The US agency CISA (Cybersecurity Information Sharing Act ) now officially warns of increased hacker attacks from Iran. A new wave is expected, which could not only hit US corporations and the government.
Experts estimate that retaliatory strikes are expected after General Qassim Suleimani death, which could trigger massive problems from attacks on private business and government-used IT. Other authorities, such as the Ministry of Homeland Security, have already followed the warning.
Targeted attacks and widespread malware distribution from Iranian sources are nothing new for security researchers. For years they have been seen as particularly aggressive attackers. For example, network specialist FireEye is now reminding of attacks that have caused problems in recent years. Iran has used wiper malware several times in the past years in destructive attacks. Although these incidents did not usually affect the most sensitive industrial control systems, they did lead to serious breakdowns.
The silent cyber war between the two countries is expected to continue, and now the leadership is warning US companies to take protective measures against the most widespread technical hacking used by well-known Iranian invaders, such as:
Iranian hacking technology that the US Department of Justice has brought many charges against in the past.
The use of username and password combinations that leaked online and were used to access other accounts in another service.
A method that uses a large number of usernames and goes through them with a single password so that hackers can easy open accounts.
Iranian hackers have previously used malware to erase data. A few years ago, the malware program (DisTrack) launched against its national oil companies Saudi Arabia and Qatar’s RasGas. This malware cleaned up the hard drives and brought the two companies to a standstill, resulting in huge financial losses. The company has been reported to clean up the hard drives on 30,000 computers.