
Iraqi Shiites shout slogans as they carry a portrait of Iran’s Supreme Leader Ayatollah Ali Khamenei and wave Iran flags during a protest against US and Israeli attacks on Iran at a bridge leading to Green Zone where the US embassy is located, in Baghdad on February 28, 2026. Several hundred people protested against the US-Israeli strikes on Iran near the US embassy in Baghdad on February 28, AFP journalists said.
Ahmad Al-rubaye | Afp | Getty Images
As geopolitical tensions escalate in the Middle East, cybersecurity experts are issuing increasingly urgent warnings about potential retaliatory cyberattacks emanating from Iran targeting U.S. businesses and critical infrastructure. The current climate presents a heightened risk, with some analysts suggesting it could be a critical window for Iran to deploy its cyber capabilities.
“From a timing perspective, it’s now or never,” stated Pavel Gurvich, founder and CEO of cybersecurity startup Tenzai. “In that sense, the danger is meaningfully higher.” Gurvich elaborated that Iran may have strategically stockpiled capabilities, awaiting a moment of significant vulnerability to launch its offensive. This strategic timing is crucial, as successful attacks during such periods can yield disproportionately significant political and economic impact.
Following recent U.S. and Israeli strikes in the region, Iran has amplified its retaliatory actions, reportedly targeting U.S. military installations, diplomatic facilities, and key economic hubs including Tel Aviv, Doha, and Dubai. This escalation underscores the interconnected nature of conventional and cyber warfare, where physical actions can directly trigger digital responses.
The specter of an Iran-linked cyberattack poses a critical challenge to the United States, particularly at a time when the Cybersecurity and Infrastructure Security Agency (CISA), the nation’s primary readiness body, is navigating significant internal turmoil. Reports indicate a partial government shutdown, furloughs, and a recent management reshuffle that could potentially impair its ability to effectively detect, deter, and respond to sophisticated cyber threats.
Navigating CISA’s Uncertain Landscape
U.S. Homeland Security Secretary Kristi Noem testifies before a Senate Judiciary Committee hearing on “Oversight of the Department of Homeland Security,” on Capitol Hill in Washington, D.C., U.S., March 3, 2026.
Kevin Lamarque | Reuters
U.S. Secretary of Homeland Security Kristi Noem affirmed in a recent statement that the Department of Homeland Security (DHS) is collaborating closely with federal intelligence and law enforcement partners to “closely monitor and thwart” any potential threats directed at the United States. This inter-agency cooperation is paramount in a landscape where threats are increasingly multifaceted.
However, CISA itself has reportedly experienced substantial personnel attrition, with estimates suggesting it has lost approximately one-third of its workforce since the current administration took office. Furthermore, the agency’s temporary director, Madhu Gottumukkala, was reassigned to another division within DHS last week. Politico has reported that Gottumukkala’s tenure was marked by internal friction with staff and the termination of significant contracts. His leadership also drew scrutiny over allegations of uploading sensitive documents to ChatGPT and failing a polygraph test administered by CISA staff during an access request.
Adding to these leadership uncertainties, Chief Information Officer Bob Costello announced his departure from federal service via LinkedIn, following earlier reports that he had been asked to resign or accept a different position within DHS. These departures, particularly at senior levels, can disrupt institutional knowledge and operational continuity, critical elements in maintaining a robust cybersecurity posture.
Compounding these challenges, CISA’s public-facing website indicated as of Tuesday afternoon that its content had not been actively managed since February 17th, citing a “lapse in federal funding.” This operational pause means that crucial cybersecurity advisories, threat intelligence updates, and public engagement initiatives may be delayed or suspended. DHS itself had previously stated on February 17th that the agency would be compelled to cancel cybersecurity assessments, alongside other training and engagement activities, due to funding shortfalls. The agency’s website further cautioned, “As the lapse goes on, CISA’s lack of involvement in these key areas will lead to a future threat or an increased area of weakness.”
Lawmakers have also voiced significant concerns regarding the nation’s preparedness amidst the protracted shutdown. House Appropriations Committee Chairman Tom Cole noted last month that CISA’s personnel are already operating under immense pressure, and that a prolonged shutdown would demonstrably hinder the country’s capacity to safeguard vital sectors such as critical infrastructure and healthcare facilities.
The Evolving Cyber Threat Landscape
Even amidst an ongoing national internet shutdown, cybersecurity experts anticipate that Iranian-linked threat actors will continue to operate, leveraging alternative channels such as proxies and Virtual Private Networks (VPNs) to maintain their operational capabilities. This resilience highlights the adaptive nature of state-sponsored cyber operations.
Adam Meyers, counter-adversary operations lead at CrowdStrike, reported a notable increase in claims of network and server disruptions attributed to Iran-linked groups. These sophisticated attacks, he noted, are capable of targeting critical sectors, including financial institutions and essential infrastructure, underscoring the tangible economic and societal risks involved.
John Hultquist, chief analyst at Google’s Threat Intelligence Group, advised that while Iran has a historical tendency to exaggerate the scope and impact of its attacks, and therefore claims should be approached with a degree of skepticism, their capabilities can still inflict substantial damage on businesses. The potential for disruption, even if not always fully realized as claimed, remains a significant concern for the corporate sector.
Jamie Dimon, CEO of JPMorgan Chase, acknowledged the vulnerability of financial institutions, stating in a recent interview that banks are indeed potential targets and predicting a global uptick in cyber and terrorist attacks. Dimon emphasized that his organization consistently prepares for such eventualities, classifying cyber threats as “one of the highest risks banks bear.” This sentiment is echoed across the financial industry, which is increasingly investing in advanced cybersecurity measures.
Iran has previously demonstrated its capacity to breach U.S. targets. In 2024, it claimed responsibility for hacking the emails of several individuals associated with a former U.S. presidential campaign. Furthermore, in 2012 and 2013, Iran was identified as the perpetrator of significant denial-of-service attacks against major U.S. banks, which resulted in widespread website outages, as previously reported. These past incidents serve as stark reminders of Iran’s historical cyber capabilities.
Hultquist observed that the current cyber threat emanating from Iran follows a “familiar pattern.” He articulated, “We expect Iran to target the U.S., Israel, and Gulf Cooperation Council (GCC) countries with disruptive cyberattacks, focusing on targets of opportunity and critical infrastructure.” This strategic focus on high-impact targets underscores the potential for widespread disruption and the critical need for robust, proactive defense mechanisms.
Original article, Author: Tobias. If you wish to reprint this article, please indicate the source:http://aicnbc.com/19647.html