Iran claims US exploited networking equipment backdoors during strikes — says devices from Cisco and others failed despite blackout in attack that ‘indicates de

Iran claims US exploited networking equipment backdoors during strikes — says devices from Cisco and others failed despite blackout in attack that 'indicates de

Follow Tom's Hardware on Google News , or add us as a preferred source , to get our latest news, analysis, & reviews in your feeds.

Luke James is a freelance writer and journalist.\u00a0 Although his background is in legal, he has a personal interest in all things tech, especially hardware and microelectronics, and anything regulatory.\u00a0 ","collapsible":{"enabled":true,"maxHeight":250,"readMoreText":"Read more","readLessText":"Read less"}}), "https://slice.vanilla.futurecdn.net/13-4-20/js/authorBio.js"); } else { console.error('%c FTE ','background: #9306F9; color: #ffffff','no lazy slice hydration function available'); } Luke James Social Links Navigation Contributor Luke James is a freelance writer and journalist. Although his background is in legal, he has a personal interest in all things tech, especially hardware and microelectronics, and anything regulatory.

davisch This is believable and reminds me of the classic NSA problem. Half of their purpose is to weaken the cyber defense of other nations and part the other half is to strengthen ours. Because everyone uses the same equipment and security protocols, and governments prioritize offensive postures over defensive ones, they are constantly working against their own (and our) interests. To maintain dominance, they don't disclose security vulnerabilities they discover, or even infiltrate the supply chain to install backdoors, which leaves our own equipment vulnerable to the same exploits if someone else manages to discover them. If you're unfamiliar, look up "NSA RSA BSAFE" as an example. Because our government doesn't really change, we can only imagine the vulnerabilities they are forcing on to us today to "keep us safe" that won't be known for at least another 20-30 years. Reply

bill001g They are getting paranoid it seems. They seem to think the USA planned the attack that happened on march 31 weeks before so they could sabotage the routers before they were disconnected. Their second theory is somehow they were controlled by satellite even though the router has no ability to communicate with a satellite. It all depends on how disconnected they really were. Obviously they were doing something with them or they would not care if they crashed or rebooted if they had already turned them off. It would be much more likely if they left the network up internally to iran that someone compromised the routers from inside iran. Although people hate snowden it was him that reviled the tampering with equipment and the collection of internet data by many countries including the USA. Now that it is encrypted they likely just pay google to hand over its massive collection of spying. Reply

call101010 I dont care about Iran being hacked . it is a war at the end. but if the US Government can do this , then OTHERS could do it as well if they discover how. and this is not acceptable at all. Reply

call101010 Wait until we discover that hidden code inside ANY US made CPU, hidden deep in the wafer … Reply

anoldnewb davisch said: This is believable and reminds me of the classic NSA problem. Half of their purpose is to weaken the cyber defense of other nations and part the other half is to strengthen ours. Because everyone uses the same equipment and security protocols, and governments prioritize offensive postures over defensive ones, they are constantly working against their own (and our) interests. To maintain dominance, they don't disclose security vulnerabilities they discover, or even infiltrate the supply chain to install backdoors, which leaves our own equipment vulnerable to the same exploits if someone else manages to discover them. If you're unfamiliar, look up "NSA RSA BSAFE" as an example. Because our government doesn't really change, we can only imagine the vulnerabilities they are forcing on to us today to "keep us safe" that won't be known for at least another 20-30 years. Reply

alan.campbell99 Microtik gets targeted by botnets? Hmm, I was considering their gear as an option should I have to replace my current one. Reply

Key considerations

  • Investor positioning can change fast
  • Volatility remains possible near catalysts
  • Macro rates and liquidity can dominate flows

Reference reading

More on this site

Informational only. No financial advice. Do your own research.

Leave a Comment