Iran accused of attacking US banks as cyberwar intensifies

Former State Department official names the enemy

Iran has once again been accused of being behind a huge wave of DDoS cyberattacks directed against US banks and financial institutions for at least the last six months.

DDoS attacks against banks are part and parcel of everyday business in the sector but there is no question that the scale and persistence of the assaults against banks in the US has always marked it out as unusual.

Increasingly, what started as a battle could now little by little, packet by packet, be turning into the world's first ever sustained cyberwar.

HSBC, America Corp, JPMorgan Chase & Co and Citigroup have all been hit and with some economic cost - many Internet banks users have found their services at times severely disrupted.

"There is no doubt within the US government that Iran is behind these attacks," commented former State and Commerce Department official, James A. Lewis, to The New York Times.

Neither he nor any of the other sources quoted by US media have not offered any new evidence beyond claiming that the size of the attacks alone - said to be several times that of the infamous Russian attacks that slowed Estonia to a crawl in 2007 - marked them out as the work of a state with resources.

On one of the few occasions it has commented on the matter in September, Iran denied launching the attacks.

Given that few even outside the US take these denials seriously, the remaining question is how Iran is managing to overcome counter-measures to continue such attacks.

Iran will see itself as retaliating for a wave of sophisticated attacks since 2007 so mysterious and complex that only the US and Israel could possibly be behind them.

These have included Stuxnet but there have been several since then, including last year's enigmatic and multi-pronged Flame malware, both ostensibly aimed at Iran's nuclear industry and military.

With neither side backing down, many now privately characterise the battle between Iran and the US as a potentially serious development.

Tags: JPMorgan Chase, citigroup, new york times, The New York Times, security, HSBC, finance, industry verticals

Fake-police ransomware reaches Australia

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Deep Security - Enterprise Virtualization Security

Advanced protection for physical, virtual and cloud servers

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.