanctions breaking shipment. Iran has since changed the boat’s name to the Adrian Darya. and the vessel was released.Meanwhile, Iran continues to hold the British-flagged oil tanker Stena Impero, which it seized in a commando-style raid July 19 after the taking of the Adrian Darya. Analysts suggested the release of the Adrian Darya would see the Stena Impero released, but that has yet to happen.

TimesOf Israel:        AntiWar

You Might Also Read:

US Cyber Strike On Iran Is A Step Change:

 

 

« One in Four Workers Would Steal Company Information
A Major Breach In Biometrics Security Database »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

APT Search

APT Search

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors.

Rizikon Assurance

Rizikon Assurance

Rizikon Assurance is an Online System that improves Third-Party Assurance and Risk Management, through efficiency, automation and better visibility.

Liongard

Liongard

Liongard automates the management and protection of modern IT environments at scale for IT MSPs - Managed Service Providers and Enterprise IT Operations.

SOFTwarfare

SOFTwarfare

SOFTwarfare deliver high-quality, reliable and secure enterprise application integrations through RESTful APIs for Cyber, Ops & Dev.

Aurora Systems Consulting

Aurora Systems Consulting

Aurora is a Cybersecurity solutions provider with a portfolio consisting of security consulting, products and services that proactively prevent, secure and manage advanced threats and malware.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

WhizHack Technologies

WhizHack Technologies

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow.

Senteon

Senteon

Senteon is a turnkey cybersecurity platform designed to make securing confidential data affordable, understandable, and streamlined for small-to-mid sized businesses and MSPs.

Traced

Traced

TRACED is changing the detection paradigm. Empowering defenders to go on the offense to engage cyber attackers before they compromise your organization.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.