Iran’s Khamenei urges massive vote to bolster regime

Iran's Supreme Leader Ayatollah Ali Khamenei waves before speaking to the audience in Tehran on Wednesday. (via Reuters)
Updated 17 May 2017
0

Iran’s Khamenei urges massive vote to bolster regime

TEHRAN: Iran’s top two presidential candidates launched a final day of election campaigning Wednesday as the supreme leader called for a massive turnout to bolster the regime against its “enemies.”
Ayatollah Ali Khamenei suggested Iran’s foes would be deterred from pursuing regime change if they saw voters flock to the ballot boxes in Friday’s poll.
“American, European officials and those of the Zionist regime are watching our elections to see the level of participation,” he said in quotes carried on his Telegram messenger account.
“The Iranian nation has enemies. Faced with the enemy, the people should show its determination and calm,” he said.
Turnout is all-important to the Iranian regime, which uses regular elections to demonstrate the legitimacy of its Islamic system.
But on the campaign trail, two starkly different visions of how that system will evolve have been on display.
President Hassan Rouhani, a 68-year-old moderate cleric, defended his international outreach, which included a nuclear deal with world powers that ended many sanctions in exchange for curbs to Iran’s atomic program.
Rouhani told his hard-line opponents they were not equipped to continue his diplomatic efforts.
“You say you want to negotiate with the world, but you don’t know how to speak the global language. You don’t even know how to speak the language of your own people,” he said at a rally in the northern town of Ardebil.
His hard-line opponent, 56-year-old cleric Ebrahim Raisi, has vowed to stick by the nuclear deal, but said the government had made too many concessions to the West and failed to “cash the cheque” offered by the accord.
“A diplomacy of supplication will not solve our problems. We need a diplomacy of strength,” he told supporters in Tehran, according to ISNA news agency.
Raisi said Iran’s continued exclusion from international banking, despite the nuclear deal, was proof that Rouhani’s diplomacy had failed.
“Some people say that if we’re elected, the sanctions will return,” said Raisi.
“But in what measure have the sanctions been lifted? The banking sanctions that were the most important are still in place.”
Campaigning will draw to a close on Thursday morning, 24 hours before polls open.
Rouhani is still seen as the front-runner, though polling is unreliable in Iran.
Early election results are expected on Saturday.
The conservative-dominated Guardian Council selected six candidates to stand in the election but two have dropped out, effectively creating a two-horse race between Raisi and Rouhani.
Conservative Mostafa Mirsalim and reformist Mostafa Hashemitaba are still in the race, though they are not expected to win more than a few percent of the vote.


Cybersecurity firm: More Iran hacks as US sanctions loom

Alister Shepherd, the director of a subsidiary of FireEye, during a presentation about the APT33 in Dubai Tuesday. (AP)
Updated 20 September 2018
0

Cybersecurity firm: More Iran hacks as US sanctions loom

  • The firm warns that this raises the danger level ahead of America re-imposing crushing sanctions on Iran’s oil industry in early November.
  • Iran’s mission to the UN rejected FireEye’s report, calling it “categorically false.”

DUBAI: An Iranian government-aligned group of hackers launched a major campaign targeting Mideast energy firms and others ahead of US sanctions on Iran, a cybersecurity firm said Tuesday, warning further attacks remain possible as America reimposes others on Tehran.

While the firm FireEye says the so-called “spear-phishing” email campaign only involves hackers stealing information from infected computers, it involves a similar type of malware previously used to inject a program that destroyed tens of thousands of terminals in Saudi Arabia.

The firm warns that this raises the danger level ahead of America re-imposing crushing sanctions on Iran’s oil industry in early November.

“Whenever we see Iranian threat groups active in this region, particularly in line with geopolitical events, we have to be concerned they might either be engaged in or pre-positioning for a disruptive attack,” Alister Shepherd, a director for a FireEye subsidiary, told The Associated Press.

Iran’s mission to the UN rejected FireEye’s report, calling it “categorically false.”

“Iran’s cyber capabilities are purely defensive, and these claims made by private firms are a form of false advertising designed to attract clients,” the mission said in a statement. “They should not be taken at face value.”

FireEye, which often works with governments and large corporations, refers to the group of Iranian hackers as APT33, an acronym for “advanced persistent threat.” APT33 used phishing email attacks with fake job opportunities to gain access to the companies affected, faking domain names to make the messages look legitimate. Analysts described the emails as “spear-phishing” as they appear targeted in nature.

FireEye first discussed the group last year around the same time. This year, the company briefed journalists after offering presentations to potential government clients in Dubai at a luxury hotel and yacht club on the man-made, sea-horse-shaped Daria Island.

While acknowledging their sales pitch, FireEye warned of the danger such Iranian government-aligned hacking groups pose. Iran is believed to be behind the spread of Shamoon in 2012, which hit Saudi Arabian Oil Co. and Qatari natural gas producer RasGas. The virus deleted hard drives and then displayed a picture of a burning American flag on computer screens. Saudi Aramco ultimately shut down its network and destroyed over 30,000 computers.

A second version of Shamoon raced through Saudi government computers in late 2016, this time making the destroyed computers display a photograph of the body of 3-year-old Syrian boy Aylan Kurdi, who drowned fleeing his country’s civil war.

But Iran first found itself as a victim of a cyberattack. Iran developed its cyber capabilities in 2011 after the Stuxnet computer virus destroyed thousands of centrifuges involved in Iran’s contested nuclear program. Stuxnet is widely believed to be an American and Israeli creation.

APT33’s emails haven’t been destructive. However, from July 2 through July 29, FireEye saw “a by-factors-of-10 increase” in the number of emails the group sent targeting their clients, Shepherd said.