Iran increased cyber-security spending 12-fold since 2013

Iran is improving its cyber capabilities faster than experts ‘would have ever imagined’ and increased cyber-security spending 12-fold since2013.

The British Business Insider published an interesting post on the Iranian cyber capabilities, according the experts the Government of Teheran is improving expertise in the cyber domain faster than experts ‘would have ever imagined’.

Iran is secretly working, let me add like every other government, to a new generation of cyber weapons that could cause serious damages to critical infrastructure of foreign governments and that could be used to penetrate their networks.

It’s my opinion that Iran today represents a threat exactly like Russia, China and North Korea.

According to  the research firm Small Media, Iran increased cyber-security spending 12-fold since President Hassan Rouhani gained power in 2013. I suggest you to give a look to the report released by experts at Small Media. Vowing to ramp up the country’s cyber capabilities, Rouhani has given the Islamic Revolutionary Guard Corps (IRGC) an annual cybersecurity budget of roughly $19.8 million.

“Vowing to ramp up the country’s cyber capabilities, Rouhani has given the Islamic Revolutionary Guard Corps (IRGC) an annual cybersecurity budget of roughly $19.8 million.” states the Business Insider.

Iran is training a new generation of cyber soldiers, According to a report released in 2013 by the Middle East Media Research Institute, by November 2010, the Basij Cyber Council had trained 1,500 cyber-warriors who, according to IRGC commander Hossein Hamedani, “have assumed their duties and will in the future carry out many operations.”

According to the Business Insider, experts have assisted to an escalation of the Iranian Investment after the discovery of the Stuxnet virus, a cyber weapon designed to cause serious damage to Iranian nuclear program.

By analyzing the problem in the future perspective, I personally consider more dangerous the Iranian cyber capabilities than its nuclear program. Cyber weapons could be destructive exactly like conventional weapons by their use presents numerous advantage, first of all the difficult attribution in the case of attack.

Another element of concern of the Iranian cyber growth is the alleged support received by the Russia, a country considered one of the most active in the Information Warfare.

“Russia has probably helped Iran a lot in stepping up its cyber capabilities in the event of a conflict with NATO,” Kennedy said. “If they [the Iranians] want to topple the US’ financial sector, or cripple the military’s ability to communicate, they can do that.” cybersecurity expert David Kennedy, founder of information security firm TrustedSec, told to the Business Insider.

A fundamental distinction between hacking campaign run by Iranian state-sponsored hackers and their Chinese and Russian peers, it that Iran cyber units mainly operated to sabotage and destroy targets, while Russia and Chiana are more focused in cyber espionage motivated by competitive advantage or monetary gain.

Exactly like Chinese Government, also the Iranian authorities sustain programs to bring young people to the doctrine of hacking. The cyber security expert Jeff Bardin, of the greatest experts in cyber-jihad and with deep knowledge of the military operations conducted by states in the Middle East, told to the Business insider that Iran promote hacking culture through its top technological university.

“At the Sharif University of Technology, which is like the MIT of Iran, students are participating in cyber ‘capture-the-flag’ games to hone their hacking skills,” said Jeff Bardin, chief intelligence officer of cyber intelligence firm Treadstone 71. “They compete to see who can find security holes and break through servers’ encryptions and firewalls the fastest.”

“It’s all highly institutionalized,” Bardin said. “The irony is that, after looking at some of the professors’ resumes, you’ll see that most of these cyber experts teaching students how to hack were initially trained in the US or UK.”

The Government of Teheran also offers students internships with popular Iranian hacker groups, sustaining their participation in the programs of national cyber defense.

Pierluigi Paganini

(Security Affairs –  Iran,  Information Warfare)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

18 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

19 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

24 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.