Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Critical SaaS Security Do’s and Don’ts: Insights from 493 Companies

June 29, 2025

FBI Alerts: Scattered Spider Targets Airlines with Social Engineering Tactics

June 28, 2025

Zyxel Networks Simplifies Secure Remote Connectivity

June 28, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » Iranian-backed hackers go to work after US strikes
Cybercrime

Iranian-backed hackers go to work after US strikes

Staff WriterBy Staff WriterJune 25, 2025No Comments5 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


WASHINGTON (AP) — Hackers backing Tehran have targeted U.S. banks, defense contractors and oil industry companies following American strikes on Iranian nuclear facilities — but so far have not caused widespread disruptions to critical infrastructure or the economy.

But that could change if the ceasefire between Iran and Israel collapses or if independent hacking groups supporting Iran make good on promises to wage their own digital conflict against the U.S., analysts and cyber experts say.

The U.S. strikes could even prompt Iran, Russia, China and North Korea to double down on investments in cyberwarfare, according to Arnie Bellini, a tech entrepreneur and investor.

Bellini noted that hacking operations are much cheaper than bullets, planes or nuclear arms — what defense analysts call kinetic warfare. America may be militarily dominant, he said, but its reliance on digital technology poses a vulnerability.

“We just showed the world: You don’t want to mess with us kinetically,” said Bellini, CEO of Bellini Capital. “But we are wide open digitally. We are like Swiss cheese.”

Hackers have hit banks and defense contractors

Two pro-Palestinian hacking groups claimed they targeted more than a dozen aviation firms, banks and oil companies following the U.S. strikes over the weekend.

The hackers detailed their work in a post on the Telegram messaging service and urged other hackers to follow their lead, according to researchers at the SITE Intelligence Group, which tracks the groups’ activity.

The attacks were denial-of-service attacks, in which a hacker tries to disrupt a website or online network.

“We increase attacks from today,” one of the hacker groups, known as Mysterious Team, posted Monday.

Federal authorities say they are on guard for additional attempts by hackers to penetrate U.S. networks.

The Department of Homeland Security issued a public bulletin Sunday warning of increased Iranian cyber threats. The Cybersecurity and Infrastructure Security Agency issued a statement Tuesday urging organizations that operate critical infrastructure like water systems, pipelines or power plants to stay vigilant.

While it lacks the technical abilities of China or Russia, Iran has long been known as a “chaos agent” when it comes to using cyberattacks to steal secrets, score political points or frighten opponents.

Cyberattacks mounted by Iran’s government may end if the ceasefire holds and Tehran looks to avoid another confrontation with the U.S. But hacker groups could still retaliate on Iran’s behalf.

In some cases, these groups have ties to military or intelligence agencies. In other cases, they act entirely independently. More than 60 such groups have been identified by researchers at the security firm Trustwave.

These hackers can inflict significant economic and psychological blows. Following Hamas’ Oct. 7, 2023, attack on Israel, for instance, hackers penetrated an emergency alert app used by some Israelis and directed it to inform users that a nuclear missile was incoming.

“It causes an immediate psychological impact,” said Ziv Mador, vice president of security research at Trustwave’s SpiderLabs, which tracks cyberthreats.

Economic disruption, confusion and fear are all the goals of such operations, said Mador, who is based in Israel. “We saw the same thing in Russia-Ukraine.”

Collecting intelligence is another aim for hackers

While Iran lacks the cyberwarfare capabilities of China or Russia, it has repeatedly tried to use its more modest operations to try to spy on foreign leaders — something national security experts predict Tehran is almost certain to try again as it seeks to suss out President Donald Trump’s next moves.

Last year, federal authorities charged three Iranian operatives with trying to hack Trump’s presidential campaign. It would be wrong to assume Iran has given up those efforts, according to Jake Williams, a former National Security Agency cybersecurity expert who is now vice president of research and development at Hunter Strategy, a Washington-based cybersecurity firm.

“It’s fairly certain that these limited resources are being used for intelligence collection to understand what Israel or the U.S. might be planning next, rather than performing destructive attacks against U.S. commercial organizations,” Williams said.

The Trump administration has cut cybersecurity programs and staff

Calls to bolster America’s digital defense come as the Trump administration has moved to slash some cybersecurity programs as part of its effort to shrink the size of government.

CISA has placed staffers who worked on election security on leave and cut millions of dollars in funding for cybersecurity programs for local and state elections.

The CIA, NSA and other intelligence agencies also have seen reductions in staffing. Trump abruptly fired Gen. Timothy Haugh, who oversaw the NSA and the Pentagon’s Cyber Command.

The Israel-Iran conflict shows the value of investments in cybersecurity and cyber offense, Mador said. He said Israel’s strikes on Iran, which included attacks on nuclear scientists, required sophisticated cyberespionage that allowed Israel to track its targets.

Expanding America’s cyber defenses will require investments in education as well as technical fixes to ensure connected devices or networks aren’t vulnerable, said Bellini, who recently contributed $40 million toward a new cybersecurity center at the University of South Florida.

There is a new arms race when it comes to cyberwar, Bellini said, and it’s a contest America can’t afford to lose.

“It’s Wile E. Coyote vs. the Road Runner,” Bellini said. “It will go back and forth, and it will never end.”



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNavigating the Interplay of Generative AI and Security
Next Article New Malware Strike: Russian APT Targets Ukrainian Government via Signal
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

April blackout in Spain and Portugal was due to grid failures and poor planning

June 17, 2025

Protecting your 23andMe data against resale

June 11, 2025

Tanzania blocks access to X after it says hackers targeted government accounts

May 28, 2025
Leave A Reply Cancel Reply

Latest Posts

FBI Alerts: Scattered Spider Targets Airlines with Social Engineering Tactics

June 28, 20250 Views

From Malicious to Mindful: The Evolution of Browser Tools

June 28, 20250 Views

OneClik Malware: Unleashing Threats in the Energy Sector

June 27, 20250 Views

Scattered Spider Hackers Target Aviation and Transportation Firms

June 27, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Critical SaaS Security Do’s and Don’ts: Insights from 493 Companies

June 29, 2025

FBI Alerts: Scattered Spider Targets Airlines with Social Engineering Tactics

June 28, 2025

Zyxel Networks Simplifies Secure Remote Connectivity

June 28, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.