‘Intense’ fighting in Mosul as civilians flee
‘Intense’ fighting in Mosul as civilians flee
The special forces backed by US and Iraqi air power took control of two districts of eastern Mosul after heavy fighting in which they destroyed nine cars deployed by ISIS as suicide bombs, the military said.
The military statement said the Counter Terrorism Service took control of the districts of Al-Qadisiya Al-Thania, which it moved into on Friday, and adjacent Al-Arbajiya. But there are still weeks if not months of fighting ahead in the battle to recapture the last ISIS-held Iraqi city, and aid workers have warned that displacement may spike as Iraqi troops push deeper into Mosul.
“The fighting is intense this morning. We’re trying to fortify our positions in Arbajiyah before continuing our attack into Al-Bakr,” said Staff Lt. Col. Muntadhar Salem of CTS, referring to two Mosul areas.
Salem later clarified that the aim was to surround Al-Bakr but not to assault it for now.
Staff Lt. Col. Ali Fadhel also confirmed that objective, saying: “We... are advancing toward Al-Bakr so that we can surround it.”
“There were three car bombs coming out from Al-Bakr toward our positions that we spotted with our drone and hit with our tanks,” Salem said.
The militants are also using drones for observation, one of which was shot down by CTS forces, Fadhel said.
As fighting raged deeper in the city, civilians, some of them carrying white flags, walked toward its outskirts, gathering near an Iraqi military truck that would take them out of the city to safety.
More than 49,000 people have been displaced since the Mosul operation began, the International Organization for Migration said on Saturday.
Aid workers have said that a million or more people could be displaced by the battle for Mosul, meaning that the worst may still be ahead.
IS overran large areas north and west of Baghdad in 2014, but Iraqi forces backed by US-led air strikes have since regained significant ground from the militants.
Infantry and armored division troops also advanced in a nearby neighborhood, destroying three rocket launchers and killing 30 militants, it said in a statement said.
Iraqi troops have been fighting for 10 days inside eastern Mosul, trying to expand their small foothold in the city which ISIS has controlled since mid-2014, when its leader declared a caliphate in parts of Iraq and neighboring Syria.
The nearly four-week campaign to drive ISIS out of the biggest city under its control in either country has brought together an alliance of 100,000 Iraqi fighters, also backed by thousands of Western personnel on the ground.
They have faced fierce resistance from a few thousand militants who have deployed hundreds of suicide car bombers and waves of attacks by snipers, assault fighters and rocket teams.
ISIS has also used a network of tunnels around the city and merged into the civilian population of 1.5 million people still living there, helping it launch surprise raids and ambushes on the troops.
Further south, but still on the eastern fringes, troops from the First Infantry and Ninth Armored divisions attacked the militants in the Salam neighborhood.
Security forces and army troops are also advancing on southern and northern fronts close to the city, aiming to open new fronts inside Mosul to put further pressure on the ultra-hard-line militants.
The attacking forces include Iraqi army troops and special forces and federal police units. Outside the city, Kurdish peshmerga forces are holding territory to the northeast and mainly Shiite paramilitary forces are deployed to the west.
Cybersecurity firm: More Iran hacks as US sanctions loom
- The firm warns that this raises the danger level ahead of America re-imposing crushing sanctions on Iran’s oil industry in early November.
- Iran’s mission to the UN rejected FireEye’s report, calling it “categorically false.”
DUBAI: An Iranian government-aligned group of hackers launched a major campaign targeting Mideast energy firms and others ahead of US sanctions on Iran, a cybersecurity firm said Tuesday, warning further attacks remain possible as America reimposes others on Tehran.
While the firm FireEye says the so-called “spear-phishing” email campaign only involves hackers stealing information from infected computers, it involves a similar type of malware previously used to inject a program that destroyed tens of thousands of terminals in Saudi Arabia.
The firm warns that this raises the danger level ahead of America re-imposing crushing sanctions on Iran’s oil industry in early November.
“Whenever we see Iranian threat groups active in this region, particularly in line with geopolitical events, we have to be concerned they might either be engaged in or pre-positioning for a disruptive attack,” Alister Shepherd, a director for a FireEye subsidiary, told The Associated Press.
Iran’s mission to the UN rejected FireEye’s report, calling it “categorically false.”
“Iran’s cyber capabilities are purely defensive, and these claims made by private firms are a form of false advertising designed to attract clients,” the mission said in a statement. “They should not be taken at face value.”
FireEye, which often works with governments and large corporations, refers to the group of Iranian hackers as APT33, an acronym for “advanced persistent threat.” APT33 used phishing email attacks with fake job opportunities to gain access to the companies affected, faking domain names to make the messages look legitimate. Analysts described the emails as “spear-phishing” as they appear targeted in nature.
FireEye first discussed the group last year around the same time. This year, the company briefed journalists after offering presentations to potential government clients in Dubai at a luxury hotel and yacht club on the man-made, sea-horse-shaped Daria Island.
While acknowledging their sales pitch, FireEye warned of the danger such Iranian government-aligned hacking groups pose. Iran is believed to be behind the spread of Shamoon in 2012, which hit Saudi Arabian Oil Co. and Qatari natural gas producer RasGas. The virus deleted hard drives and then displayed a picture of a burning American flag on computer screens. Saudi Aramco ultimately shut down its network and destroyed over 30,000 computers.
A second version of Shamoon raced through Saudi government computers in late 2016, this time making the destroyed computers display a photograph of the body of 3-year-old Syrian boy Aylan Kurdi, who drowned fleeing his country’s civil war.
But Iran first found itself as a victim of a cyberattack. Iran developed its cyber capabilities in 2011 after the Stuxnet computer virus destroyed thousands of centrifuges involved in Iran’s contested nuclear program. Stuxnet is widely believed to be an American and Israeli creation.
APT33’s emails haven’t been destructive. However, from July 2 through July 29, FireEye saw “a by-factors-of-10 increase” in the number of emails the group sent targeting their clients, Shepherd said.