
Iran threatens U.S: Analysts warn of potential sneak attack by Tehran on America as tensions soar
Tensions between the U.S. and Iran are escalating real quick. Experts say that as the talk of war heats up, Iran could launch a silent but deadly cyberattack on the US. Banks, hospitals, and other important systems may already be infected and waiting to be triggered, as the conflict approaches a crucial tipping point
Ayatollah Ali Khamenei, the Supreme Leader of Iran, declared in a statement read by a television host that his nation would not abide by President Donald Trump's demand for an unconditional surrender.
Iran has threatened to go to "all-out war" if the US joins the conflict after rejecting calls to abandon its nuclear program.
Play Video
Pause
Skip Backward
Skip Forward
Unmute
Current Time
0:00
/
Duration
0:00
Loaded
:
0%
0:00
Stream Type
LIVE
Seek to live, currently behind live
LIVE
Remaining Time
-
0:00
1x
Playback Rate
Chapters
Chapters
Descriptions
descriptions off
, selected
Captions
captions settings
, opens captions settings dialog
captions off
, selected
Audio Track
default
, selected
Picture-in-Picture
Fullscreen
This is a modal window.
Beginning of dialog window. Escape will cancel and close the window.
Text
Color
White
Black
Red
Green
Blue
Yellow
Magenta
Cyan
Opacity
Opaque
Semi-Transparent
Text Background
Color
Black
White
Red
Green
Blue
Yellow
Magenta
Cyan
Opacity
Opaque
Semi-Transparent
Transparent
Caption Area Background
Color
Black
White
Red
Green
Blue
Yellow
Magenta
Cyan
Opacity
Transparent
Semi-Transparent
Opaque
Font Size
50%
75%
100%
125%
150%
175%
200%
300%
400%
Text Edge Style
None
Raised
Depressed
Uniform
Drop shadow
Font Family
Proportional Sans-Serif
Monospace Sans-Serif
Proportional Serif
Monospace Serif
Casual
Script
Small Caps
Reset
restore all settings to the default values
Done
Close Modal Dialog
End of dialog window.
by Taboola
by Taboola
Sponsored Links
Sponsored Links
Promoted Links
Promoted Links
You May Like
Is It Possible to Get a Flatter Tummy After 50—And How?
Lulutox
Undo
James Knight, an expert on cybersecurity, believes that if tensions rise, Iran could launch a digital attack on US infrastructure. Although a long-term collapse is unlikely, Americans should remain vigilant, keep their devices up to date, and be prepared for potential short-term issues.
What kind of cyberattack could Iran launch?
If the US formally intervenes in the conflict between Israel and Iran, Americans should expect bank disruptions and possible blackouts, stated James Knight, as quoted in a report by the Daily Mail.
Live Events
The Iranian government may launch a last-ditch effort to exact revenge by activating malware that hackers have already implanted in US systems.
Knight warned, "We can anticipate some lone wolves who will want to carry out some sort of retaliation, even if the US does not get involved."
Knight disclosed that in the digital sphere, this might entail several groups of Iranian hackers targeting vital US infrastructure, such as hospitals, power grids, banks, and oil pipelines.
Knight clarified that major power plants and energy production facilities are the most likely targets of a cyberattack, which is more likely to cause chaos across the United States than to cause long-term damage.
He remarked, "It would be the retaliation, tit for tat, sort of attacks." "Destroying things, resulting in blackouts."
Knight clarified that each Iranian cyber unit has a distinct area of expertise, with some concentrating on stealing passwords, private data, and breaching large networks, such as hospitals, to target regular Americans.
He said that hackers could access ICU medical devices and compromise a hospital receptionist's computer, causing life-saving equipment to be shut down across the country.
Hackers might target digital currency platforms, payment processors, and American banks in the interim. They won't topple the United States. "They're only trying to cause pain," he said.
How can Americans protect themselves?
Here are some public protection measures against hacking, as per James Knight.
Be cautious of emails and set strong passwords.
Regularly update computers and mobile devices with the latest security updates.
Switch to multi-factor authentication by sending a secret code to a person's phone or email when logging into certain sites.
Passkeys are a passwordless, phishing-resistant technology that uses cryptographic keys stored on a user's devices and authenticated using biometrics.
ALSO READ:
Kamala Harris won U.S elections 2024: U.S Attorney General Pam Bondi asked to investigate results
Could malware already be inside U.S. systems?
Iran has an advantage because, in anticipation of the impending conflict, their hackers have infected American computer networks with malicious malware. For years, hacker groups can remain in systems, hardening them and integrating themselves covertly. Only when Iran feels it is absolutely necessary or when it has nothing left to lose in a conflict with the US do these malicious programs get activated.
Iran is known to take credit for US defense breaches, often boasting about their plans. The US government's cybersecurity teams are however, ready to combat the possible threat, but at the same time Iranian cyber units are proficient and have been conducting attacks for years, as per a report by the Daily Mail.
However, Americans must exercise caution and be prepared for such term attacks.
FAQs
What would the Iranian cyberattack target?
According to experts, Iran would most likely target US banks, power grids, hospitals, and cryptocurrency platforms to cause chaos and send a message, rather than inflicting permanent damage.
Can average Americans do anything to prepare?
Experts recommend using strong passwords, enabling multi-factor authentication, and remaining vigilant online. It's also a good idea to keep extra cash, food, and supplies on hand in case of a blackout.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


News18
25 minutes ago
- News18
Pakistan, Bangladesh-based Social Media Accounts Boosting Assam Congress' Online, Says Himanta
Last Updated: Assam CM alleges over 5,000 foreign-run social media accounts are backing state Congress. Assam chief minister Himanta Biswa Sarma on Friday alleged that over 5,000 social media accounts run from Pakistan and Bangladesh and other Islamic nations are boosting the online presence of the state Congress unit. 'It is surprising that they do not comment on or like posts by Rahul Gandhi or even the Indian National Congress. They are only focused on a particular leader and the Assam Congress," Sarma was quoted as saying by news agency PTI. Himanta Biswa Sarma did not name the Assam Congress leader in question, but it appeared he was referring to Gaurav Gogoi, who took charge as the Assam Pradesh Congress Committee president in the last week of May. The Assam CM claimed that social media accounts from 47 countries, mostly from Pakistan and Bangladesh, have been unusually focused on Gogoi's activities and the state Congress unit's recent moves. He said this is the first time he saw 'so much foreign involvement in Assam politics". 'We are not concerned with the change in the party's leadership in the state, but this development has taken place in the last month and there must be some link. For the first time, there is so much foreign involvement in Assam politics in the run-up to the 2026 assembly elections," Sarma said. He said the issue is related to 'national security" and added that the government is not ruling out that 'some of the accounts may be from within the state". Sarma then revealed that he has 'ordered a forensic audit" of the accounts while pointing out that some of the 5,000 accounts are being run with their location marked as Guwahati. He also said these social media accounts, apart from posting about Assam politics, are also reportedly sharing content linked to Islamic fundamentalist causes, including pro-Palestine messaging, Iranian narratives and statements by Bangladesh's chief advisor Mohammad Yunus. He said a forensic audit revealed that 700 of the accounts originated from Bangladesh, 350 from Pakistan, 246 from Saudi Arabia, 86 from Kuwait and 35 from Afghanistan. First Published:


Time of India
26 minutes ago
- Time of India
China, Pakistan, Bangladesh hold inaugural trilateral ministerial meet
China, Pakistan and Bangladesh have agreed to advance cooperation based on the principles of good-neighbourliness, equality and mutual trust at the inaugural trilateral meeting of their foreign ministry officials. Chinese Vice Foreign Minister Sun Weidong , Bangladeshi Acting Foreign Secretary Ruhul Alam Siddique and Additional Foreign Secretary of Pakistan Imran Ahmed Siddiqui attended the meeting held at the Chinese city of Kunming, capital of Southern Yunnan province, where China is holding its annual South Asia expo. Pakistani Foreign Secretary Amna Baloch participated, via a video link, in the first phase of the meeting on Thursday, a Chinese Foreign Ministry press release said here on Friday. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Unsold Container Homes in National Capital Region - Prices You Won't Believe! Shipping Container Homes | Search Ads Search Now Undo China's new strategic initiative to bring closer the two estranged South Asian countries in India's immediate neighbourhood comes a month after a similar trilateral mechanism meeting was held with Pakistan and Afghanistan. In his address, Sun Weidong said Bangladesh and Pakistan are both good neighbours, good friends, and good partners of China, and important partners in high quality Belt and Road cooperation, the Foreign Ministry's press release said. Live Events Cooperation among China, Pakistan and Bangladesh aligns with the common interests of the three people, and can contribute to regional peace, stability, development and prosperity, Sun who was a former Ambassador to Pakistan and India, said. The three sides exchanged views extensively on China-Pakistan-Bangladesh trilateral cooperation and agreed to establish a working group to follow up and implement the understandings reached during the meeting, the press release said. They also emphasised that China-Bangladesh-Pakistan cooperation adheres to true multilateralism and open regionalism, not directed at any third party, it added. Thursday's trilateral mechanism comes in the backdrop of Bangladesh's Chief Advisor Muhammad Yunus, who took charge after the fall of the Sheikh Hasina government last year, warming up to China and seeking Beijing's assistance on various fronts, in an apparent efforts to reduce his country's dependence on India. Yunus has also sought to establish close ties with Pakistan, reviving for the first-time Bangladesh's links with Pakistan after the separation following the 1971 war. The Chinese press release said the three countries have agreed to advance trilateral cooperation based on the principles of good-neighbourliness, equality and mutual trust, openness and inclusiveness, common development, and win-win cooperation during the meeting in Kunming. The trilateral cooperation focuses on promoting economic development and improving people's livelihoods. The three sides agreed to explore and implement cooperation projects in such areas as industry, trade, maritime affairs, water resources, climate change, agriculture, human resources, think tanks, health, education, culture, and youth, it said. In Kunming, Sun also called on Haji Mawlawi Abdul Salam Hanafi, Acting Deputy Prime Minister of the interim government of Afghan, and held bilateral meetings with Ruhul Alam Siddique and Imran Ahmed Siddiqui. A Pakistan Foreign Ministry press release said Baloch commended the Chinese side for convening the inaugural meeting of the trilateral mechanism. Noting the common aspirations of the three sides for people-centric development, she expressed Pakistan's desire for a deeper engagement between China and South Asian countries. Expressing satisfaction at the upward trajectory of bilateral ties, she conveyed Pakistan's readiness to work with China and Bangladesh to enhance ties in trade and investment, agriculture, digital economy, environment protection, marine sciences, green infrastructure, culture, education and people-to-people exchanges. The three sides agreed that trilateral cooperation would be guided by the principles of openness, inclusivity, good neighbourliness, mutual respect and trust, while working towards win-win cooperation, it said.


Time of India
27 minutes ago
- Time of India
China-Russia trust erodes as Beijing's hackers go rogue, launch cyberattacks to steal Ukraine war secrets
China hackers target Russia despite alliance, seeking war secrets and battlefield data- China hackers targeting Russia have raised serious concerns as multiple cyberattacks linked to Chinese state-sponsored groups have reportedly breached Russian military and defense systems since the Ukraine war began. Despite public declarations of friendship between Moscow and Beijing, cyber analysts say the Chinese government has been actively spying on Russian technologies, including nuclear submarines, drone systems, and battlefield tactics. The breach highlights a growing undercurrent of distrust and strategic intelligence gathering even among so-called allies. Cyber groups tied to Beijing—like APT27 and APT31—are believed to be behind these stealthy operations, using phishing emails and malware to infiltrate sensitive Russian networks. Why are China hackers targeting Russia amid growing friendship? Despite a publicly strong relationship between China and Russia, cybersecurity experts say China hackers have been quietly breaching Russian systems since May 2022 — just months after Russia launched its full-scale invasion of Ukraine. These hacking attempts have continued steadily, with Chinese-linked groups digging into Russia's defense and military data. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Air conditioners without external unit. (click to see prices) Air Condition | Search Ads Search Now Undo According to cybersecurity researchers from TeamT5, one group named Sanyo impersonated a Russian engineering firm's email to seek data on nuclear submarines. The intention behind these cyber intrusions appears to be collecting information about Russia's battlefield operations, modern warfare tactics, and Western weapon technologies seen in Ukraine. Che Chang, a TeamT5 researcher, stated, 'China likely seeks to gather intelligence on Russia's military operations, defense progress, and geopolitical strategies.' This information could help China boost its own military readiness for future conflicts — particularly in regions like Taiwan, which remains a hotbed of geopolitical tension. Live Events What exactly did China's hackers target in Russia? According to cybersecurity researchers at SentinelLabs and Recorded Future, Chinese Advanced Persistent Threat (APT) groups , including APT27 (Emissary Panda) and APT31 (Zirconium) , have been aggressively targeting: Russian military contractors Government departments involved in defense R&D Email servers and document archives linked to Ukraine war planning The hackers reportedly used spear-phishing campaigns , spoofing Russian Ministry of Health notices to plant malware into classified internal systems. One malware strain, called PlugX , known for remote access and data exfiltration, was flagged in these Russian environments—previously used by China in espionage campaigns across Southeast Asia and the Middle East. What kind of information are Chinese hackers after in Russia? The China hackers targeting Russia campaign has been aimed at extracting sensitive military intelligence, especially battlefield-tested insights. Russian defense firms, including Rostec , were among the major targets. Cyber experts from Palo Alto Networks revealed that Chinese hacking groups have sought data on radar systems, satellite communications, drone warfare, and electronic warfare technology. Another method used by these hackers involved Microsoft Word-based malware files, which exploited software vulnerabilities to breach aviation and defense sectors. One particularly dangerous tool spotted in these attacks was Deed RAT , malware considered 'proprietary' among Chinese state-sponsored groups. According to Russian cybersecurity firm Positive Technologies, this malware has been used to attack Russian aerospace, security, and military sectors. Though Russian authorities have not officially acknowledged these attacks, a leaked classified document from Russia's FSB — the domestic security agency — described China as an 'enemy,' confirming internal concerns about Chinese espionage. While China and Russia continue to cooperate publicly, including military drills and joint diplomatic efforts, cyber experts say Beijing has long pursued a "friend-but-watcher" strategy . This means China often spies on both allies and adversaries to: Gauge battlefield conditions in Ukraine Evaluate Russia's military capabilities and vulnerabilities Shape its own geopolitical strategies, including Taiwan preparations According to Recorded Future, China increased cyber-espionage targeting Russia by 87% since early 2023 , focusing particularly on regions near Ukraine and Crimea . Who are the major Chinese hacking groups involved? Several well-known Chinese hacking groups have been identified by cybersecurity teams as being behind these operations. Mustang Panda , one of China's most active state-backed cyber espionage groups, expanded its activities after the war in Ukraine began. TeamT5 and Sophos researchers found that Mustang Panda targeted Russian government agencies and military officials — particularly near the China-Russia Siberian border. According to Rafe Pilling from Sophos, the group's operations often follow China's political or economic interests. 'Wherever China invests — whether West Africa, Southeast Asia, or Russia — Mustang Panda follows with targeted hacking,' said Pilling. He and U.S. intelligence sources believe Mustang Panda operates under the Chinese Ministry of State Security. The group even drew attention from American law enforcement. In January, the U.S. Justice Department indicted individuals tied to Mustang Panda for infecting thousands of systems worldwide, including government networks and devices used by Chinese dissidents. Another Chinese hacking group, Slime19 , has been consistently attacking Russia's energy, government, and defense infrastructure, according to TeamT5's Chang. Has China broken its cybersecurity pact with Russia? In 2009 and 2015, China and Russia publicly agreed not to hack each other's systems. However, analysts have long viewed those agreements as symbolic, lacking enforcement or trust. The evidence emerging since Russia's invasion of Ukraine proves that those deals hold little practical weight. The FSB document accessed by The New York Times shows that Russian intelligence views China's digital espionage as a serious threat. China, while outwardly cooperative with Russia in forums and bilateral trade, appears unwilling to rely on Moscow for open sharing of battlefield learnings. Instead, cyber intrusions have become the preferred route for collecting war data. 'The war in Ukraine shifted the priorities of both countries,' said Itay Cohen from Palo Alto Networks. 'Even though the public narrative was one of close ties, in reality, espionage increased.' How is Russia reacting to these cyber intrusions? Thus far, the Kremlin has not officially condemned China, possibly to avoid diplomatic fallout. However, anonymous Russian cybersecurity sources have told investigative outlet iStories that internal firewalls have been tightened and communications protocols are under review. The Federal Security Service (FSB) reportedly issued an internal memo warning of 'unusual East Asian-origin threats' in mid-2024. Still, no public attribution has been made. This silence may signal Russia's reluctance to publicly challenge China at a time when it faces intense pressure from NATO and the West. What does this mean for future China-Russia relations? While China remains one of Russia's most crucial trade partners — especially with the West largely isolating Moscow — the depth of China hackers targeting Russia reveals a fragile foundation beneath this alliance. The relationship, often described by Presidents Xi and Putin as a 'no-limits' partnership, is evidently full of limits when it comes to trust. China's hunger for military intelligence, especially regarding real-time warfare experience, is pushing it to take bold steps. For China, Russia's war offers a rare, real-world military case study that it can't afford to ignore — especially with tensions rising in the Taiwan Strait. Cyber intrusions are likely to continue, if not grow. As Russian officials stay silent and Chinese hackers grow more sophisticated, the digital battlefield between these two "allies" is already active — and evolving quickly. FAQs: Q1: Why are China hackers targeting Russia during the Ukraine war? To secretly collect Russian military intelligence and battlefield data. Q2: Who is Mustang Panda in the China hacking campaign? Mustang Panda is a top Chinese state-backed hacking group targeting Russia.