Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

US agencies warn of an increase in Iran’s cyberattacks on defense, OT networks and critical infrastructure

Mexican drug cartel hackers spy on FBI officials’ phones to track and kill informants, the report says

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » US agencies warn of an increase in Iran’s cyberattacks on defense, OT networks and critical infrastructure
Identity

US agencies warn of an increase in Iran’s cyberattacks on defense, OT networks and critical infrastructure

userBy userJune 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 30, 2025Ravi LakshmananCyber ​​Attacks/Critical Infrastructure

Iran's cyberattacks on defense, OT network

The US Cybersecurity and Intelligence Agency has issued a joint advisory warning of potential cyberattacks from Iranian state-sponsored or affiliated threat actors.

“Over the past few months, there has been an increase in activity from actors related to Hattivists and the Iranian government, which is expected to escalate due to recent events,” the agency said.

“These cyber actors often exploit the targets of opportunity based on their use of less than or outdated software, accompanied by the use of default or common passwords on internet-connected accounts and devices, with known common vulnerabilities and exposures.”

Currently, there is no evidence of a collaborative campaign of malicious cyber activity caused by Iran, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Defense Cybercrime Center (DC3), and the National Security Agency (NSA).

Emphasizing the need for a “increased vigilance,” the agency has selected Defense Industry Infrastructure (DIB) companies, particularly those with ties to Israeli research and defense companies, as an increase in risk. They added that US and Israeli entities could also be exposed to distributed denial of service (DDOS) attacks and ransomware campaigns.

Attackers often start with reconnaissance tools like Shodan to find vulnerable internet-facing devices, particularly in industrial control systems (ICS) environments. Once inside, they can exploit weak segmentation or misunderstood firewalls to move sideways across the network. Iranian groups have previously escalated access using remote access tools (rats), keyloggers, and even legal management utilities such as PSEXEC and Mimikatz.

Based on previous campaigns, attacks attached by Iranian threat actors leverage techniques such as automated password guessing, password hash cracking, and default manufacturer passwords to access devices exposed to the internet. It has also been found to violate operational technology (OT) networks by employing system engineering and diagnostic tools.

Cybersecurity

The development comes days after the Department of Homeland Security (DHS) issued its breaking news, urging US organizations to monitor “low-level cyberattacks” by Iranian hacktivists amid ongoing geopolitical tensions between Iran and Israel.

Last week, Check Point revealed that Iranian nation-state hacking group, tracked as APT35 target journalist, well-known cybersecurity expert and Israeli computer science professor, was tracked as part of a spear phishing campaign designed to use the Bogus Gmail login page or Google Meet Invitations to earn a Google account qualification.

As a mitigation, organizations are advised to follow the steps below –

It can identify and disconnect OT and ICS assets from the public internet, protect your devices and accounts with strong, unique passwords, replace weak or default passwords, and enforce multi-factor authentication (MFA). Improper changes, loss of vision, or loss of control adopt full system and data backup to promote recovery

For organizations wondering where to start, the real approach is to first look at the external attack surface. It’s which systems are public, which ports are open, and whether outdated services are still running. Tools such as CISA’s Cyber ​​Hygiene Program and open source scanners such as NMAP can help attackers identify risks before they take place. By adjusting your defenses to the Miter ATT & CK framework, it is easier to prioritize protection based on the actual tactics used by threat actors.

“Despite the ceasefire and continued negotiations for a permanent solution, Iran-related cyber actors and groups of hattivists may still engage in malicious cyber activities,” the agency said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMexican drug cartel hackers spy on FBI officials’ phones to track and kill informants, the report says
Next Article Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World
user
  • Website

Related Posts

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

June 30, 2025

Europol will dismantle a $540 million cryptocurrency fraud network and arrest five suspects

June 30, 2025

Blind Eagle uses Proton 66 hosting for fishing and rat deployment at the Bank of Columbia

June 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

US agencies warn of an increase in Iran’s cyberattacks on defense, OT networks and critical infrastructure

Mexican drug cartel hackers spy on FBI officials’ phones to track and kill informants, the report says

Europol will dismantle a $540 million cryptocurrency fraud network and arrest five suspects

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.