BrandPost: Microsoft special report: Iran’s adoption of cyber-enabled influence operations

BrandPost: Microsoft special report: Iran’s adoption of cyber-enabled influence operations

By Microsoft Security

Iranian state actors have latched on to a new set of preferred attack vectors over the course of the past year. Known as cyber-enabled influence operations (IO), these techniques combine offensive computer network operations with messaging and amplification to shift perceptions, behaviors, or decisions by target audiences in accordance with the perpetrator’s interests and objectives.

Iranian groups have turned to cyber-enabled IO as a way to boost, exaggerate, or compensate for shortcomings in their network access or cyberattack capabilities. By combining offensive cyber operations with multi-pronged IO, they are able to fuel geopolitical change in alignment with the regime’s objectives. These include bolstering Palestinian resistance, fomenting Shi’ite unrest in the Gulf, and countering the normalization of Arab-Israeli ties.

To read this article in full, please click here



Support the originator by clicking the read the rest link below.