iTnews

US carried out secret cyber strike on Iran

By Idrees Ali and Phil Stewart, Reuters on Oct 17, 2019 3:36AM
US carried out secret cyber strike on Iran

In wake of Saudi oil attack, say officials.

The United States carried out a secret cyber operation against Iran in the wake of the September 14 attacks on Saudi Arabia’s oil facilities, which Washington and Riyadh blame on Tehran, two US officials have told Reuters.

The officials, who spoke on condition of anonymity, said the operation took place in late September and took aim at Tehran’s ability to spread “propaganda.”

One of the officials said the strike affected physical hardware, but did not provide further details.

The attack highlights how President Donald Trump’s administration has been trying to counter what it sees as Iranian aggression without spiraling into a broader conflict.

Asked about Reuters reporting on Wednesday, Iran’s Minister of Communications and Information Technology Mohammad Javad Azari-Jahromi said: “They must have dreamt it,” Fars news agency reported.

The US strike appears more limited than other such operations against Iran this year after the downing of an American drone in June and an alleged attack by Iran’s Revolutionary Guards on oil tankers in the Gulf in May.

The United States, Saudi Arabia, Britain, France and Germany have publicly blamed the September 14 attack on Iran, which denied involvement in the strike. The Iran-aligned Houthi militant group in Yemen claimed responsibility.

Publicly, the Pentagon has responded by sending thousands of additional troops and equipment to bolster Saudi defenses - the latest US deployment to the region this year.

The Pentagon declined to comment about the cyber strike.

“As a matter of policy and for operational security, we do not discuss cyberspace operations, intelligence, or planning,” said Pentagon spokeswoman Elissa Smith.

Gulf tensions rise sharply

The impact of the attack, if any, could take months to determine, but cyber strikes are seen as a less-provocative option below the threshold of war.

“You can do damage without killing people or blowing things up; it adds an option to the toolkit that we didn’t have before and our willingness to use it is important,” said James Lewis, a cyber expert with the Washington-based Center for Strategic and International Studies.

Lewis added that it may not be possible to deter Iranian behavior with even conventional military strikes.

Tensions in the Gulf have escalated sharply since May 2018, when Trump withdrew from the 2015 Joint Comprehensive Plan of Action with Tehran that put limits on its nuclear program in exchange for the easing of sanctions.

It was unclear whether there have been other US cyber attacks since the one in late September.

Iran has used such tactics against the United States. This month, a hacking group that appears linked to the Iranian government tried to infiltrate email accounts related Trump’s re-election campaign.

Over 30 days in August and September, the group, which Microsoft dubbed “Phosphorous,” made more than 2700 attempts to identify consumer accounts, then attacked 241 of them.o

Tehran is also thought to be a major player in spreading disinformation.

Last year a Reuters investigation found more than 70 websites that push Iranian propaganda to 15 countries, in an operation that cybersecurity experts, social media firms and journalists are only starting to uncover.

Tensions with Iran have been high since the September 14 attack. Tehran has said an Iranian tanker was hit by rockets in the Red Sea last week and warned that there would be consequences.

On Monday, President Hassan Rouhani reiterated his country’s policy toward the Trump administration, ruling out bilateral talks unless Washington returns to the landmark nuclear deal and lifts crippling US economic sanctions.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright Reuters
© 2019 Thomson Reuters. Click for Restrictions.
Tags:
cyber iran security strike

Partner Content

Beat the DDoS blackmails in 2021
Partner Content Beat the DDoS blackmails in 2021
Why companies fail at picking cloud modernisation partners
Partner Content Why companies fail at picking cloud modernisation partners
Shut the door on ransomware
Partner Content Shut the door on ransomware
MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics

Sponsored Whitepapers

The risky business of open source
The risky business of open source
Ensure your e-signatures are legally binding
Ensure your e-signatures are legally binding
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation
How to choose a WAF that's right for you
How to choose a WAF that's right for you
The global telco 5G cloud gaming opportunity
The global telco 5G cloud gaming opportunity

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • Beat the DDoS blackmailers in 2021
By Idrees Ali and Phil Stewart, Reuters
Oct 17 2019
3:36AM
0 Comments

Related Articles

  • Iran says one of two cyber attack targets was country's ports
  • UNSW restarts search for new CISO
  • EU drugs regulator says some data from cyber attack leaked online
  • ANU uses new security capabilities to help other Unis fend off attacks
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Telstra blasts plan to 'set aside' mobile spectrum for Optus and TPG, but not it

Telstra blasts plan to 'set aside' mobile spectrum for Optus and TPG, but not it

Google unravels state-of-art Android and Windows exploit chains

Google unravels state-of-art Android and Windows exploit chains

Tyro halts trading following week-long outage

Tyro halts trading following week-long outage

Defence switches on initial SAP ERP system capability

Defence switches on initial SAP ERP system capability

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.