- 本月早些时候,以色列多地响起导弹警报期间,数千名以色列民众收到冒充军方发送的短信,诱导其下载虚假避难应用程序,该应用可能用于窃取大量个人数据。另有部分民众收到群发短信称“内塔尼亚胡已死,死亡正在逼近,地狱之门即将打开”,并煽动民众在伊朗导弹袭击前离开巴勒斯坦。网络安全专家指出,这些行为是伊朗、以色列、美国及其网络支持者之间长期网络对抗的公开表现。
此类攻击虽以键盘代替武器,但伊朗黑客长期在数字领域与以色列交锋,实战经验丰富。前美国网络安全与基础设施安全局(CISA)局长克里斯·克雷布斯表示,伊朗正倾尽全力发动网络攻击,其网络操作人员几乎全员投入行动。攻击目标包括制造恐慌、扰乱社会秩序、收集情报及定位导弹目标,意图通过影响舆论和打击敌方士气来获取战略优势。
伊朗发动大规模网络心理战
虚假短信诱导下载恶意应用
网络攻击旨在制造社会混乱
美以伊展开高强度网络对抗
- 伊朗在网络战领域投入巨大资源,致力于突破美国和以色列的网络安全防线。分析人员和前官员指出,伊朗拥有三层结构的网络作战力量,其界限常模糊不清。最高层级由伊斯兰革命卫队和伊朗情报部直接指挥,具备高度组织性和隐蔽性。这些单位通过大量前台组织运作,既为网络攻击提供可否认性,也用于发布公开威胁,增强战略威慑。
尽管网络战成果难以量化,但其在塑造国际舆论和削弱敌方士气方面的作用日益关键。伊朗将网络能力视为与传统军事手段并重的战略工具,持续扩大攻击范围与复杂性。目前尚无法明确判断网络战中的优势方,但各方对抗强度持续升级,反映出网络空间已成为现代冲突的核心战场之一。
伊朗建立三层网络作战体系
革命卫队直接指挥高级黑客
利用前台组织隐藏攻击来源
网络战影响战略心理层面
- Iranian hackers launched coordinated cyberattacks against Israel during a recent missile alert, sending thousands of deceptive text messages impersonating military authorities. One message urged recipients to download a fake shelter app that could have harvested personal data, while another falsely claimed Israeli Prime Minister Benjamin Netanyahu had died and threatened further violence. Cybersecurity experts identify these operations as part of an ongoing digital conflict involving Iran, Israel, and the United States, with Iranian state-backed actors playing a central role. According to Chris Krebs, former director of the U.S. Cybersecurity and Information Security Agency (CISA), Iran has mobilized its entire cyber workforce in an “all hands on deck” effort, deploying operators across multiple tiers. These include elite units under the Islamic Revolutionary Guard Corps and Iran’s Ministry of Intelligence, which use front organizations to obscure attribution and amplify psychological impact. The attacks aim to spread fear, disrupt civil order, gather intelligence, and potentially support kinetic military targeting. While the full effectiveness of these operations remains unclear, their integration into broader military strategy underscores the growing importance of cyber capabilities in modern conflict. Detailed information on specific technical methods or confirmed data breaches is limited.
Key Takeaways:
Iran conducted coordinated SMS-based cyberattacks during an Israeli missile alert
Fake military messages aimed to steal data and spread disinformation
Cyber operations are integrated into Iran’s broader military strategy
Attribution is complicated by use of front organizations and plausible deniability
Source: Original Article
查看原文 →
View Original →