Skip to content
Menu
  • Original Short Fiction
Menu

Iran: A Rising Cyber-Power?

Posted on 18 December 2015 by The Tactical Hermit

iranian-cyber-threat1

“A Brown Water Navy”

Through a series of attacks over the last three years, Iran has revealed a limited offensive cyber capability but a willingness to use it to meet its geopolitical goals.

In testimony calling out Iran for attacks on Sands Casinos, Director of National Intelligence James Clapper put Iranian cyber capability in the same category as North Korea, noting that these countries had “lesser technical capabilities.” China and Russia, on the other hand, have “very sophisticated programs.”

The wiper virus attack against Sands along with similar attacks against Saudi Aramco and RasGas, and distributed denial of service (DDoS) attacks against U.S. financial institutions, used open-source and widely available hacking tools.

The attacks on the Sands Casinos began with a brute-force attack to guess login credentials at a far-flung outpost of the Sands gaming empire. When security personnel noticed the attack and added additional layers of security, they found a vulnerable web-server, gained access to it, and then used an open source tool to gather credentials. They then used these credentials to access Sands main corporate network, where they planted the wiper that wreaked havoc across the corporate network.

That wiper virus, written in Visual Basic and 150 lines of code in all, showed similarities to the Shamoon virus that took out 30 thousand computers at Saudi Aramco. But it also showed similarities to the malware used against Sony Pictures and in an attack against South Korea. While these similarities might point to a single source – maybe an “Axis of Evil” joint cyber lab – most experts judge that the similarities are due to the lack of sophistication – nothing more than copy and paste exercises carried out by different groups with a similar (and basic) skill set.

Technical sophistication, however, is only one measure of Iran’s cyber program. While Iran possesses the cyber equivalent of a “brown water” navy – it can’t compete on the high seas, but it’s small and limited capabilities can pack a punch –  in cyberspace, where geography isn’t a limiting factor, Iran can deliver whatever capability it has to a target anywhere on the globe.

Iran has used its limited capabilities as a tool for what the intelligence community has labeled “asymmetric but proportional retaliation” in response to the activities of foreign adversaries.

Most analysts believe the attacks attributed to Iran are not being carried out by elements of the Iranian government but by affiliated hacking groups that operate at the behest of the Iranian government. Yet, the hackers seem to operate under a sophisticated understanding of where U.S. redlines may be. The Shamoon virus was used to target U.S. allies in the Persian Gulf (thought by many to be a response to alleged U.S. involvement in Stuxnet). When targeting the U.S. financial sector, Iranian actors didn’t deploy their worst weapon. Instead, they launched a series of DDoS attacks that amounted to a nuisance, albeit a costly one, rather than attempting to disrupt operations of any U.S. banks.

For all their sophistication, the DDoS attacks were clearly meant to make the U.S. government take notice without provoking a response. In retaliating against the CEO of Sands Casinos, Sheldon Adelson, for his comments calling for a nuclear demonstration against Iran, the Iranian actors seem to have intuited that his casinos didn’t represent the kind of critical infrastructure target that might cause the U.S. to escalate.

While Iran will likely not gain the ability to use cyber attacks to alter U.S. strategy or deter action in the Middle East, it’s proven adept at using its limited capabilities to signal displeasure and threaten further action.

Read the Original Article at The Cipher Brief

1 thought on “Iran: A Rising Cyber-Power?”

  1. Pingback: Iran: A Rising Cyber-Power? | Rifleman III Journal

Leave a Reply

Your email address will not be published. Required fields are marked *

Tactical Hermit Substack

Recent Post

  • Happy White Father’s Day!
  • The Surveillance State: Hackers are tampering with USB charging stations at Airports
  • Hidden History: How Israel Acquired Nukes
  • In Times Like These You Gotta Laugh To Make it Through…
  • Technology: Don’t Always Bet Against Older and Slower!
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme