Cyber Attack in Iran Reportedly Cripples Gas Stations Across the Country

A cyber assault in Iran left petrol stations throughout the nation crippled, disrupting fuel income and defacing electronic billboards to show messages complicated the regime’s means to distribute gasoline.

Posts and video clips circulated on social media showed messages that said, “Khamenei! Where by is our gasoline?” — a reference to the country’s supreme chief Ayatollah Ali Khamenei. Other indications go through, “No cost fuel in Jamaran gasoline station,” with gasoline pumps showing the words and phrases “cyberattack 64411” when making an attempt to purchase fuel, semi-official Iranian Students’ Information Agency (ISNA) information company noted.

Automatic GitHub Backups

Abolhassan Firouzabadi, the head of Iran’s Supreme Cyberspace Council, mentioned the assaults had been “probably” state-sponsored but extra it was much too early to determine which nation carried out the intrusions.

Whilst no country or group has so significantly claimed responsibility for the incident, the assaults mark the next time electronic billboards have been altered to exhibit equivalent messaging.

In July 2021, Iranian Railways and the Ministry of Streets and City Development techniques turned the topic of focused cyber assaults, displaying alerts about prepare delays and cancellations and urging travellers to phone the cellular phone variety 64411 for further more information and facts. It is really value noting that the cellular phone selection belongs to the office environment of Ali Khamenei that supposedly handles issues about Islamic law.

The attacks concerned the use of a never-in advance of-noticed reusable details-wiping malware referred to as “Meteor.”

Cybersecurity agency Examine Stage later on attributed the educate attack to a “routine opposition” threat actor that self-identifies as “Indra” — referring to the Hindu god of lightning, thunder, and war — and is believed to have ties to hacktivist and other cybercriminal groups, in addition to linking the malware to prior assaults concentrating on Syrian petroleum providers in early 2020.

“Aiming to carry a cease to the horrors of [Quds Force] and its murderous proxies in the location,” the group’s official Twitter account bio reads.

“Although most attacks towards a nation’s sensitive networks are certainly the work of other governments, the fact is that there is no magic shield that stops a non-condition sponsored entity from creating the very same sort of havoc, and harming vital infrastructure in order to make a assertion,” Test Place observed in July.

Fibo Quantum