The U.S. Department of Homeland Security has issued a warning about the possibility of cyber attacks from Iran in the wake of the killing of the top Iranian military commander Qassem Soleimani. 

Tensions have escalated with Iran following the U.S. airstrike that left Soleimani dead last week, including with U.S. officials who criticized the decision to kill the Iranian leader. 

In response, the DHS has advised organizations to be ready to defend against potential cyber-attacks launched by Iran. Christopher Krebs, Director of the DHS Cybersecurity and Infrastructure Security Agency (CISA), claims that it's "time to brush up on Iranian TTPs and pay close attention to your critical systems, particularly ICS". He also warns organizations to pay close attention to third part accesses. 

On Saturday, the DHS issued a new National Terrorism Advisory Systems bulletin, which describes current developments and general terrorist threats and trends. 

There's been no details released on any specific threats to look out for, but the DHS has warned that Iran is fully capable of carrying out attacks on the U.S. which could have temporary disruptive effects against critical infrastructure. 

A group of hackers alleging to be from Iran breached the website of the U.S. Federal Depository Library Program over the weekend in response to Soleimani's death, replacing the website with a page titled "Iranian Hackers!" and displaying images of Ayatollah Ali Khamenei and the Iranian flag.

The attack did not appear to be sophisticated though. It's been reported that the website is powered by Joomla and the hackers most likely exploited a known vulnerability in one of its components. 

Implementing real-time Host Intrusion Detection technology is the only way to ensure that systems remain secure at all times, and should an attack be successful, at least your organization will be notified in real-time to act as quickly as possible and minimize the potential impact. 

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.