Critical Infrastructure Security
Cyber lessons from the recent escalation of tensions in the Middle East

(Adobe Stock)
COMMENTARY: Today, we face a crisis with Iran around its nuclear capabilities. But in the wake of this uncertain phase we’re now in, it’s also important to remember that Iran’s cyber capabilities have become a central pillar of its warfare strategy, designed to compensate for its conventional military limitations and expand its regional influence.Following the Stuxnet attack in 2010, which exposed vulnerabilities in its nuclear infrastructure, Iran launched a concerted effort to build cyber power. It established entities like the Supreme Council on Cyberspace and the Cyber Defense Command and began cultivating state-sponsored groups such as APT33, APT34, APT35, and APT42.[SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Read more Perspectives here.]These collectives carry out not just traditional espionage activities, but also sabotage and disinformation operations targeting the U.S., Israel, and their allies in sectors such as finance, healthcare, energy, and water. Iranian-linked cyber operations have evolved from website defacements and DDoS attacks to ransomware campaigns and attempted physical sabotage. Notable examples include Operation Ababil’s disruption of U.S. banks (2011–2013), the Shamoon malware attacks on Saudi Aramco, attempts to poison Israeli water supplies in 2020, and the 2021 intrusion targeting Boston Children’s Hospital.Iran’s cyber strategy often blends ideological motives with real-world disruption and psychological warfare. Google’s Threat Intelligence Group has linked Iranian actors to 80% of all state-backed phishing campaigns against Israel in the lead-up to the October 7, 2023, Hamas attack, along with ransomware and “hack-and-leak” campaigns designed to erode public trust.Raise awareness: Ensure leadership and staff understand the nature and intent of Iranian cyber operations. Tighten posture: Review and patch known vulnerabilities, especially in VPNs, industrial control systems, and remote access protocols. Improve detection: Ensure up-to-date detection and monitoring capabilities that align with TTPs frequently used by Iranian threat actors. Proactively hunt: Conduct threat hunts focused to uncover potential dormant access to networks and environments. Exercise response plans: Rehearse real-world cyberattack scenarios involving critical infrastructure to test readiness and coordination. Collaborate actively: Encourage real-time information sharing across industry peers and with government agencies and ISACs to improve early warning, response, and resilience. The red button may already be wired into many of our environments - make sure that if it’s ever pushed, nothing happens.Ariel Parnes, co-founder and COO, MitigaSC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds