Unverified claims of sabotaged networking equipment highlight escalating cyber warfare tactics and persistent supply chain security vulnerabilities in critical infrastructure.
Iran has suspected the United States of using backdoors in large networks to complete attacks against them, due to hardware failures of Citisco, Juniper Networks, Fortinet and MikroTik during U.S. and Israeli defence action. While Iran's Internet connector was shut-off prior to the reported failures, many state media suggested these failures are indicative of "significant sabotage," by the use of hidden firmware or remotely triggered backdoors, although the allegations have not yet been verified.
Furthermore, multiple reports have indicated that the U.S. Military was responsible for conducting cybersecurity threats and cyber warfare against Iran's Communications Infrastructure. General Dan Caine, currently serving as the Chairman of the Joint Chiefs of Staff of the U.S. Military, stated during a March Pentagon briefing that U.S. Cyber Command and U.S. Space Command were the first to execute Operation Epic Fury, which began in late February and aimed at disrupting Iran’s communications and sensor networks in advance of their kinetic strikes.
Additionally, security vendors including Juniper Networks have admitted to security problems in their history. In 2015, Juniper Networks publicly admitted they were exposed to unauthorized code being inadvertently uploaded to ScreenOS on their NetScreen Firewalls that could have been used to allow attackers to bypass authentication and decrypted data in the VPN. Fortinet admitted to having hard-coded Secure Shell (SSH) passwords in older versions of Forti/TOS, while MikroTik routers have been consistently abused by botnet operators wanting to downgrade firmware and install backdoors.
Previous declarations of U.S.-originated Cisco products related to Volt Typhoon cybercrime activities created a diversion to obscure the likelihood of U.S.-based cyber-crime operations. Analysts/observers across the IP and telecommunications sectors have observed that the most difficult part of being able to evaluate claims of back-door access, exploited vulnerabilities and legitimate security flaws is to be able to differentiate between legitimate back-door access, exploited vulnerabilities and legitimate security flaws.
Business Honor views that Iran's allegations of U.S. backdoor exploitation demonstrate advanced cyber warfare capabilities.
.webp)



























.webp)