We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions
People
M
Maggie Miller
Topics
Maggie Miller: 作为一名网络安全记者,我了解到伊朗的Bank Sapa银行遭受了亲以色列黑客组织的攻击。这次攻击的主要目的不是为了盗取资金,而是为了在伊朗民众中制造混乱,影响他们的日常生活。如果伊朗民众想要使用银行卡,可能会遇到无法使用的问题,无法顺利进入账户,也无法正常提取资金,几乎所有银行业务都会受到影响。亲以色列的黑客组织“掠夺麻雀”声称对此事负责,他们非常活跃,公开表示通过攻击伊朗人民的日常使用服务来对抗伊朗政府,目的是通过制造混乱、困惑、不信任和恐惧来损害政府的利益。我认为,这种行为不仅仅是技术上的攻击,更是一种心理战,旨在动摇民众对政府的信任。

Deep Dive

Chapters
The episode begins by discussing a cyberattack on Bank Sapa in Iran, highlighting the use of cyber warfare in the conflict between Iran and Israel. It emphasizes the lack of international consensus on defining and responding to cyber warfare.
  • Cyberattack on Bank Sapa in Iran
  • Pro-Israeli hacking group Predatory Sparrow claimed responsibility
  • Lack of international consensus on cyber war

Shownotes Transcript

Translations:
中文

Savor every last drop of summer with Starbucks. From bold refreshers to rich cold brews, the sunniest season only gets better with a handcrafted ice beverage in your hand. Available for a limited time. Your summer favorites are ready at Starbucks. Test, test, check one, two. You know you need Unique New York. You know you need Unique New York. Does that sound all right? Ah, that's better. You can always tell something's missing when you get isolated results.

Like AI that's only right for one of your systems. Get AI that can work across your data and applications. Learn more at IBM.com. The AI built for business. IBM. About 10 days ago, reports began to trickle out of Iran that customers of one of the country's major banks, Bank Sapa, were having trouble. If you were a customer and went to use your bank card, for example, it might not have worked.

You would have had difficulty getting into your account. You would have had difficulty accessing funds. You would have had difficulty with most aspects of banking. That's Politico reporter Maggie Miller, who covers cybersecurity. It's hard to get exact information on what happened. Much of Iran is still in an internet blackout. But it became clear that Bank Sapa was the target of a cyberattack.

A pro-Israeli hacking group had impacted that particular bank, also went after a prominent Iranian cryptocurrency exchange in recent days. And as far as we know, it wasn't so much involving the funds itself. It was meant to really cause chaos and impact the day-to-day living of Iranians who use those companies. A pro-Israel hacking group called Predatory Sparrow claimed responsibility for the attack.

They've been very vocal and very active with showing that they are taking stances against the Iranian government through targeting the Iranian people and some of their day-to-day uses. So banking, for example, and with the intent of doing harm to the government through creating chaos and confusion and distrust and fear amongst the populace.

Since Israel bombed Iran two weeks ago, the headlines have rightly focused on the physical conflict. But there is another, quieter war unfolding. ♪

Both Iran and Israel, and the U.S. for that matter, are all three quite big cyber powers. And all three, in particular Iran, I would say, really do turn to the digital space to create chaos, create havoc in those that they stand against. And one reason that cybersecurity or cyber attacks, I should say, are seen as quite tempting for many nations, or at least hacktivists working on behalf of those nations, is

is that really the international community has never really created a consensus over what it really means to be at cyber war or when the amount of attacks gets to a point that it really should, you know, lead to war in the kinetic space. Today on the show, the cyber war between Israel, Iran, and, oh yeah, the U.S. too. I'm Lizzie O'Leary, and you're listening to What Next TBD, a show about technology, power, and how the future will be determined. Stick around. ♪

This podcast is brought to you by Progressive Insurance. Do you ever find yourself playing the budgeting game, shifting a little money here, a little there, just hoping it all works out? Well, with the Name Your Price tool from Progressive, you can be a better budgeter and potentially lower your insurance bill too. You tell Progressive what you want to pay for car insurance, and they'll help you find options within your budget.

If you're running a business, you know how important it is to stay connected to your customers and having a flexible and efficient phone system is essential to success.

Thank you.

That way, any teammate can pick right up where the last person left off, keeping response times faster than ever. Plus, with AI-powered call transcripts and summaries, you'll be able to automate follow-ups, ensuring you'll never miss a customer interaction again. So whether you're a one-person operation or have a large team that needs better collaboration tools, check out Open Phone.

See why over 50,000 businesses trust Open Phone to manage their businesses' calls and texts. Open Phone is offering TBD listeners 20% off your first six months at openphone.com slash TBD. That's O-P-E-N-P-H-O-N-E dot com slash TBD. And if you have existing numbers with another service, Open Phone will port them over at no extra charge. Open Phone. No missed calls. No missed customers. ♪

I want to kind of lay out the various technological capabilities of the different actors here.

So let's start with Israel, what Israel is capable of. I think of them, and I am not the expert that you are, as really some of the best cybersecurity operators. Do you think that's a fair characterization? Extremely fair. I would characterize the government of Israel and actually its private sector as among the best in the world in terms of cybersecurity and cyber capabilities. One reason for that is Tel Aviv is one of the main hubs for cybersecurity companies in the world.

And the IDF has really integrated cyber capabilities into its efforts. And, you know, we don't always know for certain, you know, what the Iranian government is tied to. The same with when the U.S. carries out operations. It often doesn't claim credibility for diplomatic reasons.

But Iran is highly sophisticated. And, you know, I point to the operation, which, again, both the U.S. and Israel have never taken 100 percent accountability. But in 2009, there was a very famous attack on the Natanz nuclear facility, one of the ones hit by the U.S. strikes recently, that involved the U.S. and Israel creating a very advanced malware called Stuxnet and using it to

to set back the nuclear operations at that facility by months, even years, and actually leaving, my understanding, a lot of Iranian officials at the time quite puzzled because their equipment just started breaking. And, you know, that was kind of a very good and probably the most famous operation

example of some of Israel's capabilities along with the U.S. So, yes, Israel is a very highly sophisticated actor, uses cyber capabilities often. Iran, at the same time, never underestimate. You know, Iran is listed often as, you know, for the U.S., I would say one of the big four adversaries in the physical space. It also is in the cyber threat space. Tell me about that.

Yeah. So Iran very often sees, you know, cyber attacks as not only a way to, you know, cause chaos, but also to send a message. So just following the October 7th, 2023 attacks by Hamas on Israel, Hamas, of course, is an organization tied to the Iranian state.

There were a series of cyber attacks on U.S. water facilities at the end of 2023 that were not actually really designed to stop water flow or really impact, but it was messaging. So in this case, the pro-Iranian hackers involved targeted Israeli-made equipment in these water facilities that

hijacked it and put on the display screen an anti-Israel message. And kind of we're sending a message that, hey, we're in all of these rural Pennsylvania water facilities. And yes, all we did this time was send a message. But actually, the extent that we gained access, we could have done far worse. So often it's for messaging.

It also often involves a level of disinformation, a lot of social media manipulation. For example, there was a report that came out from a cybersecurity group in Israel called Checkpoint where they found evidence of...

phishing emails and messages being sent by a very specific Iranian government hacking group targeting Israelis, trying to get them to click on links to get access to certain accounts for surveillance reasons. The Israeli government this week also warned Israelis to disable their home surveillance cameras because those were becoming a target for surveillance by Iranian hackers. Yes. So while I would classify, to wrap this in a bow,

Israel as being potentially more sophisticated, Iran in some ways has a wider apparatus and really no fear of throwing everything at the wall to see what sticks. I think one of the things that's so interesting when I listen to you talk about this is how much this is about a flexing of muscle. Sometimes it is about true...

disruption, Stuxnet being an example, or the Hezbollah pager attacks where, you know, Israel was able to remotely trigger bombs in pagers belonging to Hezbollah members. But sometimes it's

It really feels more subtle than that. Like, it's sort of a psychological thing. Oh, 100%. And, you know, to go back to the top of this interview, talking about the attacks on the banks in Iran, as I said, you know, there could be a lot more chaos caused by those sorts of attacks. You know, you start draining funds.

That's something actually we typically see North Korea do because they're trying to get funding for the regime. But really what was designed with those types of attacks is disrupting the average person's day, making them resentful that their government cannot protect them from those sorts of attacks and just causing fear that, you know, they're being outnumbered by an adversary.

or outmaneuvered, I should say, by an adversary. And really, sometimes it really is about the messaging. And, you know, I think that's actually the vast majority of cyber attacks is more about messaging or more about financial gain than about actual disruption. I want to tease out a little bit the difference between state actors, state-sponsored actors, actors who are sympathetic to a state, like...

There seem to be many layers here, both of deniability, but then also like who's actually doing what? Like how much does it matter what the state does and what a group of hacktivists who are aligned with the state's goals do?

That is a good question, and I can answer that for days, but I'll try to boil that down. It really depends on the country you're talking about. So if you're speaking about the U.S., for example, the U.S. has very highly sophisticated cyber capabilities to bring to bear, but the government almost

almost entirely keeps those under wraps. And if it does carry out cyber attacks on other nations, almost never claims credit for it, again, as a diplomatic reason. Obviously, if a direct government directive from the top is seen against another country, you could say that is an act of war.

So what's very interesting, though, is that in certain countries, not the U.S., but in countries such as Iran, such as Russia, cybercriminal groups that are not getting direct, you know, directives from the top or even government officials, but are perhaps sympathetic to that government or regime, you know, they decide they want to carry out mostly lower level attacks. And those governments say,

great, you know, I'm not going to do anything to stop this because it's accomplishing my goals of messing with this enemy. However, it's not a government group. So the other nation has less, I guess, internationally sanctioned options to respond. So it is kind of a complex environment. Of course, in some cases, for example, China, most of those groups that, you know, maybe in Russia might be cyber criminal groups are all

almost entirely actually affiliated with the Chinese government in reality. So it often really does depend on the country you're talking about. After the break, even NATO can't quite figure out when cyber war becomes war war. This episode is brought to you by Discover.

It's smart to always have a few financial goals. And here's a really smart one you can set. Earning cash back on what you buy every day. With Discover, you can. Get this. Discover automatically matches all the cash back you've earned at the end of your first year. Seriously. All of it. Discover trusts you to make smart decisions. After all, you listen to this show. See terms at discover.com slash credit card.

This episode is brought to you by Agency. While single agents can handle specific tasks, the real power comes when specialized agents collaborate to solve complex problems. But there's a fundamental gap. There is no standardized infrastructure for these agents to discover, communicate with, and work alongside each other.

That's where Agency comes in. The Agency is an open-source collective building the Internet of Agents, a global collaboration layer where AI agents can work together.

It will connect systems across vendors and frameworks, solving the biggest problems of discovery, interoperability, and scalability for enterprises. With contributors like Cisco, Crew AI, Langchain, and MongoDB, Agency is breaking down silos and building the future of interoperable AI. Shape the future of enterprise innovation. Visit agency.org to explore use cases now.

That's A-G-N-T-C-Y dot O-R-G.

Whether you're gearing up for back-to-back meetings or tackling an endless to-do list, your morning sets the tone for it all. That's why I should start with the perfect cup of coffee. Enter Trade. I started by taking Trade's quiz, which consists of a few questions that help determine your coffee recommendations. I love how simple Trade makes it to discover new roasters and coffees to try. The descriptions make it exciting to figure out which bag suits you, and it makes it easy to try something new without feeling overwhelmed by all the options available.

Trade's experts have taste-tested thousands of coffees to curate over 450 amazing roasts. If that first bag isn't quite right, Trade will replace it for free until they nail it. Plus, you're supporting local roasters. It's a win-win. Right now, Trade is exclusively offering What Next TBD listeners 50% off your one-month trial at drinktrade.com slash TBD.

That's drinktrade.com slash TBD for 50% off your one month trial. drinktrade.com slash TBD. What do we know? And I recognize this is a delicate question about whether the U.S. and Russia are participating in any of the cyber attacks that are going on around the Israel-Iran conflict right now.

When it comes to Russia, there hasn't been too much in terms of evidence that Russian cyber criminal groups and certainly the Russian government have directly weighed in so far in terms of attacks against an uptick, I should say, in attacks against Israel or the U.S. in direct conflict.

reaction to the war between Israel and Iran. I should note that there has been an uptick in attacks or attempts by Russia since the war in Ukraine began in 2022. However, the U.S. almost 100 percent is indeed supporting Israel in this. And I can say that because following the strikes of this past weekend by the U.S. on Iran, the chairman of the Joint Chiefs of Staff, General Kane, said at the

the nation's cyber-offensive wing. General Kane said that they were directly involved in supporting the mission. Did not offer details. Nobody is offering details. However, the fact that they were mentioned among a few other Pentagon operations is very telling.

Also, there has been a long history. They wouldn't mention that if they didn't want you to know. Exactly. You hear Cyber Command dropped in and your ears perk up a little bit because I would say it's probably up there almost with the CIA in terms of secretive operations. That being said, you know, as the U.S. and Israel have one of the tightest cooperative partnerships on cybersecurity, I mentioned Stuxnet, you know, going back to all the way to 2009, almost certainly before then.

I know, for example, after the October 7th, 2023 attacks, the U.S. Cybersecurity and Infrastructure Security Agency, which is under the Department of Homeland Security and is sort of the counterpart to U.S. Cyber Command, it's the nation's cyber defense agency. So they helped to prepare critical groups. They directly offered assistance to Israel.

directly following the October 7th attacks to help Israel step up their defenses, to help monitor, to help provide resources. Given how closely the U.S. and Israel have always cooperated on cyber threats and also physical threats, it would be extremely surprising to me if we weren't quite embedded with them. It feels like there is a delicate balance here, though, and I'm really trying to understand this. I hope you can help me here, where

Cyber attacks are a threat. They are a display of psychological muscle. But then they can also do real damage. And I wonder if there is a point at which different countries, including the U.S., hold back or if there is kind of a line that is crossed where it's like, oh, you took out our X or Y reactor defense, what have you, and that is a real move of war.

Oh, absolutely. It's been an active discussion by the international community for many years. And in some ways, they've taken steps. So, of course, this week we had the NATO summit meeting in The Hague. And, you know, Article 5 a couple years ago, NATO's cornerstone pillar, which ensures that if one member of NATO is attacked, the others come to its aid, that article was expanded a couple years ago to include a cyber attack.

Now, it is quite nebulous language in terms of what cyber attack would trigger that. But in my conversations with experts over the years on this topic, it really has come down to, are people killed? Are people dead? And that could happen if you have, for example, widespread coordinated attacks on hospitals.

knocking them out of the ability to give patient care. There have actually been around the world, especially during COVID, deaths attributed to mostly cybercriminal ransomware attacks on hospitals that were under stress during a pandemic and people weren't able to get the support they needed at the time and unfortunately lost their lives. Attacks on the NHS in England.

Yes, a very good example. And another one would be one that really just disrupted lives in every way for long periods of time. You know, I personally can't imagine that if, for example, the Russian government was directly tied to a cyber attack that took out the grid for the city of New York, of New York City, I should say, for any amount of time that we would not respond in some way. And

The U.S. has responded in certain lower ways that, you know, I always find it fascinating when some of the details of cyber command activities do trickle out. The one I always give as an example. So, of course, in 2016, there was widespread Russian involvement in trying to sway U.S. elections.

Two years later, during the U.S. midterm elections in November of 2018, interestingly enough, the power for the section of the neighborhood in Russia where the Internet Research Agency, which is the Russian government's main, I guess you could say, troll farm behind most of their disinformation operations is,

They lost power for the entirety, about eight hours of the time that the U.S. citizens were voting. And it really made it very difficult for them to carry out operations. And while at the time Cyber Command said nothing on it, denied being involved, a couple months later, President Trump in his first term actually confirmed that it was the U.S. It was U.S. Cyber Command behind that. And I think that was a really interesting operation because as far as we know, nobody was killed. Nobody was harmed. It was isolated.

is obviously extremely targeted to that building. But, you know, there is a reason the U.S. didn't immediately take attribution because they're directly interfering with a government-sanctioned operation in Russia. So it's really interesting. But that is a line in the sand, and I think it's going to be one of those issues

situations, I hate to say it, that we'll know it when we see it, if we ever do, of what really does constitute an act of war. And then I think the international community will really have to fully take a stand and stop debating what that means if we see an attack that devastating. While you and I are talking at this moment, we're in this tenuous ceasefire. In a moment like this, do cyber attacks continue? Or do they stop too when outright military action stops?

Well, that's the question I've been trying to answer. And so far, at least in terms of the reports that I'm getting and conversations that I'm having from especially industry, that's really the ones that are focused on this. The answer is no. Cyber attacks are still ongoing. Threats are still ongoing. And of course, since the strikes over the weekend by the U.S. and Iran, at least probing by pro-Iranian or Iranian government agents

hackers on U.S. networks has, by one industry report that I reported on a few days ago, 800 times gone up against the U.S. So there is certainly a lot of activity in the digital space. And again, you know, as we've said, a lot of this could be very low-level threats, more messaging, more data collection, surveillance.

But because there isn't really a line in the sand on this, you know, it's one of those hybrid threats that can go on and not necessarily break the ceasefire like bombing can. There is also the complicated question of what America itself is doing to its own cyber capabilities.

Much of the work of the DOGE staff has involved centralizing data from across government agencies, creating a large data lake that might hold Americans' information from the IRS, the Social Security Administration, and the Department of Homeland Security. I asked Maggie if centralizing data like that was a cybersecurity risk.

1,000 percent yes. Anytime you have that much of a treasure trove, you could say, of data, that's going to be a major focus of cyber criminals that are trying to steal that data, sell it on the dark web of foreign governments trying to steal data on certain Americans. It really puts a target on that trove of data. And that's been, I mean, there's

many, many concerns associated with creating this sort of database in terms of surveillance. But also it's been pointed out by members of Congress, by people in the cybersecurity community, that unless, you know, you're putting your absolute best on that, that unless you're really focused on securing that database,

I'd be surprised if at some point we don't see a breach. I would also note that, you know, since you mentioned Doge, there's, you know, been huge changes to the federal government in Washington in terms of the size of the federal government. The Trump administration's cuts have targeted America's cybersecurity professionals.

One of the agencies that's been really gutted has been Cybersecurity and Infrastructure Security Agency under DHS. They've had one-third of their workers laid off. They've had to stop most of their state outreach to help states secure critical infrastructure. They also were involved in securing elections. All that work has been halted.

And they currently are without senior leadership. You know, it's not an easy workforce to replenish if there's ever an effort to reverse course. Maggie Miller, thank you so much for coming on. Thanks so much for having me. Maggie Miller covers cybersecurity for Politico. And that is it for our show today. What Next TBD is produced by Patrick Fort and Shana Roth. Our show is edited by Evan Campbell. TBD is part of the larger What Next family.

If you want to check out more Slate podcasts, listen to this week's episode of The Discourse, which is our special Slate Plus only episode from the What Next TBD team. This week, we're talking about what the President of the United States and Will Arnett have in common. Yeah, they are both starting their own mobile phone carriers. We'll also be back on Sunday with an episode about why the FTC is putting political restrictions on an ad merger. One hint, it involves Elon Musk.

All right. I am Lizzie O'Leary. Thank you so much for listening.