• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechIran

Beware: Iranian cyberattacks may actually be false flags

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
January 16, 2020, 9:30 AM ET

U.S. officials and cybersecurity experts have been warning businesses to be on alert for Iranian cyberattacks ever since the U.S. killed Qassem Suleimani, a top Iranian general, in an airstrike earlier this month.

In one advisory, the Department of Homeland Security warned of Iranian hackers’ “willingness to push the boundaries of their activities” in cyberspace. In another, obtained by the cybersecurity news outlet CyberScoop, the Federal Bureau of Investigation said it noticed an uptick in “cyber reconnaissance activity“, the kind of computer network poking, prodding, and probing that can enable espionage and other potentially destructive attacks.

For businesses looking to stay out of the crossfire between the U.S. and Iran, the warnings are wise to heed. But they largely neglect to mention another troubling possibility: That hackers sponsored by other nation states could disguise themselves as Iranian intruders—or commandeer Iranian infrastructure—to mask their true identities, steal information, and disperse malware.

Attribution is hard

Sussing out the identities of hackers amid the digital mists can be a challenge. Some government agencies, like the National Security Agency, and certain private sector cybersecurity firms have demonstrated a credible ability to unmask attackers over the years. But the opportunity for ambiguity and mistaken identity lingers.

Given the high tensions with Iran, businesses will be predisposed to see Iranian fingerprints in the traces left by network intruders. But mistaking the origin of hacking attempts, breaches, and leaks, risks amplifying tensions between the U.S. and Iran.

The possibility of false flag operations “injects a lot of uncertainty” in the situation, says Priscilla Moriuchi, director of strategic threat development at Recorded Future, a threat intelligence firm. “There’s a lot of potential for mistaken escalation.”

Raising false flags

The prospect is more than theoretical. One country that has frequently favored false flag operations is Russia. In 2014, suspected Kremlin-backed hackers were believed to have disguised themselves as a hacker-activist group called CyberBerkut while targeting the North Atlantic Treaty Organization with “denial of service” attacks and the Ukrainian government with data leaks. A year later, suspected Russian hackers took a French TV network off the air and defaced its website, claiming to be a group that described itself as the “Cyber Caliphate.”

Russia’s ruses have continued. In 2018, agents of the Kremlin were believed to have temporarily taken down the Wi-Fi at the 2018 Winter Olympics in Pyeongchang, South Korea, and prevented staff from printing or scanning tickets, while pretending to be North Korea. A year later, suspected Russian hackers were said to have hijacked Iranian hacking infrastructure to conduct their own espionage campaigns, as the NSA and U.K.’s National Cyber Security Centre noted in a joint report at the time.

Russia is not the only country to plant false flags, even if it has been pegged as the most frequent offender. When Sony Pictures Entertainment was ransacked in 2014, the hackers, believed to have been backed by North Korea, called themselves the “Guardians of Peace,” ostensibly assuming the cover of some “hacktivist” crew. The United States and Israel, meanwhile, have never said they were behind the Stuxnet cyberattack which took down Iranian nuclear centrifuges a decade ago, though it’s widely believed they were responsible.

Removing the mask

In many cases, hacker groups engaging in false flag tactics, such as those outlined above, have every incentive to generate chaos and confusion about who has done what. Sowing doubts about the provenance of cyberattacks serves to bolster their counter narratives.

Despite this, it’s important to keep in mind alternative possibilities when investigating breaches and assigning blame. Adam Meyers, vice president of intelligence at CrowdStrike, a cybersecurity firm that gained notoriety for attributing data breaches at the Democratic National Committee to Russia in 2016, says that while spies backed by other countries could pose as Iranian hackers, he believes the attackers will ultimately have a very hard time keeping up the subterfuge.

“Attribution is a difficult problem,” Meyers acknowledges, but it is a tractable one, he says. The challenge “can be addressed by using rigorous analytic controls and tools and making sure to have checks and balances to account for bias and incorrect assessments.”

In the span of time between discovering a hacking attempt and piecing together a whodunnit, investigators should take pains to ensure they’ve got it right. Otherwise, misattributions could lead to dangerous intensifications of conflict between nation states.

“If the government is expecting Iranian intrusions, they’ve got to be certain they’re actually seeing Iranian state sponsored activity and not Russians masquerading as Iran,” Moriuchi says.

More must-read stories from Fortune:

—Greenpeace ranks China’s tech giants on renewable energy
—Sex tech steals the spotlight at CES
—Why there are so many scooters in Los Angeles
—What a $1,000 investment in 10 top stocks a decade ago would be worth today
—Best of CES 2020? Tech sites’ opinions differ wildly
Catch up with Data Sheet, Fortune’s daily digest on the business of tech.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
Fortune Secondary Logo
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

PoliticsColleges and Universities
Pentagon chief blocks officers from attending Ivy League schools and other top universities, including partners on AI and space
By Jason MaFebruary 28, 2026
2 hours ago
AIAnthropic
Anthropic CEO Dario Amodei says ‘we are patriotic Americans’ committed to defending the U.S. but won’t budge on ‘red lines’
By Jason MaFebruary 28, 2026
7 hours ago
sarandos
InvestingMedia
3 things we will never know after Netflix pulled out of the Warner Bros. bidding, handing it to Paramount
By Nick LichtenbergFebruary 28, 2026
10 hours ago
OpenAI CEO Sam Altman
AIAnthropic
OpenAI sweeps in to ink deal with Pentagon as Anthropic is designated a ‘supply chain risk’—an unprecedented action likely to crimp its growth
By Jeremy KahnFebruary 28, 2026
10 hours ago
Big TechAmerican Politics
Your spend as a ‘weapon’: Scott Galloway’s ‘Resist and Unsubscribe’ movement asks you to ditch Amazon, Apple, and Netflix to oppose Trump
By Kristin StollerFebruary 28, 2026
14 hours ago
world's fair
CommentaryRobots
Something big is happening in AI, but panic is the wrong reaction
By Peter CappelliFebruary 28, 2026
15 hours ago

Most Popular

placeholder alt text
Success
Japanese companies are paying older workers to sit by a window and do nothing—while Western CEOs demand super-AI productivity just to keep your job
By Orianna Rosa RoyleFebruary 27, 2026
1 day ago
placeholder alt text
Middle East
Iran is now on 'death ground' amid existential threat from U.S. attacks and could 'go big' in retaliation, former NATO commander warns
By Jason MaFebruary 28, 2026
8 hours ago
placeholder alt text
Success
Walmart exec says U.S. workforces needs to take inspiration from China where ‘5 year-olds are learning DeepSeek’
By Preston ForeFebruary 27, 2026
2 days ago
placeholder alt text
AI
The week the AI scare turned real and America realized maybe it isn't ready for what's coming
By Nick LichtenbergFebruary 28, 2026
16 hours ago
placeholder alt text
Personal Finance
Current price of gold as of February 27, 2026
By Danny BakstFebruary 27, 2026
1 day ago
placeholder alt text
Law
China's government intervenes to show Michigan scientists were carrying worms, not biological materials
By Ed White and The Associated PressFebruary 26, 2026
2 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.