Trace Id is missing

Iran turning to cyber-enabled influence operations for greater effect

 A computer screen with a key and a person's face

Iranian state actors since June have latched on to a new set of preferred techniques, combining cyber and influence operations (IO) – what we refer to as cyber-enabled influence operations – for greater geopolitical effect. Multipole Iranian state groups have turned to cyber-enabled IO more regularly to boost, exaggerate, or compensate for shortcoming in their network access or cyberattack capabilities. More fundamentally, they have combined offensive cyber operations with multi-pronged influence operations to fuel geopolitical change in alignment with the regime’s objectives. This has included operations this year that have sought:

  • To bolster Palestinian resistance
  • Foment Shi’ite unrest in Bahrain
  • Counter the normalization of Arab-Israeli ties1
Featured

Iran surges cyber-enabled influence operations in support of Hamas

Discover details of Iran’s cyber-enabled influence operations supporting Hamas in Israel. Learn how operations have progressed through different phases of the war, and examine the four key influence tactics, techniques, and procedures (TTPs) Iran favors most

Related articles

Iran responsible for Charlie Hebdo attacks

Microsoft is attributing a recent influence operation targeting French magazine Charlie Hebdo to an Iranian nation-state actor Microsoft tracks as NEPTUNIUM.

Propaganda in the digital age: How cyber influence operations erode trust

Survey the world of cyber influence operations, where nation states distribute propaganda designed to threaten the trustworthy information democracy requires to flourish.

Ransomware as a service: The new face of industrialized cybercrime

Cybercrime’s newest business model, human-operated attacks, emboldens criminals of varying ability.

Follow Microsoft Security