Home News US Air Force strikes on Iranian Military computer systems

US Air Force strikes on Iranian Military computer systems


The Military cyber forces of the United States launched a cyber-attack against Iranian Military computer systems in response to Iran’s shootdown of $240 million worth U.S. surveillance drone. The attack was performed with the approval from the President Donald Trump.

The attack was targeted on the Iranian military computers that used to control the entire Iran missile operations. According to the Islamic Revolutionary Guard Corps, the drone was taken down when it entered Iran’s airspace near the Kouhmobarak district in the south of Hormuz.

“The downing of the American drone was a clear message to America … our borders are Iran’s red line and we will react strongly against any aggression … Iran is not seeking war with any country, but we are fully prepared to defend Iran,” the Revolutionary Guard commander, Hossein Salami, said in a media statement.

However, the U.S. Air Force denied Iran’s argument. “This was an unprovoked attack on a U.S. surveillance asset that had not violated Iranian airspace at any time during its mission,” said General Joseph Guastella. “This attack is an attempt to disrupt our ability to monitor the area following recent threats to international shipping and the free flow of commerce. The aircraft was over the Strait of Hormuz and fell into international waters.”

Recently, the cybersecurity research firm FireEye claimed that an undetected hackers’ group from Iran is allegedly stealing travel and mobile data of individuals in the Middle East region. According to FireEye, the Iranian group dubbed APT39 has targeted a number of people in the Middle East, especially in the Gulf region. It’s believed that the espionage group is allegedly providing information to the Iranian government. The researchers at FireEye stated that they had been tracking APT39 activities since 2014 to protect organizations from cyber incidents.

The researchers said the group uses phishing emails that target specific people and include malicious attachments or links resulting in a POWBAT infection. FireEye also observed that the group uses Persian language words in encrypting data. APT39’s activities are reportedly focussed on the telecommunications sector, the travel, and IT industry, and allegedly represent Iran’s potential global operational reach and how it collects key data.