A new method to bypass G-mail's two step authentication is being implemented by Iranian hackers. Essentially it is a very active method of phishing in which the Iran hackers monitor a phone while triggering password verification. This puts everyone at risk and not just state actors or significant public figures.
The cyber breach of a US dam by Iran hackers marks the risk of US infrastructure. The US plans to adopt the tactic of "name and shame" to put pressure and fear individually on those who might think about targeting the US.
The hack into Sony Pictures by North Korea will most likely be studied by other nations seeking to engage in cyber deterrents and pressures. Cyber security experts believe that the hack will set a precedent that Iran is probably studying, observing the US response.
The US pardoned a suspected Iranian hacker and a few other Iran nationals for US citizens held prisoner by Iran. This exchange is revealing of the amount of leverage these two nation-states have against one another.
Major Nation-States are developing new policy and protocol for contingent cyber activities. For Iran having the new nuclear deal put through, it allows Iran to re-enter the global economy, this places focus on their ability to compete, and their cyber-espionage will shift focus towards financial institutions of the world. The bottom line is all States and businesses are transitioning to a more cyber-conscious world where the internet is a prime target of infrastructure.
The article details the crimes Iranian hackers are being charged with, mainly D-DoS of financial institutions and intrusion into a dam's control system. The author of the article casts doubts on the likelihood that Iran will extradite the accused individuals, primarily due to all of the accused having ties to the Iranian State.
Israel is one of Iran's prime targets of cyber attacks and espionage. State officials, generals, scientists, activists, those involved in large financial institutions are all victim to mass Iranian cyber tactics, such as phishing via e-mail, fake websites and links, and spyware sent through e-mail. Although Israel is second in the world in cyber-security, right after the US, the rate of cyber-attacks is accelerating higher than investment into cyber-security.
The US government in charging Iranian hackers creates a narrative of focusing on the individuals rather than the State that backs the individuals. The possible ramifications of this precedent are Nation-States willingly sacrificing individuals, whom are following government orders to engage in illicit cyber activities, to scapegoat and escape consequences.
Iran's cyber aggression is more of a political ploy than military against the US. The cyber espionage targets institutions that may not have strategic value, but are well-known by the public for stronger media coverage to boost propaganda.
A cyber-espionage hacker group believed to be backed by Iran and located in Tehran have been identified. Tracking has led to identification of, Yaser Balaghi, the leader of a group known as "Rocket Kitten".
After the the new nuclear deal Iran's focus has been channeled into cyber activity. Iran state sponsored cyber espionage aimed at state department employees has been noted, usually through social media.
Cadelle and Chafer, the name of these groups, engage in cyber espionage using backdoors to target political activists and dissidents. These cyber groups have infiltrated over 100 systems of airlines, telecommunications and other organisations, mainly in the Middle East.
Although Iran does have a track record of international cyber attacks a report authored by a cyber security company is being scrutinized for its lack of proper documentation and evidence for current activity. It is important to foreign relations and intelligence official of the State that information available to them is of the utmost accuracy.
Cyber activity and crime are growing in the Middle East according to anti-virus industry reports. This raises the question of business in the Middle East are prepared or taking action to counter the increase of threat; reports however show that most are not.
Iran and Saudi Arabia have a long standing history of conflict that continues to this day. As the conflict continues cyber crime is becoming a regular tool for Iran to employ. Saudi Arabia also engages in cyber attacks but not as frequent as Iran. In addition a Yemen Cyber group, that has engaged in cyber crime, is believed to have direct ties to the Iran State.
Recently the Saudi Ministry of Defense website was cyber attacked via DDoS. Tensions between Iran and Saudi are evident as a back and forth of cyber attacks exchange. The attack is alleged to be a form of protest as Saudi continues its executions of people on charges of terrorism.
The article talks about the buzz and and misusage of the word "cyber" by media. There are distinctions of the different actions denoted with "cyber', such as the difference between cyber-war and cyber-crime.
It is only in recent years that focus on cyber security has ramped up. Predictions are that if an all out cyber warfare was to initiate that although both sides would suffer casualties the Middle East would not have the infrastructure to emerge victorious or recover.
Iran and Saudi Arabia, regional rivals in the Middle East, are involved in a cyber conflict. The nations use cyber attacks to release or leak critical intelligence to affect the outcomes of ongoing military conflicts in the region.