![Dark Reading Global Logo Dark Reading Global Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc8a6395802cafad0/654e0d60123f32040a075bab/Dark_Reading_Logo_Global_k.png?width=700&auto=webp&quality=80&disable=upscale)
Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa and the Asia Pacific
Microsoft: Iran's Cyberattacks on Israel Exaggerated & FabricatedMicrosoft: Iran's Cyberattacks on Israel Exaggerated & Fabricated
Despite claims to the contrary, Iranian cyberattackers have been less strategic and more opportunistic over the last month as the Israel-Hamas war continues.
November 9, 2023
![CCTV cameras mounted on a wall CCTV cameras mounted on a wall](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb13275776de722fb/654e399ee4be70040af2f60f/cctv_camera_Zefrog_Alamy.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
Pro-Iranian hacktivists have made false claims about the strength of cyberattacks made against Israel in the current conflict with Hamas. Meanwhile, the allegations that Iranian state-sponsored attackers conducted pre-planned cyberattacks timed with Hamas' Oct. 7 terror attack on Israel are false.
That's according to Microsoft, which said that any claims of ransomware attacks by the groups "were almost certainly fabricated." For instance, Iranian actors claimed they successfully compromised cameras at a specific Israeli military installation, when it was revealed to be an untargeted compromise of connected webcams that have nothing to do with military targets.
"In reality, the compromised cameras were located at scattered sites outside any one defined region," according to Microsoft's report. "This suggests that despite Iran actors' strategic claims, this camera example was ultimately a case of adversaries continuing to opportunistically discover and compromise vulnerable connected devices and try to reframe this routine work as more impactful in the context of the current conflict."
Microsoft's Threat Intelligence Center also said the success of network attacks have been exaggerated and amplified "via a well-integrated deployment of information operations."
As for the Iranian Ministry of Intelligence and Security (MOIS) or Islamic Revolutionary Guard Corps (IRGC) coordinating any attacks to align with the physical attack on Oct. 7, Microsoft says it never happened. The earliest advanced persistent threat (APT) activity consisted of two separate "destructive attacks targeting infrastructure in Israel" conducted on Oct. 18. Microsoft didn't disclose details on the attacks.
That said, Microsoft Threat Intelligence anticipates that the longer the conflict goes on, the more likely it is Iranian operators will move from a reactive posture to more proactive activities.
Read more about:
DR Global Middle East & AfricaAbout the Author
You May Also Like
Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025Shift Left: Integrating Security into the Software Development Lifecycle
Mar 5, 2025