

Srsly Risky Biz: Why Iran is a scaredy cat cyber chicken
Jul 3, 2025
Tom Uren and Patrick Gray explore Iran's reluctance to launch cyber attacks on U.S. infrastructure, dissecting the strategic reasons behind this cautious stance. They also dive into the challenges the FBI faces with the rise of ubiquitous surveillance technology and its troubling response to security audits. Additionally, the hosts critique the agency's approach to organized crime and cybersecurity risks, illustrating a stark contrast with more proactive intelligence strategies. It's a thought-provoking discussion on the intersection of cyber warfare and law enforcement.
AI Snips
Chapters
Transcript
Episode notes
Iran Avoids Escalatory Cyber Attacks
- Iran avoids cyber attacks that could be considered acts of war to prevent severe military retaliation.
- They prefer "annoying" disruptions that don't escalate into destructive cyber warfare.
Iran's Measured Response Example
- After Soleimani's assassination, Iran launched limited missile strikes and explicitly declared the end of their response.
- This cautious behavior extends to cyber operations where they focus on symbolic leak attacks rather than destructive control system hacks.
Iran Prefers Leak Attacks Over Disruption
- Iran uses leak-based cyber operations, like reactivating hacker personas to disclose emails, to symbolically strike back without escalating conflict.
- These tactics allow Iran to save face without risking military retaliation or war.