Iran TerrorismCyber Security Firm Warns About Iran Hacking Threat

Cyber Security Firm Warns About Iran Hacking Threat

-

Iran Focus

London, 15 Dec – Two cyber security firms have warned the US against underestimate Iranian hackers in the wake of successful operations and advised that they need to be tracked more closely.

These hackers, who target enemies of  Iran and promote the Regime’s political agenda, have become more advanced in their attacks, which led advanced-threat protection firms FireEye and ClearSky to warn that the Regime is fast turning into a cyber crimes giant.

Attacks

In November, Iranian agents attacked Microsoft Office software in order to target a Middle Eastern government according to FireEye. The suspects are an Iranian cyber-espionage threat group, known as APT34.

This group, more well known as OilRig, has a history of operations that align with Iran’s political agenda, which means that they are likely working under direction from the Regime, and conduct their attacks in a very different way.

Fred Plan, a senior analyst with FireEye, told eWEEK: “One thing that sets the Iranian cyber-espionage groups apart is they are not that reliant on technical solutions. They do not—like the Chinese and Russians—have a pile of zero days. They do a lot more basic social engineering.”

The problem is that the US is also dealing with cyber espionage from other states- like North Korea, China, and Russia- and don’t spend a lot of time on Iran’s operations. This needs to change.

Earlier this month, Israeli cyber-security consultancy ClearSky Cyber Security found that a lot of attacks against human-right activists and media organizations were conducted by Iranian hackers as well. Given the Regime’s relationship with journalists and human rights, it seems likely that they order this attack too.

Plan said: “In the case of Iran, it is [similar] to China and Russia—there is a spectrum of activity and many different actor groups. Some are very closely tied to what the government is doing, while others are nationalistic actors that get together and have a particular set of skills.”

Although Plan wants to be cautious about this, from what we know about the Regime it is unlikely anyone would target enemies of the Regime without being told to.

APT34 has targeted the financial, government, energy, chemical and telecommunications industries in the Middle East, using a spearphishing campaign and the MS Office vulnerability to install malware.

Given their speed at exploiting vulnerabilities, it is hard to believe that they aren’t being funded and instructed by the mullahs.

Latest news

120th Week of ‘No to Execution Tuesdays’: Political Prisoners Launch Hunger Strike in 56 Iranian Prisons Amid Escalating Crackdown

On Tuesday, May 12, 2026, political prisoners across 56 prisons in Iran launched a renewed hunger strike, marking the...

Strait of Hormuz: Show of Power or Beginning of New Tensions

At the same time as tensions in the Middle East are increasing, the British government has announced its readiness...

The Return of the Shah’s Infamous Royal Secret Police to the Streets of Europe

Eighty years after World War II and the fall of Hitler’s fascism in Germany, the use of Nazi symbols...

Tehran Responds to U.S. Proposal After Trump’s Threat

The state-run IRNA news agency reported on Sunday, May 10, that the Iranian regime had sent its response to...

375% Increase in Food Prices in Iran

State-run media outlets reported on Saturday, May 9, a new wave of price increases for essential goods and basic...

The Shadow of Iranian Regime Assassination Squads in Germany

As political and security tensions rise across Europe, German security officials have warned about an escalating security threat in...

Must read

Tougher on Iran

Washington Post - Editorial: Iran's Revolutionary Guard Corps is...

Iran’s Dominance Over Iraq Could Be Coming to an End

Iran Focus London, 2 Aug - The Iranian Regime dominates...

You might also likeRELATED
Recommended to you