Use your computer fearlessly.




Mission Services Articles Research





everyone: older news


Iran Hacks U.S. with Vengeance

by Brent Kirkpatrick

(Date Published: .)



The U.S. and Iran have been in a cyberwar since June 2019.



On June 24, 2019, BBC News announced that President Trump had ordered cyberattacks on Iranian military installations. No doubt the Iranian retaliation began as soon as the U.S. attacks were attributed to the U.S. Winding back a few months. Let us begin the story in November, 2018. Intrepid Net Computing observed a Linux worm, that we call the Revolutionary Recon worm. This worm appeared near our network on Nov. 8, 2018. We blocked the worm using techniques from incident response. Revolutionary Recon worm's probe, has since been patched. Revolutionary Recon would have spread through much of the United States and the continent throughout November and December of 2018. The worm installed a root-kit, giving the hackers access to all the computers that contracted the worm. Then the hackers waited.

US and Iranian Flag

On June 24, 2019, when the Iranian's received the diplomatic news that President Trump had ordered the cyberattacks that were roiling their military, they would have activated their access to the computers conquered by Revolutionary Recon. Through their access to computers in our country, the Iranian military began their response by hacking the U.S. military. The Iranians appear to have rolled out yet another worm to target military computers. This Linux worm, called Revolutionary Guardian, was also discovered by Intrepid Net Computing. If you believe that your computer or phone is hacked, please do the following in order:

  1. Turn off the computer or phone
  2. Report the hacking to the organization that employs you
  3. If the organization finds a compelling business reason to help you, they may, otherwise leave the computer or phone turned off.
  4. If you need further help, after asking locally, please contact me or anyone at Intrepid Net Computing.


defendIT (TM). AI-driven security measures derived from security incident data.


News Articles

Lebanon Hacks to Spy










What Is New? | Contact | Tips


© 2015-2019 Intrepid Net Computing. All rights reserved.