logo
#

Latest news with #Iranian-affiliated

Iranian hackers could target American defense companies working in Israel, US agencies warn
Iranian hackers could target American defense companies working in Israel, US agencies warn

Egypt Independent

time02-07-2025

  • Business
  • Egypt Independent

Iranian hackers could target American defense companies working in Israel, US agencies warn

CNN — US defense companies doing business in Israel are at increased risk of cyberattacks from Iran despite an US defense companies doing business in Israel are at increased risk of cyberattacks from Iran despite an Israel-Iran ceasefire , American cybersecurity and defense agencies warned Monday. 'Based on the current geopolitical environment, Iranian-affiliated cyber actors may target U.S. devices and networks for near-term cyber operations,' said the advisory from the Cybersecurity and Infrastructure Security Agency, FBI, National Security Agency and the Department of Defense Cyber Crime Center. US defense contractors, 'particularly those possessing holdings or relationships with Israeli research and defense firms, are at increased risk,' the agencies said. Iran and Israel have for years conducted intense cyber operations against each other. US officials are increasingly concerned that US organizations with ties to Israel could be caught in the crosshairs. Iran was allegedly behind destructive cyberattacks in 2023 against organizations in the Israeli education and technology sectors. Earlier this month, a pro-Israel hacking group stole $90 million from Iran's largest cryptocurrency exchange, claiming it was revenge against the IRGC. After the US military dropped massive bombs on Iranian nuclear sites over a week ago, US critical infrastructure such as hospitals and water plants have been on high alert for any Iranian retaliation in cyberspace. There haven't been any high-impact Iranian hacks of US organizations reported yet, but Iran's history of aggressive and unpredictable cyber operations has senior US officials paying close attention. CNN has requested comment on the new US advisory from Iran's permanent mission to the United Nations. After the Hamas terrorist attack on Israel in October 2023, hackers linked with Iran's Islamic Revolutionary Guard Corps scanned the internet for Israeli-made industrial software installed at water plants and other facilities across the US, according to US officials. The global hacking campaign included dozens of US victims in the water, energy, food and beverage and health sectors, the new advisory says. That alleged pro-Iranian hacking spree, which did not take advanced skill and exploited weak US defenses, affected people who never expected to be the target of someone allegedly sitting in Tehran. In one case, the hackers forced a water utility in a small town outside of Pittsburgh to operate pump stations manually. 'That was maybe the furthest thing from my mind,' Robert J. Bible, the general manager of the Municipal Water Authority of Aliquippa, told CNN in November 2023, referring to being caught up in cyberattacks related to the Israel-Gaza war. 'Especially for a community. We only serve 15,000 people. You wouldn't put two and two together.' An overriding goal of Iranian hacking operations is psychological, according to experts. The hackers use online personas to exaggerate their exploits, and they have aggressively tried to get journalists to write about their activity. Those personas have been active online in recent days, claiming successful cyberattacks on a variety of targets after Israel attacked Iran more than two weeks ago. 'If it's there, and vulnerable, they have a higher likelihood of targeting it,' one US official, who was monitoring potential Iranian hacking threats to critical infrastructure, previously told CNN

Iran-linked hackers threaten to release Trump aides' emails: Report
Iran-linked hackers threaten to release Trump aides' emails: Report

The Hill

time01-07-2025

  • Politics
  • The Hill

Iran-linked hackers threaten to release Trump aides' emails: Report

A hacking group linked to Iran is threatening to release emails from the accounts of several top aides to President Trump, according to Reuters. The hackers told the news agency they had about 100 gigabytes of emails from Trump officials, including White House chief of staff Susie Wiles. Emails from Trump lawyer Lindsey Halligan, adviser Roger Stone and adult film star Stormy Daniels, who was a key figure in the Manhattan hush money trial against Trump, were also reportedly accessed. The Cybersecurity and Infrastructure Security Agency (CISA) on Monday slammed the hackers' threats as a 'calculated smear campaign.' 'A hostile foreign adversary is threatening to illegally exploit purportedly stolen and unverified material in an effort to distract, discredit, and divide,' Marci McCarthy, CISA's director of public affairs, said in a statement shared on X. 'This so-called cyber 'attack' is nothing more than digital propaganda, and the targets are no coincidence,' she continued. 'This is a calculated smear campaign meant to damage President Trump and discredit honorable public servants who serve our country with distinction. These criminals will be found and they will be brought to justice. Let this be a warning to others, there will be no refuge, tolerance, or leniency for these actions.' The same hacking group sought to share stolen information from the Trump campaign with various media outlets and the Biden campaign during the 2024 election. The group resurfaced as several U.S. agencies warned Monday that hackers affiliated with Iran may still target U.S. entities and networks despite the ceasefire between Israel and Iran. CISA, alongside the Federal Bureau of Investigation, Department of Defense Cyber Crime Center and National Security Agency, emphasized that defense companies tied to Israeli research and defense firms face an 'increased risk' of cyber incidents. The Department of Homeland Security previously warned about the potential for 'low-level' cyberattacks against U.S. networks after Trump ordered strikes on several Iranian nuclear sites last month. Shortly after the strikes, Trump's Truth Social platform saw a surge in reports of problems. Iranian-affiliated hackers later claimed responsibility for a cyberattack on the site.

Iran-linked hackers threaten to release new trove of emails stolen from Trump's inner circle after strikes
Iran-linked hackers threaten to release new trove of emails stolen from Trump's inner circle after strikes

Fox News

time01-07-2025

  • Politics
  • Fox News

Iran-linked hackers threaten to release new trove of emails stolen from Trump's inner circle after strikes

An Iran-linked cyber group is threatening to release a trove of emails it claims to have stolen from top Trump officials and allies. The hackers previously released a batch of stolen emails to the media during the 2024 campaign. Under the pseudonym Robert, the hackers first told Reuters they had roughly 100 gigabytes of emails from White House chief of staff Susie Wiles, President Donald Trump confidante Roger Stone, Trump lawyer Lindsey Halligan and Stormy Daniels, the porn star who claims to have had an affair with Trump. Attorney General Pam Bondi called the hack an "unconscionable cyberattack" and said government agencies would work to "protect the officials targeted by this rogue group." FBI Director Kash Patel added in a statement, "Safeguarding our administration officials' ability to securely communicate to accomplish the president's mission is a top priority." "Anyone associated with any kind of breach of national security will be fully investigated and prosecuted to the fullest extent of the law." Marci McCarthy, spokesperson for the Cyber and Infrastructure Security Agency, called Iran's threat "an effort to distract, discredit and divide." "These criminals will be brought to justice," she said in a statement. Last summer, at the height of the 2024 election, Iranian-linked hackers sent material stolen from the Trump campaign to individuals associated with the Biden campaign and to U.S. media organizations. In an indictment in September, the Biden Justice Department accused three members of Iran's Revolutionary Guard Corps of being behind the leak. In May, the hackers behind "Robert" signaled to Reuters they would not be leaking any more documents. "I am retired, man." However, the group reached back out after Israel and the U.S. attacked Iran's nuclear sites. They said they were organizing a sale of the stolen communications and asked Reuters to publicize it. U.S. cyber officials warned on Monday that U.S. companies and critical infrastructure operators may still be in Iran's crosshairs. Experts have suggested Iran may be looking for non-military ways to punish the U.S. for its strikes. "Despite a declared ceasefire and ongoing negotiations towards a permanent solution, Iranian-affiliated cyber actors and hacktivist groups may still conduct malicious cyber activity," U.S. agencies said in an advisory. The new threat comes as Trump insists he is not speaking to Iran and has offered them nothing for nuclear negotiations. He has said Iran's facilities were "totally obliterated."

Iranian cyberattacks remain threat despite ceasefire, US officials warn
Iranian cyberattacks remain threat despite ceasefire, US officials warn

Nahar Net

time01-07-2025

  • Politics
  • Nahar Net

Iranian cyberattacks remain threat despite ceasefire, US officials warn

by Naharnet Newsdesk 01 July 2025, 12:26 A ceasefire between Iran and Israel has not ended the threat of cyberattacks from hacking groups supportive of Tehran, the FBI and federal cybersecurity officials warned Monday. In a public bulletin, the authorities warned that hacking groups affiliated with or supportive of Tehran may still seek to disrupt or disable critical infrastructure systems in the U.S. such as utilities, transportation and economic hubs. Hackers may also target defense contractors or other American companies with ties to Israel, the agencies said. "Despite a declared ceasefire and ongoing negotiations towards a permanent solution, Iranian-affiliated cyber actors and hacktivist groups may still conduct malicious cyber activity," the agencies warned. The warning of continued cyberthreats after a halt to conventional warfare reflects the often opaque nature of cyber conflict. Hacking groups may have only loose ties to a nation state, and may seek to retaliate as an alternative to traditional military action. The bulletin outlined recommendations, including the use of regular software updates and strong password management systems to shore up digital defenses. Hackers backing Tehran have targeted U.S. banks, defense contractors and energy companies following American strikes on Iranian nuclear facilities — but so far have not caused widespread disruptions. While it lacks the technical abilities of China or Russia, Iran has long used its more limited capabilities to steal secrets, score political points or frighten opponents. Analysts have tied some of these activities to groups working on behalf of Iran's military and intelligence agencies. But in other instances, the groups appear to act independently.

Iranian cyberattacks remain a threat despite ceasefire, warn US officials
Iranian cyberattacks remain a threat despite ceasefire, warn US officials

Business Standard

time01-07-2025

  • Business
  • Business Standard

Iranian cyberattacks remain a threat despite ceasefire, warn US officials

In a public bulletin, the authorities warned that hacking groups affiliated with or supportive of Tehran may still seek to disrupt or disable critical infrastructure systems in the US AP Washington A ceasefire between Iran and Israel has not ended the threat of cyberattacks from hacking groups supportive of Tehran, the FBI and federal cybersecurity officials warned on Monday. In a public bulletin, the authorities warned that hacking groups affiliated with or supportive of Tehran may still seek to disrupt or disable critical infrastructure systems in the US such as utilities, transportation and economic hubs. Hackers may also target defence contractors or other American companies with ties to Israel, the agencies said. Despite a declared ceasefire and ongoing negotiations towards a permanent solution, Iranian-affiliated cyber actors and hacktivist groups may still conduct malicious cyber activity, the agencies warned. The warning of continued cyberthreats after a halt to conventional warfare reflects the often opaque nature of cyber conflict. Hacking groups may have only loose ties to a nation state, and may seek to retaliate as an alternative to traditional military action. The bulletin outlined recommendations, including the use of regular software updates and strong password management systems to shore up digital defences. Hackers backing Tehran have targeted US banks, defense contractors and energy companies following American strikes on Iranian nuclear facilities -- but so far have not caused widespread disruptions. While it lacks the technical abilities of China or Russia, Iran has long used its more limited capabilities to steal secrets, score political points or frighten opponents. Analysts have tied some of these activities to groups working on behalf of Iran's military and intelligence agencies. But in other instances, the groups appear to act independently.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store