By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Widening Middle Eastern war increases cyber risk | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Widening Middle Eastern war increases cyber risk | Computer Weekly
News

Widening Middle Eastern war increases cyber risk | Computer Weekly

News Room
Last updated: 2025/06/23 at 2:53 PM
News Room Published 23 June 2025
Share
SHARE

With the United States entering a widening Middle Eastern conflict following a series airstrikes of airstrikes against nuclear targets in Iran over the weekend, organisations across Europe and North America should be on high alert for the possibility of cyber attacks conducted by threat actors backed by or supportive of Iran.

Iranian threat actors have been highly engaged in attacking Israeli targets since the 7 October 2023 Hamas attacks, but in a series of warnings over the past 48 hours, government officials and cyber experts said that the likelihood of disruptive cyber attacks hitting US and allied targets, including in the UK, where the government has issued statements in support of president Trump’s airstrikes, has increased.

In a bulletin issued on Sunday 22 June via its National Terrorism Advisory System (NTAS), the US Department for Homeland Security said the ongoing Iran conflict was likely to cause an uptick in “low-level” cyber attacks against US networks by pro-Iranian hacktivists, while state-backed operators may also become increasingly active.

“Both hacktivists and Iranian government-affiliated actors routinely target poorly secured US networks and internet-connected devices for disruptive cyber attacks,” the alert said.

The alert also acknowledged that targets perceived to be Jewish, pro-Israel, or linked to the US government or military could be particularly at risk of cyber actions. The alert also warned of the possibility of attacks on critics of the Iranian regime.

“Iran already targets the US with cyber espionage which they use to directly and indirectly gather geopolitical insight and surveil persons of interest,” said John Hultquist, chief analyst at the Google Threat Intelligence Group.

“Persons and individuals associated with Iran policy are frequently targeted through organisational and personal accounts and should be on the lookout for social engineering schemes. Individuals are also targeted indirectly by Iranian cyber espionage against telecoms, airlines, hospitality, and other organisations who have data that can be used to identify and track persons of interest.”

Hultquist added: “Iran has had mixed results with disruptive cyber attacks and they frequently fabricate and exaggerate their effects in an effort to boost their psychological impact.

“We should be careful not to overestimate these incidents and inadvertently assist the actors. The impacts may still be very serious for individual enterprises, which can prepare by taking many of the same steps they would to prevent ransomware.”

James Turgal, vice president of global cyber risk and board relations at Optiv – who also spent over 20 years in law enforcement at the FBI – said the possibility of spillover from the conflict into civilian infrastructure was a definite concern.

“You can’t always control the third party or unintended consequences when malware and destructive code, such as wipers or ransomware, are used in offensive operations,” he explained.

“Because of the global interconnectedness of our software supply chain, these destructive attacks may propagate beyond intended targets, affecting global networks or multinational subsidiaries. For example, a cyber attack on a logistics company in Israel could unintentionally impact global shipping operations or foreign suppliers.

Turgal added: “As both sides leverage state-aligned hacker groups, non-state actors may adopt similar tools or feel emboldened to launch their own campaigns globally. This can increase attacks on soft targets like schools, hospitals or small businesses.”

Based on the use of cyber-focused and kinetic military operations seen during the Ukraine war, Turgal said that a similar scenario may now be in play in the Middle East, “with unimaginable unintended consequences” including attacks on Western critical infrastructure targets.

Cyber a “reliable tool of retaliation” for Iran

Ariel Parnes, co-founder and chief operating officer of Mitiga, and a former colonel in Israel’s renowned cyber unit, told Computer Weekly that Iran knows full well the value of offensive cyber operations as a tool of warfare.

“Over the past few years, Iran has used cyber as a reliable tool of retaliation, targeting hospitals, utilities, and government systems across the US, Europe, and the Middle East. These operations aren’t random. They’re calculated, low-cost moves designed to create disruption, project power, and signal intent,” he said.

“Actors like APT34 and APT42, along with affiliated hacktivist fronts, go after both specific industries and the technologies they depend on. That includes energy, finance, and healthcare sectors, and platforms like Microsoft 365, Google Workspace, and cloud-native infrastructure. Their methods center on credential theft, phishing, and abusing misconfigurations – not flashy exploits, but persistent access.”

Parnes added: “In the wake of Operation Midnight Hammer, cyber retaliation should be expected. It is important to emphasise that in some cases, it may already be in motion: pre-positioned access waiting to be triggered, the so-called ‘red button’ play.

“Organisations should act now,” he said. “Raise awareness, tighten posture, improve detection, proactively hunt and exercise your response plans.”

Iran’s ties to Russia

Of additional concern to defenders should be the content of a January 2025 agreement signed between Moscow and Tehran, in which the Iranian government received commitments from the Russian regime to collaborate on cyber security matters.

Although ostensibly this agreement stipulated that this collaboration would help counter cyber criminal activity, the Russian government has long permitted financially-motivated cyber gangs to operate from its territory with impunity and its use of aggressive cyber tactics against key infrastructure targets in Ukraine over the past three years should leave defenders in no doubt that this collaboration could extend to tactical support for Iranian-fronted attacks.

At the same time, the security community is also concerned over the impact of cuts to America’s cyber security budget, especially at the keystone Cybersecurity and Infrastructure Security Agency (CISA) which has been threatened with cuts of $495m and may have to lay off up to 1,000 people.

The prevailing belief is that in slimming down CISA, the US leaves itself and its allies at greater risk of being less effective in mounting a coordinated response to a major, multinational nation-state cyber attack.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article TRX Rallies, SHIB Enhances Its Network, While BlockDAG Crosses $309.5M and Attracts Over 2 Million Users
Next Article Know Your Product: A Practical Guide to Functional Decomposition | HackerNoon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

My TV deal of the week — this massive 85-inch Hisense Mini-LED TV is over $1,000 off
News
I Tested 100+ Pickleball Paddles to Select the Best at Every Level
Gadget
The best colors we’ve seen on Google Pixel phones
News
How to Build an AI Agent with ChatGPT for Custom Solutions
Computing

You Might also Like

News

My TV deal of the week — this massive 85-inch Hisense Mini-LED TV is over $1,000 off

3 Min Read
News

The best colors we’ve seen on Google Pixel phones

6 Min Read
News

At $150 off, the Moto G Stylus 5G (2024) is the stylus-powered phone to get on a budget

3 Min Read
News

90 Day Fiance’s Darcey underwent ‘cat-eye lift, buccal fat removal & nose job’

7 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?