Thursday , 25 April 2024

Iran’s history of hacking and being hacked

axios.com – Given last week’s flurry of U.S. cyberattacks against Tehran, Iran’s history of retaliating with cyberattacks might raise a few eyebrows. But more concerning might be Iran’s history of learning new strategies from other nations’ cyberattacks.

The big picture: In 2009, Iran became the first known target of cyber warfare. Its history with cyber conflict is long, and could be used to inform how the current moment might play out.

The backstory: Iran shows an uncommon ability to learn from other nations’ techniques and targeting, said Silas Cutler, reverse engineering lead at Chronicle. That’s evidenced in how it adapted to Stuxnet, 2009 malware likely launched by the U.S. and Israel to disable the Iranian nuclear program.

  • After Stuxnet, notes Cutler, Iran invested heavily in cyber activities.
  • That resulted in the Shamoon malware, ultimately used to damage the Saudi-owned oil company Aramco in a 2012 attack widely believed to have been carried out by Iran.
  • “I’m less worried about a retaliatory attack and more worried about them learning from our attacks and making them their own,” said Cutler.

In fact, Stuxnet caused a fundamental change in how hackers operate in Iran.

  • Hacker culture in Iran dates back to the turn of the millennium. Ashiyane, an Iranian security forum still used today, was founded in 2002.
  • But the purposes of hacker forums in Iran changed after Stuxnet, said Cutler, moving from being a general subculture to a more patriotic one.
  • To this day, the Iranian government uses hacker forums for recruitment whenever they need an emergency workforce.

Where it stands: More recently, said Adam Meyers of Crowdstrike, Iran has learned from Russia’s operations against Ukraine in its current operations against Saudi Arabia and the UAE.

The intrigue: Unlike North Korea, which has mainly used disruptive cyberattacks to settle petty scores and generate revenue, Iran’s disruptive cyberattacks have been more tactical, said Ben Read, senior manager for cyber-espionage analysis at FireEye.

  • Iran responded by launching massive denial-of-service attacks against the U.S. financial sector in 2012, after the U.S. launched sanctions against Iran and only two years after Stuxnet was exposed.
  • Those are remarkably similar to the current state of affairs, notes Read. The U.S. announced new sanctionsagainst Iran this week following the cyber attacks last week.
  • Iran can be petty, too. (It may have used Shamoon to attack Sheldon Adleson’s Sands casino in response to comments he made.)

What’s next: Iran largely stopped targeting the West after the Iran deal, but activity has re-emerged against the U.S. as tensions have escalated. That activity appears to be more for information gathering than to cause harm.

  • The U.S. should be aware of Iran’s techniques should they chose to retaliate, said Read, as just knowing what to look for can be enough to head off Iran’s brand of attacks.
  • “They can do bad stuff, but they aren’t wizards,” he said.
0