DUBAI: Iran is one of the biggest threats in cyberspace, according to experts who warn that a global response is needed to repel its rising wave of cyberattacks on government and communications infrastructure worldwide.
The leading state sponsor of terror is extending its malign presence online, with 黑料社区 among its main targets. Iran鈥檚 growing digital prowess is part of its 鈥渟oft war鈥 strategy to spy on adversaries and spread its rhetoric.聽
鈥淚ran is increasingly active and a growing cyber threat, though it isn鈥檛 the most sophisticated actor,鈥 Michael Eisenstadt, Kahn fellow and director of the military and security studies program at the Washington Institute for Near East Policy, told Arab News. 鈥淏ut as past Russian hacking efforts in the US have shown, you don鈥檛 need to be technologically sophisticated to hack and then leak emails, causing embarrassment to adversaries.鈥
In recent months, cybersecurity firms and tech companies have exposed attacks linked to faceless enemies in Iran.聽
鈥淐yber holds a certain appeal鈥 for the country, Eisenstadt said. 鈥淏ecause of the difficulty attributing responsibility for cyber-attacks, it provides Tehran with a degree of deniability,鈥 he said. 鈥淧erhaps most importantly, it allows Iran to strike its adversaries globally, instantaneously and on a sustained basis, and to achieve strategic effects in ways it can鈥檛 in the physical domain.鈥
Iran鈥檚 greatest adversaries are the US, Israel and 黑料社区 鈥渋n that order,鈥 Eisenstadt said. 鈥淚n March 2018, the US government designated an Iranian entity, the Mabna Institute, and nine individuals associated with the institute, for operating a massive hacking and cyberspying operation that targeted hundreds of universities and companies in dozens of countries to steal proprietary data and academic research, presumably to help Iran鈥檚 own research and development efforts, to circumvent sanctions, and to compensate for its economic isolation. These activities had been going on for years.鈥
Joyce Hakmeh, a research fellow of cyber policy and co-editor at the Journal of Cyber Policy at the International Security Department at Chatham House, said Iran has been linked to several attacks in the Middle East, including in 黑料社区. One of the biggest attacks was identified in 2012, when an Iranian hacker group deployed the Shamoon computer virus to cripple thousands of hard drives at Saudi Aramco. 鈥淓veryone remembers the big attack against 黑料社区 in 2012, which affected 35,000 computers. It was called the biggest hack in history at the time,鈥 she said.
Eisenstadt said there were several attempted strikes on Saudi government and private sector entities using the Shamoon 2.0 malware in 2016 and 2017, and on Italy鈥檚 Saipem oil services firm (whose biggest customer is Saudi Aramco) in December 2018.
Hakmeh said while 鈥渁ttribution is a challenge鈥 when it comes to cyber activity, a host of groups have been linked to Tehran鈥檚 terror online, including Magic Hound, MuddyWater, APT33, APT34, APT39, Cobalt Gypsy, Rocket Kitten and NewsBeef.
Collectively, these have targeted organizations across the Middle East in industries including finance, government, energy, chemicals and telecommunications.
A 2018 report by the Carnegie Endowment for International Peace noted: 鈥淲hile Iran鈥檚 offensive cyber operations have required modest resources to develop, they have allowed Tehran to project itself as an emerging cyber power able to cause significant harm to its adversaries.鈥
The report said: 鈥淎s judged from the evidence of coordination between security agency actions and observed cyber operations, the campaigns of Iranian threat actors almost certainly have a direct relationship with government entities, specifically the Islamic Revolutionary Guard Corps and the Ministry of Intelligence. Attempts to forecast the future of Iranian cyber operations are constrained by the secrecy on the part of the Iranian state about its activities and an uncertain geopolitical climate.鈥
Eisenstadt said when it comes to the biggest threats in cyberspace, the most formidable actors are Russia followed by China, North Korea and Iran. 鈥淚ran鈥檚 activities in the cyber domain generally serve its broader foreign policy objectives. In some cases, the goal might be to advance Iran鈥檚 propaganda line. In others, it might be to steal intellectual property and propriety information, in order to circumvent sanctions and benefit its own research and development efforts,鈥 he said.
Hakmeh said countries, especially in the Middle East, need to build resilience against cyberattacks by sharing information, preparing strategies and educating people about good 鈥渃yber hygiene,鈥 such as changing passwords. 鈥淲hile Iran for some years has been considered a third-tier threat, the threat is considerable. It鈥檚 a country to monitor, to keep on the map,鈥 she added. 鈥淚t doesn鈥檛 have the same capabilities as China, Russia or the US, but it has been able to be very destructive.鈥澛
While Iran spreads fake news to support its rhetoric against Israel, 黑料社区 and the US, its more serious attacks are geopolitically motivated, said Hakmeh. 鈥淢ost of the attacks that Iran has been linked to are for espionage reasons to get a competitive advantage 鈥 黑料社区鈥檚 petrochemical industry, for example, to see what technology it鈥檚 using 鈥 or to gain insight into 黑料社区鈥檚 military capacities so Iran can enhance its own,鈥 she said.
Dr. Johannes Ullrich, dean of research at the SANS Institute, a US company that specializes in information security and cybersecurity training, said as Iran鈥檚 conflict with its neighbors grows, so has its presence on the dark web.
鈥淚ran is believed to maintain a significant effort to conduct offensive cyber operations against its adversaries,鈥 he added. 鈥淚t may not be among the most sophisticated, but it鈥檚 very aggressive in applying the skills it has.
鈥淥ne technique that has been employed in the attacks is domain hijacking. For this attack, an administrator鈥檚 password is used to alter settings for an organization鈥檚 domain. The attack itself is pretty simple, and the hard part is to get the administrator鈥檚 password. It isn鈥檛 clear how the administrator password was obtained in these cases, but typically phishing attacks are used. Overall these attacks aren鈥檛 terribly sophisticated, but the impact can be huge.鈥
Aside from hacks on government and company infrastructure, Iran has been linked to a global network of fake news websites. ClearSky, a Tel Aviv-based cyber tech security firm, recently issued a report linking Iranian propagandists to fake news sites in 28 countries that spread misinformation about their targets 鈥 chiefly in the Middle East and Asia 鈥 and advance Tehran鈥檚 ideological and geopolitical interests.
In recent months, FireEye, a US聽 cybersecurity firm, issued a warning about fake news sites and profiles on Facebook and Twitter that it believed were operated
by Tehran as part of its cyber-
influence campaign.聽 Such campaigns were also exposed by Twitter, which posted 1 million tweets generated by fake accounts.聽
Facebook said it had deleted dozens of fake profiles. Just this month, the platform said it removed 783 accounts tied to Iran that appeared to be engaging in a manipulation campaign against people in almost 30 countries.
Still, experts at the Institute for National Security Studies in the US have said Tehran鈥檚 efforts have not been foolproof, with a report noting: 鈥淯se of Iranian contact data (such as phone numbers and email addresses), copied content and poor writing has led to their public exposure. Until then, however, Iran managed to reach many people 鈥 some contents were viewed by millions of views, and some earned responses by hundreds of thousands of surfers.鈥
Simone Vernacchia, cybersecurity and digital infrastructure advisory lead at PwC Middle East, said that while it is against his company鈥檚 policy to attribute cyberattacks to a specific 鈥渘ation-state actor,鈥 the firm had noted an 鈥渋ncrease in disruptive attacks, which may be sponsored by a nation-state.鈥
Although there has been a big increase in investment in cybersecurity in past months, many Middle Eastern countries鈥 defense systems remain less advanced than those in the West, he said.
鈥淎 stronger collaboration among privately owned critical infrastructure and government defense systems, as well as a strong and periodically tested set of organizational and technical interfaces, would strengthen the ability to respond to crises,鈥 he said.