department of homeland security flag

DHS Warns of Iran’s Potential To Retaliate With Cyber Attacks, Terrorist Acts After Soleimani Killing

The department warned in an alert that Iran has a “robust cyber program” and can carry out attacks to temporarily disrupt critical infrastructure.

In the days after Iran’s top military leader, Qassim Suleimani, was killed in an American drone strike, the country’s leadership has promised revenge on the U.S. Now, top government officials anticipate that Iran’s retaliation may take the form of a cyber attack on major computer systems.

Christopher Krebs, the head of the Cybersecurity and Infrastructure Security Agency (CISA) within the Department of Homeland Security, warned on Jan. 2 that the threats to the public go beyond attacks on the federal government.

“Pay close attention to your critical systems,” Krebs wrote on Twitter. “Make sure you’re also watching third party accesses!”

While the department’s acting secretary, Chad Wolf, said in the days after the drone attack that there are no “specific, credible threats” to the U.S., it’s clear that cybersecurity leaders are concerned about the possibility of an Iranian attack. DHS went on to issue an alert of a terrorism threat to the U.S. on Jan. 4, detailing specific aspects of Iran’s capabilities.

As of Monday afternoon, no official cyber attack had been reported as coming from an established Iranian government-based hacking group. But the attack “may come with little or no warning,” the DHS warned, particularly after Suleimani’s funeral on Monday.

ZDNet reported that there have been some low-level cyber attacks over the weekend that involved the defacement of about 20 websites, including that of a government site for the Federal Depository Library Program. The attacks did not appear to originate from government-backed hacking groups.

The DHS alert referenced Iran’s efforts in the past to scope out terrorist acts against the U.S., including “scouting and planning against infrastructure targets and cyber enabled attacks against a range of U.S.-based targets.”

Some critics of the Trump administration fear that DHS is not well prepared to handle a widespread security threat thanks to its increased focus on immigration, a priority of President Trump.

John Cohen, a former acting under security in the DHS who led efforts to counter Iran, said a comprehensive plan must be developed to address the growing threat. He is doubtful that the plan will be developed in concert with local governments.

“There has been real concern that the focus on immigration enforcement and the border wall have degraded our capabilities to address not only the threat posed by domestic terrorists but sophisticated threats like this,” Cohen told The New York Times. “Time will only tell.”

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West
  • SIA Releases New Report on Operational Security Technology

    The Security Industry Association (SIA) has released an impactful new resource – Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes Leveraging OST. Read Now

  • Cyber Overconfidence Is Leaving Your Organization Vulnerable

    The increased sophistication of cyber threats pumped by the relentless use of AI and machine learning brings forth record-breaking statistics. Cyberattacks grew 44% YoY in 2024, with a weekly average of 1,673 cyberattacks per organization. While organizations up their security game to help thwart these attacks, a critical question remains: Can employees identify a threat when they come across one? A Confidence Gap survey reveals that 86% of employees feel confident in their ability to identify phishing attempts. But things are not as rosy as they appear; the more significant part of the report finds this confidence misplaced. Read Now

  • Mission 500 Debuts Refreshed Identity Ahead of Security 5K/2K at ISC West

    Mission 500, the security industry’s nonprofit charity dedicated to supporting children in need across the US, Canada, and Puerto Rico, has unveiled a refreshed brand identity ahead of ISC West. The charity’s new look includes a modernized logo with refined messaging to reinforce Mission 500’s nearly decade-long commitment to serving the needs of children and families in crisis. Read Now

    • Industry Events

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.