Baltimore Sun

US answers Iran drone downing with cyberattac­k on military systems

Sources say strike crippled computers for country’s rocket, missile launchers

- By Tami Abdollah

WASHINGTON — U.S. military cyber forces launched a strike against Iranian military computer systems on Thursday as President Donald Trump backed away from plans for a more convention­al military strike in response to Iran’s downing of a U.S. surveillan­ce drone, U.S. officials said Saturday.

Two officials told The Associated Press that the strikes were conducted with approval from Trump. A third official confirmed the broad outlines of the strike. All spoke on condition of anonymity because they were not authorized to speak publicly about the operation.

The cyberattac­ks disabled Iranian computer systems that controlled its rocket and missile launchers, the officials said. Two of the officials said the attacks, which specifical­ly targeted Iran’s Islamic Revolution­ary Guard Corps computer system, were provided as options after Iranian forces attacked two tankers earlier this month.

The IRGC, which was designated a foreign terrorist group by the Trump administra­tion earlier this year, is a branch of the Iranian military.

The action by U.S. Cyber Command was a demonstrat­ion of the U.S.’s increasing­ly mature cyber military capabiliti­es and its more aggressive cyber strategy under the Trump administra­tion. Over the last year U.S. officials have focused on persistent­ly engaging with adversarie­s in cyberspace and undertakin­g more offensive operations.

There was no immediate reaction Sunday in Iran to the U.S. claims. Iran has hardened and disconnect­ed much of its infrastruc­ture from the internet after the Stuxnet computer virus, widely believed to be a joint U.S.-Israeli creation, damaged 1,000 of Iranian nuclear centrifuge­s in 2009-10.

The cyberattac­ks are the latest chapter in the U.S. and Iran’s ongoing cyber operations targeting the other. Yahoo News first reported the cyber strike.

In recent weeks, hackers believed to be working for the Iranian government have targeted U.S. government agencies, as well as sectors of the economy, including finance, oil and gas, sending waves of

spear-phishing emails, according to representa­tives of cybersecur­ity companies CrowdStrik­e and FireEye, which regularly track such activity. This new campaign appears to have started shortly after the Trump administra­tion imposed sanctions on the Iranian petrochemi­cal sector this month.

It was not known if any of the hackers managed to gain access to the targeted networks with the emails, which typically mimic legitimate emails but contain malicious software.

Tensions have run high between the two countries since the U.S. withdrew from the 2015 nuclear deal with Iran last year and began a policy of “maximum pressure.”

“Both sides are desperate to know what the other side is thinking,” said John Hultquist, director of intelligen­ce analysis at FireEye. “You can absolutely expect the regime to be leveraging every tool they have available to reduce the uncertaint­y about what’s going to happen next, about what the U.S.’s next move will be.”

CrowdStrik­e shared images of the spear-phishing emails with the AP.

One such email that was confirmed by FireEye appeared to come from the Executive Office of the President and seemed to be trying to recruit people for an economic adviser position. Another email was more generic and appeared to include details on updating Microsoft Outlook’s global address book.

The Iranian actor involved in the cyberattac­k, dubbed “Refined Kitten” by CrowdStrik­e, has for years targeted the U.S. energy and defense sectors, as well as allies such as Saudi Arabia and the United Arab Emirates, said Adam Meyers, vice president of intelligen­ce at CrowdStrik­e.

Iran has long targeted the U.S. oil and gas sectors and other critical infrastruc­ture, but those efforts dropped significan­tly after the nuclear agreement was signed.

After Trump withdrew the U.S. from the deal in May 2018, cyber experts said they have seen an increase in Iranian hacking efforts.

“This is not a remote war (anymore),” said Sergio Caltagiron­e, vice president of threat intelligen­ce at Dragos Inc. “This is one where Iranians could quote unquote bring the war home to the United States.”

Caltagiron­e said as nations increase their abilities to engage offensivel­y in cyberspace, the ability of the United States to pick a fight internatio­nally and have that fight stay out of the United States physically is increasing­ly reduced.

The Defense Department refused to comment on the latest Iranian activity.

 ?? GREGORY BULL/AP 2017 ?? In recent weeks, hackers thought to be working for the Iranian government targeted U.S. government agencies as well as sectors of the economy, including oil and gas industries.
GREGORY BULL/AP 2017 In recent weeks, hackers thought to be working for the Iranian government targeted U.S. government agencies as well as sectors of the economy, including oil and gas industries.

Newspapers in English

Newspapers from United States