Current Cyber Threat Level
The Iran conflict has significantly elevated cyber risks for ordinary people and businesses:
- Iran-linked group Handala claimed a cyberattack on US medical company Stryker (TIME, March 12)
- Dozens of pro-Iran hacktivist groups are actively targeting US and allied infrastructure (Palo Alto Unit 42)
- Fitch Ratings warned of attacks on US critical infrastructure and public entities (Cybersecurity Dive)
- Attacks have been claimed on Israeli payment systems, Kuwaiti government websites, and airport services (Axios, March 11)
What’s Being Targeted
High-priority targets:
- Financial services and banking systems
- Hospital and healthcare networks
- Water and power utilities
- Transportation systems
- Government services
What this means for you:
- Online banking could experience outages or disruptions
- Hospital systems could face delays in processing
- Government services (DMV, social security portals) may have intermittent issues
How to Protect Yourself
Immediate steps everyone should take:
- Enable two-factor authentication (2FA) on all financial accounts, email, and social media
- Monitor your bank and credit card accounts daily for unauthorized transactions
- Be extra cautious of phishing emails — attackers are using Iran war themes as lures
- Update your passwords if you haven’t recently, especially for banking and email
- Keep your devices updated — install the latest security patches
Watch out for:
- Emails claiming to be from your bank about “security updates” related to the conflict
- Fake donation requests for war relief
- Links claiming to show “exclusive” war footage
- Text messages about “account suspicious activity”
For businesses:
- Ensure backup systems are up to date
- Brief employees on phishing awareness
- Review incident response plans
- Monitor network traffic for unusual patterns
Should You Be Worried?
For most individuals, the direct risk is low but not zero. The bigger risk is indirect — phishing attacks and scams that exploit the conflict as a theme. Stay vigilant, keep your security basics strong, and you’ll be well-protected.
Sources: TIME, Palo Alto Networks Unit 42, Cybersecurity Dive, Axios