{"id":41133,"date":"2026-03-29T10:24:11","date_gmt":"2026-03-29T10:24:11","guid":{"rendered":"https:\/\/www.europesays.com\/iran\/41133\/"},"modified":"2026-03-29T10:24:11","modified_gmt":"2026-03-29T10:24:11","slug":"iran-conflict-shows-how-digital-fight-is-ingrained-in-warfare-2","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/iran\/41133\/","title":{"rendered":"Iran conflict shows how digital fight is ingrained in warfare"},"content":{"rendered":"<p>WASHINGTON (AP) \u2014 As they fled an <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/article\/iran-us-israel-trump-lebanon-march-26-2026-08584480cef5cc50e525bf21602104fc\" rel=\"nofollow noopener\" target=\"_blank\">Iranian missile strike<\/a>, some Israelis with Android phones received a text offering a link to real-time information about bomb shelters. But instead of a helpful app, the link downloaded spyware giving hackers access to the device\u2019s camera, location and all its data.<\/p>\n<p>The <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/article\/cyber-threats-iran-war-trump-israel-hackers-2c0ae77b1799b3d1c5b1353f7798f8ff\" rel=\"nofollow noopener\" target=\"_blank\">operation, attributed to Iran<\/a>, showed sophisticated coordination and is just the latest tactic in a cyber conflict that pits the U.S. and Israel against Iran and its digital proxies. As Iran and its supporters seek to use their cyber capabilities to compensate for their military disadvantages, they are demonstrating how disinformation, artificial intelligence and hacking are now ingrained in modern warfare. <\/p>\n<p>The bogus texts received recently appeared to be timed to coincide with the missile strikes, representing a novel combination of digital and physical attacks, said Gil Messing, chief of staff at Check Point Research, a cybersecurity firm with offices in Israel and the U.S. <\/p>\n<p>\u201cThis was sent to people while they were running to shelters to defend themselves,\u201d Messing said. \u201cThe fact it\u2019s synced and at the same minute &#8230; is a first.\u201d<\/p>\n<p>The digital fight is likely to persist even if a ceasefire is reached, experts said, because it\u2019s a lot easier and cheaper than conventional conflict and because it is designed not to kill or conquer, but to spy, steal and frighten.<\/p>\n<p>Iran-linked groups are turning to high-volume, low-impact cyberattacks<\/p>\n<p>While high in volume, most of the cyberattacks linked to the war have been relatively minor when it comes to damage to economic or military networks. But they have put many U.S. and Israeli companies on the defensive, forcing them to quickly patch old security weaknesses.<\/p>\n<p>Investigators at the Utah-based security firm DigiCert have tracked nearly 5,800 cyberattacks so far mounted by nearly 50 different groups tied to Iran. While most of the attacks targeted U.S. or Israeli companies, DigiCert also found attacks on networks in Bahrain, Kuwait, Qatar and other countries in the region.<\/p>\n<p>Many of the attacks are easily thwarted by the latest cybersecurity precautions. But they can inflict serious damage on organizations with out-of-date security and impose a demand on resources even when unsuccessful.<\/p>\n<p>Then there\u2019s the psychological impact on companies that may do business with the military.<\/p>\n<p>\u201cThere are a lot more attacks happening that aren\u2019t being reported,\u201d said Michael Smith, DigiCert\u2019s field chief technology officer. <\/p>\n<p>A pro-Iranian hacking group <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/article\/patel-iran-hacking-cyberscurity-9237ca30d1c85f237d7d83e6798d97f0\" rel=\"nofollow noopener\" target=\"_blank\">claimed responsibility Friday for infiltrating<\/a> an account of <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/hub\/kash-patel\" rel=\"nofollow noopener\" target=\"_blank\">FBI Director Kash Patel<\/a>, posting what appeared to be years-old photographs of him, along with a work resume and other personal documents. Many of those records appeared to be more than a decade old.<\/p>\n<p>It\u2019s similar to a lot of the cyberattacks linked to pro-Iran hackers: splashy and designed to boost morale among supporters, while undermining the confidence of the opponent but without much impact to the war effort.<\/p>\n<p>Smith said these high-volume, low-impact attacks are \u201ca way of telling people in other countries that you can still reach out and touch them even though they\u2019re on a different continent. That makes them more of an intimidation tactic.\u201d<\/p>\n<p>Health care and data centers have been a target<\/p>\n<p>Iran is likely to target the weakest links in American cybersecurity: supply chains that support the economy and the war effort, as well as critical infrastructure like ports, rail stations, water plants and hospitals.<\/p>\n<p>Iran also is targeting data centers with both cyber and conventional weapons, showing how important the centers have become to the economy, communications and military information security.<\/p>\n<p>This month, hackers supporting Iran claimed responsibility for <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/article\/stryker-cyberattack-iran-medical-equipment-products-8dd418618a3bd4fa4c97caf7978c11ee\" rel=\"nofollow noopener\" target=\"_blank\">hacking Stryker<\/a>, a Michigan-based medical technology company. The group known as Handala claimed the strike was in retaliation for suspected U.S. <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/article\/iran-us-school-hegseth-trump-2ffff06808f7a584b0a03831897ab0b8\" rel=\"nofollow noopener\" target=\"_blank\">strikes that killed Iranian schoolchildren<\/a>.<\/p>\n<p>Cybersecurity researchers at Halcyon recently published the findings of another recent cyberattack targeting a health care company. Halcyon did not reveal the name of the company but said the hackers used a tool that U.S. authorities have <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-241a\" target=\"_blank\" rel=\"noopener nofollow\">linked to Iran<\/a> to install destructive ransomware that shut the company out of its own network. <\/p>\n<p>The hackers never demanded a ransom, suggesting they were motivated by destruction and chaos, not profit.<\/p>\n<p>Together with the attack on Stryker, \u201cthis suggests a deliberate focus on the medical sector rather than targets of opportunity,\u201d said Cynthia Kaiser, senior vice president at Halcyon. \u201cAs this conflict continues, we should expect that targeting to intensify.\u201d<\/p>\n<p>Artificial intelligence is providing a boost<\/p>\n<p>AI can be used both to increase the volume and speed of cyberattacks as well as allow hackers to automate much of the process.<\/p>\n<p>But it\u2019s disinformation where AI has really demonstrated its corrosive impact on public trust. Supporters of both sides have spread bogus images of atrocities or decisive victories that never happened. One deepfake image of sunken U.S. warships has racked up more than 100 million views.<\/p>\n<p>Authorities in Iran have limited internet access and are working to shape the view Iranians receive of the war with propaganda and disinformation. Iranian state-run media, for instance, has begun labeling actual footage of the war as fake, sometimes substituting its own doctored images, according to research at NewsGuard, a U.S. company that tracks disinformation.<\/p>\n<p>Heightened concerns about the risks posed by AI and hacking prompted the State Department to open a Bureau of Emerging Threats last year focused on new technologies and how they could be used against the U.S. It joins similar efforts already underway at agencies including the Cybersecurity and Infrastructure Security Agency and the National Security Agency.<\/p>\n<p>AI also plays a role in defending against cyberattacks by automating and speeding the work, Director of National Intelligence Tulsi Gabbard recently told Congress.<\/p>\n<p>The technology, she said, \u201cwill increasingly shape cyber operations with both cyber operators and defenders using these tools to improve their speed and effectiveness,\u201d Gabbard said.<\/p>\n<p>While Russia and China are seen as greater cyberthreats, Iran has nonetheless launched several operations targeting Americans. In recent years, groups working for Tehran have infiltrated the email system of President Donald Trump\u2019s campaign, <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/article\/water-utilities-hackers-cybersecurity-1c475f5d2ef3b5d52410c93bdeab3aad\" rel=\"nofollow noopener\" target=\"_blank\">targeted U.S. water plants<\/a> and tried to breach the networks used by the military and defense contractors. They have impersonated American protesters online as a way to covertly encourage <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/hub\/israel-hamas-war\" rel=\"nofollow noopener\" target=\"_blank\">protests against Israel<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"WASHINGTON (AP) \u2014 As they fled an Iranian missile strike, some Israelis with Android phones received a text&hellip;\n","protected":false},"author":2,"featured_media":41134,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[1405,3943,17479,38,197,17480,8525,17575,34,61,196,37,1234,17576,17481,768,947,200,771,82],"class_list":{"0":"post-41133","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-iran","8":"tag-artificial-intelligence","9":"tag-cybercrime","10":"tag-cynthia-kaiser","11":"tag-donald-trump","12":"tag-general-news","13":"tag-gil-messing","14":"tag-hacking","15":"tag-information-technology","16":"tag-iran","17":"tag-iran-government","18":"tag-iran-war","19":"tag-israel","20":"tag-kash-patel","21":"tag-malware-and-spyware","22":"tag-michael-smith","23":"tag-military-and-defense","24":"tag-technology","25":"tag-war-and-unrest","26":"tag-washington-news","27":"tag-world-news"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@iran\/116311979712233571","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/posts\/41133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/comments?post=41133"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/posts\/41133\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/media\/41134"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/media?parent=41133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/categories?post=41133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/tags?post=41133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}