• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechData Sheet

Missile Strike vs. Cyberattack: How Iran Retaliates

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
January 8, 2020, 11:36 AM ET

This is the web version of Data Sheet, Fortune’s daily newsletter on the top tech news. To get it delivered daily to your in-box, sign up here.

After the U.S. killed top Iranian military commander Qassem Suleimani in a drone strike on Jan. 2, Iran’s leaders vowed to take revenge.

Retaliation arrived last night. In the early hours of morning local time, the Iranian military fired more than a dozen missiles at two Iraqi bases housing U.S. troops, chief Pentagon spokesperson Jonathan Hoffman confirmed in a statement. No troops were harmed in last night’s attack, President Donald Trump said at a Wednesday morning press conference, while announcing additional economic sanctions on Iran.

Until last night, speculation had run rampant about what form Iran’s potential retaliation might take. Among the most frequently cited possibilities were cyberattacks. (See all the coverage.)

Iran was in a tricky situation. It was expected to display a show of force, but not so strong that it would provoke an outsized response. Iran’s Supreme Leader Ayatollah Ali Khamenei had stipulated that retaliation must be “direct and proportional” to the U.S.’s attack, according to the New York Times. An airstrike might fall within those parameters.

“Iran took & concluded proportionate measures in self-defense,” said Iranian foreign minister Mohammad Javad Zarif in a tweet. “We do not seek escalation or war, but will defend ourselves against any aggression.” (Iranian state media reported, without presenting evidence, that 80 soldiers were killed and 200 more wounded in the strike.)

The thing about cyberattacks: They’re less showy than missiles, and they require ample preparation. “Cyber is not a magic button. It takes a lot of planning, particularly for it to be something proportional to the killing of a top leader in your country,” says Oren Falkowitz, a National Security Agency alumnus who runs the cybersecurity startup Area 1 Security. “Most of the things you can do quickly are ankle-biting or uninspiring.” (See, for instance, the recent defacement of an obscure U.S. government website.)

If Iran had hooks in critical infrastructure in the U.S. that could be turned toward destructive (or, in the worst case, lethal) ends, its hackers still might wish to hold their fire. That’s because when attackers exploit network vulnerabilities to cause damage, they are effectively burning their assets, says Jake Williams, another ex-NSA hacker who leads the cybersecurity firm Rendition Infosec. “They’re gonna want to save bullets to fire later,” he says, especially if physical warfare remains a possibility.

This isn’t to say that cyberattacks can be dismissed. The U.S. Department of Homeland Security has warned businesses to be on the lookout for Iranian cyber threats. Iranian disinformation and digital intrusions have been ramping up for months since tensions began flaring with the U.S., according to Sandra Joyce, head of global intelligence at cybersecurity firm FireEye. Some previous examples of Iranian cyber might: Its hackers are believed to have used malware to destroy tens of thousands of computers at Saudi Aramco in 2012, to have pummeled companies like Bank of America and JPMorgan Chase with so-called distributed denial of service attacks around the same time, and to have infiltrated a dam north of New York City soon after.

Iran is likely to continue trying to penetrate U.S. and other foreign businesses. Every precaution should be taken to secure networks against intrusion.

Robert Hackett

Twitter: @rhhackett

Email: robert.hackett@fortune.com

THREATS

Pick up the phone. The FBI requested help from Apple to bypass the "lock" screens on two password-protected iPhones believed to have belonged to a Saudi national who killed three people in a shooting at Naval Air Station Pensacola, Florida, last month. Apple said in a statement that it had given the law enforcement agency "all of the data in our possession." The incident echoes the FBI's attempts to compel Apple to assist in accessing the contents of an iPhone used by a terrorist in San Bernardino, Calif., in 2015.

Put the money in the bag. Hackers are holding Travelex, the foreign money exchange, for ransom. The company's websites have been down across Europe, the U.S., and Asia since Dec. 31st, the date of the alleged ransomware attack. The sites display a message that they are temporarily inaccessible due to "planned maintenance."

Don't touch that dial. Facebook is banning "deepfakes," hyper-realistic video forgeries from its websites and apps, though the company will still permit ones created for the purposes of parody or satire. Meanwhile, the New York Times got its hands on an internal memo penned by Facebook's head of virtual reality, Andrew Bosworth, urging employees not to use their privileged access to Facebook's systems to mess with President Donald Trump's reelection campaign. 

Going once, going twice, sold. Consulting firm Accenture has agreed to buy Symantec's cybersecurity services business for an undisclosed sum. Intent on continuing to beef up its cybersecurity chops, Accenture is acquiring the unit from Broadcom, a chipmaker which bought the assets from Symantec in the fall for $10.7 billion. Broadcom is retaining Symantec products relating to so-called endpoint security and data loss prevention.

"Let's see who this really is." (spoken in best Fred from Scooby-Doo voice)

ACCESS GRANTED

Disinformation is a fast-growing threat. Look no further than the subterranean world of "black PR," a shady industry in which people pay unscrupulous firms to propagate fake news. BuzzFeed News and the Reporter, a Taiwanese investigative news site, teamed up to expose the manipulative marketing tactics. 

Peng Kuan Chin pulled out his phone, eager to show the future of online manipulation.

Unseen servers began crawling the web for Chinese articles and posts. The system quickly reorganized the words and sentences into new text. His screen displayed a rapidly increasing tally of the articles generated by his product, which he dubs the “Content Farm Automatic Collection System."

With the articles in hand, a set of websites that Peng controlled published them, and his thousands of fake social media accounts spread them across the internet, instantly sending manipulated content into news feeds, messaging app inboxes, and search results. "I developed this for manipulating public opinion,” Peng [said].

FORTUNE RECON

How Close Is Iran to Building a Nuclear Bomb? by Jonathan Tirone

My Predictions for Artificial Intelligence in 2020 by Jonathan Vanian

PlayStation 4 Becomes Second Best Selling Home Video Game Console of All Time by Chris Morris

The Driverless Car Moonshot Is Over by Clifton Leaf

Viral Video App TikTok Is Here to Stay by Polina Marinova

Pharma Needs to Stop Chasing Shiny Objects and Start Embracing Practical Technology by Paul Hudson

ONE MORE THING

How—and why—do U.S. government agencies generate codenames? The methods and motives vary between the FBI, CIA, and Secret Service, as this story in Mel magazine, a men's magazine founded by the CEO of Dollar Shave Club, explains. For kicks and giggles, here are some presidential monikers: "Lancer" (JFK), "Rawhide" (Ronald Reagan), "Tumbler," then "Trailblazer" (George W. Bush), "Renegade" (Barack Obama), and "Mogul" (Donald Trump).

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

AICollaboration
Are you a cyborg, a centaur, or a self-automator? Why businesses need the right kind of ‘humans in the loop’ in AI
By François Candelon, Katherine Kellogg, Hila Lifshitz and Steven RandazzoJanuary 30, 2026
26 minutes ago
HealthScience
As billionaires chase immortality, this startup cofounded by a Harvard genetics professor gets FDA approval for the first partial de-aging human trial
By Marco Quiroz-GutierrezJanuary 30, 2026
2 hours ago
A man works on two computers while a coworker looks on in the background.
AIGen Z
Gen Z believes using AI is making their colleagues dumb and lazy, but may paradoxically see it as key to their own promotion, Wharton says
By Sasha RogelbergJanuary 30, 2026
2 hours ago
Big TechApple
Apple’s blowout Q1 results were a reminder of what makes the company so impressive—and why it’s floundering in AI
By Alexei OreskovicJanuary 29, 2026
9 hours ago
C-SuiteFortune 500: Titans and Disruptors of Industry
Pfizer CEO says he used ‘emotional blackmail’ to get employees to achieve impossible goals during COVID-19
By Eva RoytburgJanuary 29, 2026
10 hours ago
ICE
CybersecurityMilitary
Only 4 democracies have created paramilitary police squads since 1960—if you include ICE
By Erica De Bruin and The ConversationJanuary 29, 2026
13 hours ago

Most Popular

placeholder alt text
North America
'I meant what I said in Davos': Carney says he really is planning a Canada split with the U.S. along with 12 new trade deals
By Rob Gillies and The Associated PressJanuary 28, 2026
2 days ago
placeholder alt text
Politics
The American taxpayer spent nearly half a billion dollars deploying federal troops to U.S. cities in 2025, CBO finds
By Nick LichtenbergJanuary 28, 2026
2 days ago
placeholder alt text
C-Suite
Jeff Bezos capped his Amazon salary at $80,000: ‘How could I possibly need more incentive?’
By Sydney LakeJanuary 28, 2026
2 days ago
placeholder alt text
C-Suite
Fortune 500 CEOs are no longer giving employees an A for effort. Now they want proof of impact
By Claire ZillmanJanuary 28, 2026
2 days ago
placeholder alt text
Investing
Jerome Powell got a direct question about the U.S. ‘losing credibility’ and the soaring price of gold and silver. He punted
By Eva RoytburgJanuary 29, 2026
21 hours ago
placeholder alt text
Personal Finance
Current price of silver as of Thursday, January 29, 2026
By Joseph HostetlerJanuary 29, 2026
21 hours ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.