01.02.2024 Views

The Cyber Defense eMagazine February Edition for 2024

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Cotton Sandstorm or Static Kitten have been focusing on traditional espionage targets like governmental<br />

organizations (in case of Saudi Arabia Ministry of <strong>Defense</strong> <strong>for</strong> example), telecommunication or aviation<br />

but also the oil industry, transportation and critical infrastructure. Iran has been rapidly accelerating<br />

cyberattacks since mid-2022. Moreover, Iran is now supplementing its traditional cyberattacks with a new<br />

playbook, leveraging cyber-enabled influence operations (IO) to achieve its geopolitical aims. Supreme<br />

National Security Council (SNSC) Secretary Rear Admiral Ali Akbar Ahmadian has called <strong>for</strong> greater<br />

cyber security cooperation among BRICS countries during a Friends of BRICS National Security Advisors<br />

meeting in Johannesburg, South Africa last summer. Iran is likely trying to tap into Chinese and Russian<br />

expertise in “soft war”, which is an Iranian doctrinal term that refers to the use of nonmilitary means, such<br />

as economic and psychological pressure and in<strong>for</strong>mation operations, to erode regime legitimacy, cultivate<br />

domestic opposition, and propagate Western values in Iran. While - like Russia - Iran expresses the belief<br />

“soft war” is a tool mostly used by the West, its own actions in cyberspace and other fronts testify to the<br />

fact that Iran is increasingly using “soft war” as its very own tool of statecraft.<br />

Iran’s minister of defense, Brig. Gen. Mohammad Reza Ashtiani, confirmed as much in a speech to his<br />

country’s defense officials last year, in which he outlined that given the current complex security situation<br />

in the Middle East, Iran had to redefine its national defenses beyond its geographic borders. According<br />

to Mrs. Ashtiani, that means utilizing new warfare strategies - including the use of space, cyberspace and<br />

other ways.<br />

Iran’s showing fast evolving capabilities as it has narrowed the gap with other powers opposing the West<br />

like Russia and China. Iranian hackers used the relieving of pressure provided by the nuclear deal and<br />

focused their energy on regional targets like Saudi Arabia, where they have consistently been trying to<br />

embed themselves in critical networks in order to prepare vectors of attack should the regime command<br />

the IRGC and the Ministry of Intelligence to do so.<br />

Iran has also seemingly concluded that the Houthis’ experiment in the Red Sea has been so successful<br />

that it bears repeating in the Mediterranean and in other waterways. “<strong>The</strong>y shall soon await the closure<br />

of the Mediterranean Sea, [the Strait of] Gibraltar and other waterways,” Brig. Gen. Mohammad Reza<br />

Naqdi, the coordinating commander of Iran’s Islamic Revolutionary Guard Corps, told Iranian media on<br />

Dec. 23, apparently referring to the international community. Since Iran does not possess kinetic strike<br />

capability to target targets that far, we can assume he’s referring to Iran’s cyber capabilities and the<br />

regime’s apparent willingness to use them should Tehran feel threatened, which can easily happen in a<br />

tense situation like the one that exists in the region nowadays.<br />

Iran’s growing expertise and willingness to conduct aggressive cyber operations make it a major threat<br />

to the security of U.S. and allied networks, data and critical infrastructure. Iran’s opportunistic approach<br />

to cyber attacks makes critical infrastructure and logistical hubs operators susceptible to being targeted.<br />

In December IRGC-Affiliated hackers were able to exploit PLCs in multiple sectors, including U.S. water<br />

and wastewater systems facilities. Since Iran often uses cyber as a pillar of deterrence, this cyber attack<br />

may have been a warning of possible retaliation by cyber means, should Iran’s enemies overstep<br />

boundaries laid by the regime. <strong>The</strong> logistics industry, being a critical part of infrastructure, confronts<br />

substantial risks from advanced threat actors from Iran and beyond. Data we have recently published on<br />

the industry reveals a consistent pattern of attacks, with a clear emphasis on developed economies and<br />

major global logistics hubs. Although true that the detection of APT campaigns has declined, a correlation<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2024</strong> <strong>Edition</strong> 113<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!