US cyber attack said to have disabled Iran’s ability to target oil tankers

There’s always the problem of revealing your hand when you launch a cyber attack. It’s a matter of debate wether this was a good use of the US’s arsenal of cyber weapons. Also, watch out for Iran’s response…:

[…] The US launched the strike in July after Iran shot down an American drone.

US President Donald Trump had called off a military strike 10 minutes it was to be carried out after being told some 150 people could die.

“I didn’t think it was proportionate,” he said in an interview at the time with NBC News’ Meet the Press.

Illustrative: Head of the Revolutionary Guard’s aerospace division Brig. Gen. Amir Ali Hajizadeh looks at debris from what the division describes as the US drone which was shot down by Iran, seen here in Tehran, Iran, June 21, 2019. (Meghdad Madadi/Tasnim News Agency/via AP)

Instead, the US carried out a cyber attack, part of a long-running cyber war between the US and Iran.

The Stuxnet virus, discovered in 2010, is believed to have been engineered by Israel and the US to damage nuclear facilities in Iran. And Tehran is believed to have stepped up its own cyber capabilities in the face of US efforts to isolate the Islamic Republic.

The report said that though the effects of the most recent operation were designed to be temporary, they have lasted longer than expected and Iran is still trying to repair critical communications systems and has not recovered the data lost in the attack, officials said.

However, some US officials were critical of the cyber attack, saying that in carrying it out, the US had lost access to the Revolutionary Guard’s network and exposed some of its capabilities.

The New York Times also said earlier reports that the hack targeted Iran’s ability to launch missiles was incorrect.

The report said Iran has yet to respond to the cyber attack.


Original article here