Skip to main content
Ars Technica

Ars Technica

Newspaper | United States | Centre

Technology news and analysis covering IT, science, gaming, and tech policy with in-depth reporting.

Engagement Insights

8
Discussions
0
Participants
0
Total Votes
278
Articles

Discussions from Ars Technica

Geopolitics

How should countries work together to protect against cyber attacks in conflicts?

Iranian hackers are now taking their psychological warfare tactics directly to government officials and employees at major companies. Why it matters: Even unproven threats from Iranian hackers can create fear, uncertainty and doubt — draining attention and forcing targets to divert time and resources from their own operations. Driving the news: In the last week, Iran-linked hackers paired two data leaks with intimidation tactics aimed at individuals. Handala Hack Team — a pro-Iran hacktivist group linked to Iran's intelligence services — leaked a trove of emails on Friday purportedly from FBI Director Kash Patel's personal Gmail.The group also released data earlier last week allegedly tied to U.S.- and Israel-based Lockheed Martin employees and claimed it had called workers to share personal details about their families, children and current locations. Yes, but: The Lockheed Martin claims remain unverified. A separate pro-Iran group previously claimed it had breached the defense contractor. A Lockheed Martin spokesperson told Axios at the time the company was "aware of the reports" and "remains confident in the integrity of our robust, multi-layered information systems and data security."A Wired reporter found that many of the phone numbers tied to Israel-based Lockheed Martin employees weren't working. Threat level: Targeting individuals, rather than corporate networks, marks a more aggressive and intimidating turn in Iran's cyber playbook, aimed at eroding trust and shaping public perception during the current conflict. The initial cache of Patel's stolen emails dates between 2010 and 2019 and includes only seemingly innocuous items like travel receipts and family and vacation photos, according to an Axios review of the documents.But digital sleuths have already used those crumbs — including just his Gmail address — to map parts of his online life, surfacing old Google reviews and other accounts. Between the lines: Even recycled or low-value data can force costly

United States