Wiper Malware Attacks by Iranian Threat Actors on the Rise According to DHS

by | Jun 26, 2019

The Director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has released a warning after a rise in cyberattacks by ‘Iranian regime actors.’

The warning from Christopher C. Krebs came as tensions are mounting between the United States and Iran. Iran has been accused of planting magnetic mines to impact commercial shipping vessels negatively and a U.S. surveillance drone was shot as it flew over the Strait of Hormuz. Iran claims the drone was in its territory.

The U.S. reacted with a planned air strike, although it was cancelled off by President Trump due to the likely loss of life. However, a strike did occur in cyberspace. The U.S. Cyber Command has reportedly initiated an attack on an Iranian spying group, Islamic Revolutionary Guard Corps, that is thought to have been involved in the mine laying operation. According to a recent report in the Washington Post, the cyberattacks disabled the command and control system that was used to fire missiles and rockets.

Iranian threat actors have also been very active. There have been rising numbers of cyberattacks on United States industries and government agencies.

While cyberattacks can come in many shapes, Iranian threat actors have increased attacks using wiper malware. In addition to illegally taking data and money, the threat actors use the malware to wipe systems clean and take down entire networks.

Iran is one of three countries rated by the United States as having very capable threat actors involved in economic espionage and theft of trade secrets and proprietary data. Iranian hackers are more than capable of carrying out devastating cyberattacks. Iranian hackers were behind the SamSam ransomware attacks on healthcare orgaizations in the United States.

Wiper malware can be used to devastating effect such as the cyberattack on the Saudi Arabian oil firm Saudi Aramco in 2012. Shamoon wiper malware erased tens of thousands of computers. The financial damage caused by these wiper attacks is significant. In 2017, attacks using NotPetya wiper malware resulted in global financial losses of between $4 billion and $8 billion. The attack on the shipping firm Maersk lead to financial losses of around $300 million. Wiper malware attacks are also regular. According to a recent report by Carbon Black, 45% of healthcare CISOs have suffered a wiper malware attack in the past year.

The hackers may be highly capable, but they still use basic techniques and target common weaknesses to obtain access to networks. These include phishing and spear phishing, social engineering, password spraying, and credential stuffing.

All of these attack methods can be prevented with basic cybersecurity measures such as enforcing the use of strong passwords, changing all default passwords, rate limiting on logins, applying the rule of least privilege when setting permissions, putting in place multi-factor authentication, shutting down unused ports, disabling RDP, quick patching,  adopting a robust backup strategy, and giving security awareness training to employees.

Krebs released an alert that all U.S industries, government agencies, and businesses should be alert to the danger of cyberattacks. He stated: “If you suspect an incident, take it seriously and act quickly,” .

Raise the level of HIPAA Awareness in your organization with Learner-Friendly, Comprehensive and Affordable HIPAA Training.


Please enable JavaScript in your browser to complete this form.

Patrick Kennedy

Patrick Kennedy is a highly accomplished journalist and editor with nearly two decades of experience in the field. With expertise in writing and editing content, Patrick has made significant contributions to various publications and organizations. Over the course of his career, Patrick has successfully managed teams of writers, overseeing the production of high-quality content and ensuring its adherence to professional standards. His exceptional leadership skills, combined with his deep understanding of journalistic principles, have allowed him to create cohesive and engaging narratives that resonate with readers. A notable area of specialization for Patrick lies in compliance, particularly in relation to HIPAA (Health Insurance Portability and Accountability Act). He has authored numerous articles delving into the complexities of compliance and its implications for various industries. Patrick's comprehensive understanding of HIPAA regulations has positioned him as a go-to expert, sought after for his insights and expertise in this field. Patrick's bachelors degree is from the University of Limerick and his master's degree in journalism is from Dublin City University. You can contact Patrick through his LinkedIn profile:

Raise the level of HIPAA Awareness in your organization with Learner-Friendly, Comprehensive and Affordable HIPAA Training.

Comprehensive HIPAA Training

Used in 1000+ Healthcare Organizations and 100+ Universities

    Full Course - Immediate Access

    Privacy Policy