Skip to content
Ready for your next security review? Take the Industrial Security Check

Hackers Target U.S. Defense Contractors After Iran Strikes

Listen: Hackers Target U.S. Defense Contractors After Iran Strikes
2:06

In the wake of U.S. military strikes on Iranian nuclear sites, Iran’s cyber response has kicked into high gear — and cleared defense contractors are in the crosshairs. These state-sponsored hacking groups are now actively targeting U.S. defense contractors and critical infrastructure sectors with a surge in cyber operations. Their mission: disrupt operations, steal secrets, and stay hidden long enough to spy.

Who’s at risk

Organizations holding Facility Security Clearances are at increased risk, particularly those involved in defense, aerospace, and energy sectors. Even subcontractors or smaller cleared facilities aren’t off the radar. If your work touches national defense, even indirectly, you’re a target.

How they’re attacking

These hackers aren’t subtle. Here’s what they’re using to get in and cause damage:

  • Phishing: Credential harvesting via sophisticated lures
  • Exploitation: Targeting unpatched internet-facing systems
  • Malware: For exfiltration and long-term access
  • Denial-of-service: Disruption of operations and systems

What to do now

Act fast. Start with these steps:

  • Enhance email security
    • Implement anti-phishing detection tools
    • Train staff on spotting suspicious messages
  • Update systems
    • Prioritize software updates
    • Ensure systems are current with the latest security patches
  • Strengthen access controls
    • Use multi-factor authentication
    • Review who has access – and why
  • Monitor networks
    • Set up alerts for unusual activity
    • Review incident response protocols
  • Report incidents early
    • Report any suspicious activity to your company’s Facility Security Officers or your ISI Assistant Facility Security Officer immediately

How ISI can help

We’re actively monitoring the situation and ready to support your team:

  • Run targeted security assessments
  • Provide up to date threat awareness training
  • Build or refine your incident response plan
  • Coordinate with relevant authorities if needed

These aren’t theoretical threats, they’re happening now. The sooner you act, the better you can protect your team, your data, and national security.

 

 

 

 

 

 

 

Related Posts