Impact of Iran Terrorist Designation for Multinational Orgs

Impact of Iran Terrorist Designation for Multinational Orgs

April 8, 2019 • Insikt Group

On April 8, 2019, the United States designated Iran’s Islamic Revolutionary Guard Corps (IRGC) as a foreign terrorist organization. This new designation triggers economic sanctions and travel restrictions on roughly 100,000 individuals inside Iran that comprise the IRGC.

The Wall Street Journal reported, “The IRGC’s commander, Mohammad Ali Jafari, was quoted as saying by the IRGC’s official news outlet: ‘If the Americans do such stupidity and put our national security at risk, the U.S. Army and security forces in the West Asia region will not enjoy today’s peace.’”

Since at least 2009, the Islamic Republic of Iran has regularly responded to sanctions or perceived provocations by conducting offensive cyber campaigns. Additionally, the Islamic Republic has historically preferred to use proxies when conducting cyberattacks to achieve its policy goals.

Examples of reactionary attacks include the 2012 denial-of-service attacks on America’s largest financial services companies as an immediate response to the sanctions in a campaign dubbed Operation Ababil.

Similarly, a year later in the fall of 2013, Sheldon Adelson (the CEO of Sands Corporation) publicly suggested that the United States should attack Iran with an atomic weapon. In February 2014, Iran launched a destructive attack on the Sands Las Vegas Corporation that caused significant network damage.

Iran Cyber Campaigns Comparison

In response to this IRGC terrorist label, and based on historical precedent, it’s logical to anticipate Iran quickly retaliating via cyberattacks. Financial services, energy companies, and military contractors are the most likely targets of Iranian attacks.

Western and Middle Eastern businesses should anticipate attacks — specifically denial of service and/or destructive malware attacks — attempting to disrupt the availability of information.

Iranian sponsored attacks have historically used spearphishing and webshells as the primary mechanisms for establishing unauthorized access.

New call-to-action

Related Posts

Announcing Security Intelligence for Splunk — For Free

Announcing Security Intelligence for Splunk — For Free

February 23, 2021 • Ellen Wilson

Today, we’re thrilled to announce the launch of a free 30-day trial of our integration for Splunk...

Security Intelligence Handbook Chapter 9: Manage Third-Party Risk in Real Time

Security Intelligence Handbook Chapter 9: Manage Third-Party Risk in Real Time

February 16, 2021 • The Recorded Future Team

Editor’s Note: We’re sharing excerpts from the third edition of our popular book, “The...

The Symbiotic Relationship Between Brand Intelligence and Brand Trust

The Symbiotic Relationship Between Brand Intelligence and Brand Trust

February 11, 2021 • Neha Mehra

A brand is a company's most important asset, and if done right, the ultimate competitive advantage...