The U.S. government has warned that hackers linked to Iran may target U.S. companies and critical infrastructure operators, especially defense organizations that have collaborations or relationships with Israeli research and defense companies.
According to Reuters, the FBI, the National Security Agency, the Department of Defense Cyber Crime Center (DC3), and the Department of Homeland Security's civilian cybersecurity defense division stated in a statement released on Monday (June 30) that although there is currently no indication of Iranian-related malicious cyber activities, agencies should ensure their defense systems are up to date.
The report stated: "Although Israel and Iran have announced a ceasefire and are continuing negotiations to reach a permanent solution, Iranian-linked cyber actors and hacker groups may still carry out malicious cyber activities." These federal agencies said that Iranian government-backed hackers would exploit existing vulnerabilities in unpatched or outdated software, infiltrate networked accounts and devices using default or weak passwords, and collaborate with ransomware operators to encrypt, steal, and leak sensitive information.
Since Israel launched an offensive against Iran on June 13 and the U.S. attacked Iran's nuclear facilities on June 22, Israeli and U.S. cybersecurity researchers and defenders have so far found little significant cyber activity linked to Iran. Shortly after the large-scale Hamas attack on southern Israel in October 2023, the U.S. government stated that hackers affiliated with Iran's Islamic Revolutionary Guard Corps had hacked equipment in water and wastewater treatment systems across multiple states. These attacks targeted a device manufactured in Israel.
Original article: https://www.toutiao.com/article/1836398614216778/
Statement: This article represents the views of the author alone.