A cyber attack in Iran still left petrol stations across the state crippled, disrupting gas income and defacing electronic billboards to show messages demanding the regime’s capacity to distribute gasoline.
Posts and movies circulated on social media confirmed messages that mentioned, “Khamenei! In which is our fuel?” — a reference to the country’s supreme leader Ayatollah Ali Khamenei. Other signs read, “No cost gasoline in Jamaran gasoline station,” with fuel pumps exhibiting the phrases “cyberattack 64411” when trying to purchase fuel, semi-official Iranian Students’ Information Company (ISNA) information company reported.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
Abolhassan Firouzabadi, the head of Iran’s Supreme Cyberspace Council, said the attacks were being “almost certainly” point out-sponsored but additional it was too early to identify which region carried out the intrusions.
Although no country or team has so much claimed accountability for the incident, the attacks mark the next time electronic billboards have been altered to show related messaging.
In July 2021, Iranian Railways and the Ministry of Roads and City Growth techniques grew to become the topic of focused cyber attacks, exhibiting alerts about educate delays and cancellations and urging travellers to phone the phone number 64411 for even more facts. It’s truly worth noting that the phone number belongs to the office of Ali Khamenei that supposedly handles concerns about Islamic legislation.
The attacks involved the use of a never ever-ahead of-witnessed reusable knowledge-wiping malware called “Meteor.”
Cybersecurity company Check out Stage afterwards attributed the practice attack to a “regime opposition” threat actor that self-identifies as “Indra” — referring to the Hindu god of lightning, thunder, and war — and is believed to have ties to hacktivist and other cybercriminal teams, in addition to linking the malware to prior attacks targeting Syrian petroleum organizations in early 2020.
“Aiming to convey a cease to the horrors of [Quds Force] and its murderous proxies in the area,” the group’s official Twitter account bio reads.
“Although most attacks towards a nation’s delicate networks are in fact the perform of other governments, the fact is that there is no magic shield that stops a non-point out sponsored entity from making the very same type of havoc, and harming critical infrastructure in get to make a assertion,” Verify Issue observed in July.
Found this post interesting? Observe THN on Facebook, Twitter and LinkedIn to read additional exceptional information we write-up.
Some elements of this posting are sourced from:
thehackernews.com