Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Trump closes the online shopping loophole that beat tariffs

    Tapo DL100 review: A Wi-Fi smart lock for a whole lot less

    This Alienware 4K OLED gaming monitor is over $400 off right now

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      AI models may be accidentally (and secretly) learning each other’s bad behaviors

      July 30, 2025

      Another Chinese AI model is turning heads

      July 15, 2025

      AI chatbot Grok issues apology for antisemitic posts

      July 13, 2025

      Apple sued by shareholders for allegedly overstating AI progress

      June 22, 2025

      How far will AI go to defend its own survival?

      June 2, 2025
    • Business

      Cloudflare open-sources Orange Meets with End-to-End encryption

      June 29, 2025

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025
    • Crypto

      Shiba Inu Price’s 16% Drop Wipes Half Of July Gains; Is August In Trouble?

      July 30, 2025

      White House Crypto Report Suggests Major Changes to US Crypto Tax

      July 30, 2025

      XRP Whale Outflows Reflect Price Concern | Weekly Whale Watch

      July 30, 2025

      Stellar (XLM) Bull Flag Breakout Shows Cracks as Momentum Fades

      July 30, 2025

      Binance Listing Could Be a ‘Kiss of Death’ for Pi Network and New Tokens

      July 30, 2025
    • Technology

      Trump closes the online shopping loophole that beat tariffs

      July 31, 2025

      Tapo DL100 review: A Wi-Fi smart lock for a whole lot less

      July 31, 2025

      This Alienware 4K OLED gaming monitor is over $400 off right now

      July 31, 2025

      Asus ROG Xbox Ally releases August with high price, according to leaks

      July 31, 2025

      This high-capacity solar power bank is down to its lowest price

      July 31, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Widening Middle Eastern war increases cyber risk
    Technology

    Widening Middle Eastern war increases cyber risk

    TechAiVerseBy TechAiVerseJune 26, 2025No Comments6 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Widening Middle Eastern war increases cyber risk
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    BMI Calculator – Check your Body Mass Index for free!

    Widening Middle Eastern war increases cyber risk

    With the entry of the US into the widening Middle Eastern conflict, cyber risk is likely to increase across the board

    By

    • Alex Scroxton,
      Security Editor

    Published: 23 Jun 2025 17:05

    With the US entering a widening Middle Eastern conflict following a series of airstrikes against nuclear targets in Iran over the weekend, organisations across Europe and North America should be on high alert for the possibility of cyber attacks conducted by threat actors backed by or supportive of Iran.

    Iranian threat actors have been highly engaged in attacking Israeli targets since the 7 October 2023 Hamas attacks, but in a series of warnings over the past 48 hours, government officials and cyber experts said the likelihood of disruptive cyber attacks hitting US and allied targets, including in the UK – where the government has issued statements in support of President Trump’s airstrikes – has increased.

    In a bulletin issued on Sunday 22 June via its National Terrorism Advisory System, the US Department for Homeland Security said the ongoing Iran conflict was likely to cause an uptick in “low-level” cyber attacks against US networks by pro-Iranian hacktivists, while state-backed operators may also become increasingly active.

    “Both hacktivists and Iranian government-affiliated actors routinely target poorly secured US networks and internet-connected devices for disruptive cyber attacks,” the alert said.

    It also acknowledged that targets perceived to be Jewish, pro-Israel, or linked to the US government or military could be particularly at risk of cyber actions. The alert further warned of the possibility of attacks on critics of the Iranian regime.

    “Iran already targets the US with cyber espionage which they use to directly and indirectly gather geopolitical insight and surveil persons of interest,” said John Hultquist, chief analyst at the Google Threat Intelligence Group.

    “Persons and individuals associated with Iran policy are frequently targeted through organisational and personal accounts and should be on the lookout for social engineering schemes,” he said. “Individuals are also targeted indirectly by Iranian cyber espionage against telecoms, airlines, hospitality, and other organisations who have data that can be used to identify and track persons of interest.”

    Hultquist added: “Iran has had mixed results with disruptive cyber attacks, and they frequently fabricate and exaggerate their effects in an effort to boost their psychological impact.

    “We should be careful not to overestimate these incidents and inadvertently assist the actors,” he said. “The impacts may still be very serious for individual enterprises, which can prepare by taking many of the same steps they would to prevent ransomware.”

    James Turgal, vice-president of global cyber risk and board relations at Optiv – who also spent over 20 years in law enforcement at the FBI – said the possibility of spillover from the conflict into civilian infrastructure was a definite concern.

    “You can’t always control the third party or unintended consequences when malware and destructive code, such as wipers or ransomware, are used in offensive operations,” he said.

    “Because of the global interconnectedness of our software supply chain, these destructive attacks may propagate beyond intended targets, affecting global networks or multinational subsidiaries,” said Turgal. “For example, a cyber attack on a logistics company in Israel could unintentionally impact global shipping operations or foreign suppliers.

    “As both sides leverage state-aligned hacker groups, non-state actors may adopt similar tools or feel emboldened to launch their own campaigns globally,” he said. “This can increase attacks on soft targets like schools, hospitals or small businesses.”

    Based on the use of cyber-focused and kinetic military operations seen during the Ukraine war, Turgal said a similar scenario may now be in play in the Middle East, “with unimaginable unintended consequences” including attacks on Western critical infrastructure targets.

    Cyber a ‘reliable tool of retaliation’ for Iran

    Ariel Parnes, co-founder and chief operating officer of Mitiga, and a former colonel in Israel’s renowned cyber unit, told Computer Weekly that Iran knows full well the value of offensive cyber operations as a tool of warfare.

    “Over the past few years, Iran has used cyber as a reliable tool of retaliation, targeting hospitals, utilities and government systems across the US, Europe and the Middle East,” he said. “These operations aren’t random. They’re calculated, low-cost moves designed to create disruption, project power and signal intent.

    “Actors like APT34 and APT42, along with affiliated hacktivist fronts, go after both specific industries and the technologies they depend on,” said Parnes. “That includes energy, finance and healthcare sectors, and platforms like Microsoft 365, Google Workspace and cloud-native infrastructure. Their methods centre on credential theft, phishing and abusing misconfigurations – not flashy exploits, but persistent access.

    “In the wake of Operation Midnight Hammer, cyber retaliation should be expected,” he continued. “It is important to emphasise that in some cases, it may already be in motion: pre-positioned access waiting to be triggered, the so-called ‘red button’ play.

    “Organisations should act now,” said Parnes. “Raise awareness, tighten posture, improve detection, proactively hunt and exercise your response plans.”

    Iran’s ties to Russia

    Of additional concern to defenders should be the content of a January 2025 agreement signed between Moscow and Tehran, in which the Iranian government received commitments from the Russian regime to collaborate on cyber security matters.

    Although ostensibly this agreement stipulated that this collaboration would help counter cyber criminal activity, the Russian government has long permitted financially motivated cyber gangs to operate from its territory with impunity, and its use of aggressive cyber tactics against key infrastructure targets in Ukraine over the past three years should leave defenders in no doubt that this collaboration could extend to tactical support for Iranian-fronted attacks.

    At the same time, the security community is also concerned over the impact of cuts to America’s cyber security budget, especially at the keystone Cybersecurity and Infrastructure Security Agency (CISA), which has been threatened with cuts of $495m and may have to lay off up to 1,000 people.

    The prevailing belief is that in slimming down CISA, the US leaves itself and its allies at greater risk of being less effective in mounting a coordinated response to a major, multinational nation-state cyber attack.

    Read more on Hackers and cybercrime prevention


    • UK on high alert over Iranian spear phishing attacks, says NCSC

      By: Alex Scroxton


    • Iranian APT caught acting as access broker for ransomware crews

      By: Alex Scroxton


    • Iranian APT Peach Sandstorm teases new Tickler malware

      By: Alex Scroxton


    • U.S. agencies attribute Trump campaign hack to Iran

      By: Alexander Culafi

    BMI Calculator – Check your Body Mass Index for free!

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleIndustrial strategy: Takeaways for UK tech innovations
    Next Article Digital ID: cool or contentious?
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Trump closes the online shopping loophole that beat tariffs

    July 31, 2025

    Tapo DL100 review: A Wi-Fi smart lock for a whole lot less

    July 31, 2025

    This Alienware 4K OLED gaming monitor is over $400 off right now

    July 31, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 202533 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202532 Views

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202529 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202522 Views
    Don't Miss
    Technology July 31, 2025

    Trump closes the online shopping loophole that beat tariffs

    Trump closes the online shopping loophole that beat tariffs Image: Pixabay An executive order by…

    Tapo DL100 review: A Wi-Fi smart lock for a whole lot less

    This Alienware 4K OLED gaming monitor is over $400 off right now

    Asus ROG Xbox Ally releases August with high price, according to leaks

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Trump closes the online shopping loophole that beat tariffs

    July 31, 20252 Views

    Tapo DL100 review: A Wi-Fi smart lock for a whole lot less

    July 31, 20252 Views

    This Alienware 4K OLED gaming monitor is over $400 off right now

    July 31, 20252 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.