Iran’s Hacker Hierarchy Exposed: The Islamic Republic of Iran Makes Maximum Use of Contractors and Universities to Conduct Cyber Operations

On 9 May Levi Gundert, Sanil Chohan, and Greg Lesnewich of Recorded Future provided a detailed assessment on the nature of the cyber threat from Iran titled: Iran’s Hacker Hierarchy Exposed. This report was widely cited in the press and immediately raised the bar for quality in strategic cyber threat intelligence (I saw several other reports from other sources but none held a candle to this one).

You should review the report so you can judge the quality yourself, but here are a few reasons I liked it:

  1. It was not based on a single source (I hate it when analysts try to assess something based only on what is seen in forensic data). This report was based on multiple relevant sources that went far beyond just technical data. Sources also included interviews with trusted people with unique access.
  2. The report provided historical context. History does not always predict the future, but it is important context. Previous research by other firms in the ecosystem, as well as the FBI, is also cited.
  3. It is informed by cultural dynamics best provided by experienced analysts who know their material.
  4. The report provides actionable warnings with justification for the warnings.

Some of the key insights:

  1. There have been times when Iran has abandoned caution. We may be in a similar situation now.
  2. In the past this has resulted in problems controlling the scope and scale of destructive attacks.
  3. There are over 50 estimated contractors vying for Iranian government offensive cyber projects.
  4. Targets in the U.S. may include a wide range of organizations, including banks, financial services, government departments, critical infrastructure providers and oil and energy.

That is just a brief summary. I most strongly encourage you to read the entire report at: Iran’s Hacker Hierarchy Exposed.

Now, what do you do about this threat?

You need to understand that no one is coming to save you. You need to take steps to raise your defenses now, at work and at home. There are things you can do to make it much harder for adversaries to have their way with you. Every company is different, but we have a list of best practices in cybersecurity that we most strongly recommend you review. There is almost certainly some low cost configuration changes you can put in place right now to improve your defenses. Review them at Crucial Point Cybersecurity Best Practices.

And, if you are not on distribution yet, be sure to sign up for our Cyberwar and Cybersecurity Weekly for continued strategic context.

Connect Here

Bob Gourley

Founder and CTO at Crucial Point LLC
Bob Gourley is the founder and CTO of Crucial Point LLC where he leads technology due diligence consulting. He is the publisher of CTOvision.com and ThreatBrief.com. Bob's background is as an all source intelligence analyst and an enterprise CTO. Find him on Twitter at @BobGourley
Connect Here

Leave a Reply