Protecting Your Network from Potential Iranian Cyber Attacks

The Cybersecurity and Infrastructure Security Agency has released a warning resulting from heightened tensions between the United States and Iran. Surprisingly, Iranian cyber attacks against the United States are nothing new.

2011 through mid-2013: Using Distributed Denial of Service (DDoS), bad actors blocked bank customers from accessing their accounts, costing financial institutions millions. 

2013: Over the summer of 2013, a cybercriminal hacked the data of the Bowman Dam in New York and gained access to the dam’s operational status. It’s commonly thought that the breach was in preparation for a larger terrorist attack that would have involved flooding the region. 

2014: The famous Sands corporation in Las Vegas was breached, resulting in stolen customer information including financial and personal details.  The hacker wiped corporate computer systems as well. 

2013-2017: Multiple attacks on educational institutions occurred over the course of a four-year period. Hackers stole email credentials, personal information, and intellectual data from numerous educational facilities across the globe, multiple private sector companies, many US and state government institutions, and the children’s charity, UNICEF. 

The IRGC, Iranian Revolutionary Guard Corps, was behind each of these attacks and the CISA warns there could be more targeted Iranian cyberattacks in America’s future. 

What Methods are Commonly Used in Iranian Cyber Attacks? 

Iranian cybercriminals have constantly evolved their attacks over time. The scope of their activities can range from DDoS and identity theft to the spread of malware. It is also suspected that the IRGC can create deadly cyber-kinetic attacks by exploiting weaknesses in existing systems, such as might have happened in the Bowman Dam incident. 

Some of the common methods used in Iranian cyberattacks include: 

  • Malware 
  • Spearphishing 
  • Powershell and scripting attacks 
  • Credential hacking 
  • Hidden or hacked files 
  • Data compression 
  • File copying 
  • Registry run keys and startup folder tampering 

Frequently, users unknowingly click on a link or attachment that enables the attack. Hackers also search for weaknesses in security, such as uncovering passwords or unprotected data. 

Why Would the IRCG Target My Business? 

Iranian cyber attacks can affect any business at any time. As proven during the four years spanning 2013-2017, the industry isn’t important: it’s the fallout from the attack that matters. 

It’s vitally important that you make sure your protections are up to date and your security strategy is in place. This includes anti-malware, employee cyber awareness training, backup and recovery systems, and monitoring. 

Protecting Your Network from Potential Iranian Cyber Attacks 

The fundamentals of cyber security always stay the same, no matter the nature or origin of a potential attack.  

1. Be Ready for a Possible Cyber Attack 

Make sure your network is ready for Iranian cyber attacks by ensuring that all anti-malware protections are patched and updated, all hardware is secure, and data encryption is in use whenever possible.  

Employees should be aware of the potential for breaches in emails and unprotected devices. Since your employees are on the frontline of your security strategy, your entire workforce needs to have cybersecurity awareness training by a professional team of IT specialists. 

2.  Have a Response Plan 

Your organization needs to have clear plans to address a cyber threat in real-time. Make sure your staff knows who to notify and what to do to lessen the damage if suspicious activity is detected.  These topics will be part of your cybersecurity awareness training classes. 

3.  Enhance Monitoring Activities 

Look at your records and logs to see if there are any unnecessary ports and protocols that can be terminated.  Find any potential weakness in your security, such as unprotected devices or vulnerabilities in external facing equipment and patch them.  

4.  Test Back-Up and Recovery Plans 

Your back-up and recovery plans are only good if they actually work during a cyber attack. Make sure you test your business continuity plan to ensure it will be fully functional when it’s needed. 

Iconic IT is Ready to Protect Your Business 

From cyber security awareness training to business continuity plans and every step in between, Iconic IT is ready to help your business stand strong in the face of cyber threats. We provide complete security packages for small to medium sized business, personalized for your needs and budget. 

It’s more important than ever to make sure your business is secure, especially considering the warning from the CISA about an increasing threat of Iranian cyber attacks. 

Contact Iconic IT for a free, no obligation consultation today to see how we can help keep your business up and running, safely and smoothly, no matter what. 



7 Reasons You Need a Small Business Cybersecurity Risk Assessment

When your network is running smoothly, you never really think much about it. Technology in-sync feels as natural as breathing. One small glitch, however, and […]

Read Post

Keeping Data Safe with A Remote Workforce

If you employ a remote workforce, you are not alone. Currently, remote workers make up 16% of the national workforce. That’s 26 […]

Read Post

Mergers and Acquisitions: Changing Your IT Strategy to Meet your Growing Needs

Mergers and acquisitions (M&A) are exciting ways to grow your business’ reach, scope and profit margins. It’s a very common undertaking in the […]

Read Post