Tuesday, March 1, 2022

Israel & Iran cyberwar spills over to impact civilian lives

 cyberwar broke out between Israel and Iran, beginning April 2020. It is now threatening to affect the lives of civilians in these two countries, besides in the US and other nations. Before the situation gets out of hand, let’s see how it can be mitigated and brought under control.

How cyberwars began affecting civilian lives

It all began in April 2020 when an Israeli water pumping station’s systems were compromised as a result of a cyberattack, leading to the breakdown of individual pumps. The source of this attack was traced to Iran. In what was said to be an act of retaliation, weeks after this incident, Israel-based hackers attacked a port in Iran, giving rise to the first-ever state-sponsored cyber war, wired.com quotes Lotem Finkelstein, a director of Check Point, an Israeli cybersecurity company, as saying.

This was the flashpoint for a new trend of cyber warfare where infrastructure was targeted, disrupting the daily lives of millions of people in these two Middle Eastern nations. It intensified further this year when a team of hackers, belonging to Black Shadow, allegedly backed by Iran, made public intimate details of around a million users of the widely used Israeli LGBTQ app, Atraf, according to France24.com. Meanwhile, on October 26, 201, Iran’s 4,300 gas stations were affected due to a reported cyberattack. The Asian nation blamed the US and Israel for this violation.  

Earlier, on July 9 and 10, 2021, cybercriminals reportedly interrupted Iranian train services by posting bogus delay announcements on digital billboards that read “Long delays due to cyber attacks. More information: 64411.” The phone number is said to be of the office of Ayatollah Ali Khamenei, the Iranian supreme leader.

The hack attacks targeted Iranian infrastructure across the board, taking into consideration the targets. They reportedly were carried out by actors, with the apparent backing of certain nations, as well as by nonaligned and loose cyber attacking units. The intent has, however, been unequivocally the same, causing turmoil and disorder that adversely impacted the ordinary citizens and business houses in this dysfunctional and autocratic Islamic nation.

Hack attacks affect the US and Australia

On the other hand, the United States has also been bearing the brunt of cyberattacks. It warned Iran for attempting to hack the computers of the world’s richest nation’s crucial infrastructure networks, including hospitals and voter registration systems.   

Stating that diplomacy has been better between nations in the Middle East, Esfandyar Batmanghelidj, a visiting fellow at the European Council on Foreign Relations think tank, is of the view that different nations are showcasing their capabilities in an attempt to create a new kind of power balance in this region.

But Iranian cybercriminals are said to be involved in nefarious activities in various Western nations. The IT security officials of the US, the UK, and Australia, on November 17, stated that state-backed hackers have upped their activities against healthcare and transport organizations in the US and Australia since March 2021.

What measures should the governments take to protect their cyberspaces?

Before things spiral out of control for all the people who are at the risk of getting affected, it is incumbent that Western countries, like the US and the UK, should act sagaciously and save the world from further misery. They should have in place regulations by engaging with non-state actors and taking forward with all earnest diplomatic proposals with Iran.

The need of the hour for the governments is to equip themselves with strong cybersecurity defense systems so that they can continue to deliver essential services to their citizens round-the-clock seamlessly. These mechanisms will ensure that cybercriminals, wherever they are operating from, are given no iota of a chance to target technology that supports the delivery of such services.

They could begin by deploying penetration testing services, armed with the advanced tools and technologies, that circumvent the security of the corporate networks having state-of-the-art security controls. These should be in line with industry standards and must be able to comply with several regulatory requirements including PCI DSS 11.3. Penetration testing of such types will be then in a position to detect threats, which hold certain IT systems and applications to ransom, that allow hackers to access confidential information.