Business, Free News Articles, Reports and Studies

Treadstone 71, LLC releases details of hybrid operations and cognitive warfare actions by Iran

HALF MOON BAY, Calif. -- Treadstone 71, LLC, your primary source for cyber intelligence and counterintelligence training and services, released in-depth details of Iranian intelligence-backed hybrid operations and cognitive warfare actions.

"Iranian intelligence uses social media to threaten and impersonate dissident groups, blatantly violating platform rules. Known intelligence operators openly working in cyberspace use social media for command and control. For example, they issue instructions to Basij Cyber Battalion members to start cyber operations against opposition groups such as the National Council of Resistance of Iran (NCRI)," stated Jeff Bardin, Chief Intelligence Officer at Treadstone 71.

"Basij Cyber Battalions execute plans on Twitter using pre-defined hashtags manipulating social media. These actions combined with physical infiltration of Iranian protests and demonstrations and distributed denial of service attacks shows a hybrid warfare approach to Iranian regime attacks against any opposition, internal and external."

Treadstone 71 accessed the Iranian intelligence playbook for infiltrating protests. We found Iranian intelligence operators regularly infiltrating demonstrations, perverting protester messaging with divergent disinformation. Basij Cyber Battalions follow Telegram instructions describing how to avoid suspension on Twitter, while the regime develops devious ways to subvert and quash free speech. The plans include threatening messages and warnings on sites such as Telegram, Skype, Whatsapp, and Twitter, issuing instructions to execute cyber operations, how to create and manage fake social media accounts that impersonate media personalities, journalists, opposition leaders, and politicians while spreading false information that demonizes anything and anyone contrary to Islamic Republic's ideals.

"We discovered Iranian leadership openly discussing how to bypass Twitter API rules to programmatically post false information in 'psycho 'operations' using US-based infrastructure, continued Bardin. The operations succeeded in impersonating influencers while getting influencer followers to believe the fake posts, retweeting and liking the posts creating Twitter trends."

One of the methods used extensively by Iran's cyber operations is using personas presenting themselves as dissidents to create division between opposition groups and to use IRGC and MOIS demonization operations against prominent opposition groups. Under the pretext of internal hostility, they can advance the demonization operation against the main opposition and create deviant waves to divert public opinion from essential developments. A technique previously reported by Treadstone 71, now used in more complex and advanced methods.

Based on years of analysis and research on Iran's cyber operations, many signs recently showed a new wave of cyber activity, simultaneous with international developments and days before the scheduled annual summit of Iranian dissidents. With Putin's visit to Iran, Treadstone 71 expects Russian participation in anti-dissident operations.

The Treadstone 71 report available on https://treadstone71.com/ and via the https://cybershafarat.com/, includes information on the building of the Basij Cyber Battalions, the National Information Network and supporting data filtration and security system, Dezhfa, and the translated instructions on how to post on Twitter to avoid suspension.

About Treadstone 71, LLC

Treadstone 71's Certified Threat Intelligence and CounterIntelligence Analyst Certifications and the Intelligence Roadmap are the industry's gold standards derived from academia, the intelligence community, and Treadstone 71's experience in building cyber and threat intelligence programs at Fortune 500 organizations worldwide. We created the cyber intelligence program at Utica University! We crafted the cyber intelligence, counterintelligence, and cybercrime courses. We seamlessly extend your cyber threat intelligence team using targeted adversary research and analysis. We help you remove the risk and burden of internal organizations looking to forecast and prevent malicious cyber activity against your assets.

Learn more at: https://treadstone71.com/

MULTIMEDIA:

VIDEO (YouTube): https://youtu.be/YGWf06-5zKY

Related link: https://www.treadstone71.com/

This news story was published by the Neotrope® News Network - all rights reserved. ID:NEO2022