Hackers hit Iranian apps, websites after US-Israeli strikes

Reuters
03/02
Hackers hit Iranian apps, websites after US-Israeli strikes

Experts predict Iranian cyber retaliation against U.S. and Israeli targets

Iran's past cyber responses have been muted, despite being a known threat

BadeSaba app hacked, urging armed forces to disarm and join civilians

By AJ Vicens

March 1 (Reuters) - A wave of cyber-enabled operations took place early Saturday morning alongside the joint U.S.-Israeli attack on targets across Iran, according to cybersecurity experts and observers.

The operations included the hacking of multiple news websites to display various messages and the hack of BadeSaba, a religious calendar app with more than 5 million downloads, which displayed messages telling users “It’s time for reckoning” and urging armed forces to give up weapons and join the people.

Reuters could not establish contact with BadeSaba’s chief executive.

A spokesperson for U.S. Cyber Command did not immediately respond to a request for comment.

Internet connectivity in Iran dropped precipitously at 0706 GMT, and then again at 1147 GMT, with only minimal connectivity remaining, Doug Madory, director of internet analysis at Kentik, said in a post on X.

The cyberattack on BadeSaba was a smart move because government supporters use it and they tend to be more religious, said Hamid Kashfi, a security researcher and founder of cybersecurity firm DarkCell.

Cyber operations also struck a variety of Iranian government services and military targets to limit a coordinated Iranian response, the Jerusalem Post reported on Saturday. Reuters has not been able to independently verify the claims.

“As Iran considers its options, the likelihood increases that proxy groups and hacktivists may take action, including cyberattacks, against Israeli and U.S.-affiliated military, commercial, or civilian targets,” said Rafe Pilling, the director of threat intelligence with cybersecurity firm Sophos.

The attacks could include the amplification of old data breaches presented as new, unsophisticated attempts to compromise internet-exposed industrial systems, and potentially direct offensive cyber operations, Pilling said.

Activity in the Middle East has increased, said Cynthia Kaiser, a former top FBI cyber official and current senior vice president at anti-ransomware firm Halcyon. Kaiser said the firm has also seen calls to action from known pro-Iranian cyber personas who in the past have carried out hack-and-leak operations, ransomware attacks and distributed denial-of-service attacks (DDoS), which flood internet services rendering them inaccessible.

The current cyber activity may precede more aggressive operations, said Adam Meyers, senior vice president of counter adversary operations with CrowdStrike CRWD.O.

"CrowdStrike is already seeing activity consistent with Iranian-aligned threat actors and hacktivist groups conducting reconnaissance and initiating DDoS attacks," he said.

Cybersecurity firm Anomali said in an analysis shared with Reuters on Saturday that state-backed Iranian hacking groups were already carrying out "wiper" attacks that erase data on Israeli targets ahead of the strikes.

Although Iran is often mentioned by U.S. cyber officials alongside Russia and China as a threat to American networks, Tehran's previous responses to attacks on its soil have been muted.

In June, after the U.S. struck Iranian nuclear targets, there was little sign of the disruptive cyberattacks often invoked during discussions of Iran’s digital capabilities beyond a short-lived interruption of services in Tirana, Albania's capital, according to media reports.

(Reporting by AJ Vicens in Detroit; Editing by Chris Sanders and Lisa Shumaker)

((a.j.vicens@tr.com; +1 651 263 1318))

应版权方要求,你需要登录查看该内容

免责声明:投资有风险,本文并非投资建议,以上内容不应被视为任何金融产品的购买或出售要约、建议或邀请,作者或其他用户的任何相关讨论、评论或帖子也不应被视为此类内容。本文仅供一般参考,不考虑您的个人投资目标、财务状况或需求。TTM对信息的准确性和完整性不承担任何责任或保证,投资者应自行研究并在投资前寻求专业建议。

热议股票

  1. 1
     
     
     
     
  2. 2
     
     
     
     
  3. 3
     
     
     
     
  4. 4
     
     
     
     
  5. 5
     
     
     
     
  6. 6
     
     
     
     
  7. 7
     
     
     
     
  8. 8
     
     
     
     
  9. 9
     
     
     
     
  10. 10