{"id":18556,"date":"2026-04-23T06:09:46","date_gmt":"2026-04-23T05:09:46","guid":{"rendered":"https:\/\/roglacup.com\/klaus62\/?p=18556"},"modified":"2026-04-23T06:09:48","modified_gmt":"2026-04-23T05:09:48","slug":"iran-claims-us-used-backdoors-to-knock-out-networking-equipment-during-war-the-register","status":"publish","type":"post","link":"https:\/\/roglacup.com\/klaus62\/2026\/04\/23\/iran-claims-us-used-backdoors-to-knock-out-networking-equipment-during-war-the-register\/","title":{"rendered":"Iran claims US used backdoors to knock out networking equipment during war |The Register"},"content":{"rendered":"\n<p id=\"bd11\">Iranian media is claiming that the US used backdoors and\/or botnets to disable networking equipment during the current war, and Chinese state media is dining out on the allegations.<\/p>\n\n\n\n<p>Reports from Iran&nbsp;<a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/www.entekhab.ir\/fa\/news\/917640\/%D9%81%D8%A7%D8%B1%D8%B3-%D8%B7%DB%8C-%D8%A7%D8%AA%D9%81%D8%A7%D9%82%DB%8C-%D8%B9%D8%AC%DB%8C%D8%A8-%D9%88-%D9%87%D8%B4%D8%AF%D8%A7%D8%B1-%D8%AF%D9%87%D9%86%D8%AF%D9%87-%D8%AC%D8%B9%D8%A8%D9%87%E2%80%8C%D9%87%D8%A7%DB%8C-%D8%B3%DB%8C%D8%A7%D9%87-%D8%A2%D9%85%D8%B1%DB%8C%DA%A9%D8%A7%DB%8C%DB%8C-%D8%AF%D8%B1-%D8%B3%D8%A7%D8%B9%D8%AA-%D8%B5%D9%81%D8%B1-%D8%AD%D9%85%D9%84%D9%87-%D8%A8%D9%87-%D8%A7%D8%B5%D9%81%D9%87%D8%A7%D9%86-%D8%A7%D8%B2-%DA%A9%D8%A7%D8%B1-%D8%A7%D9%81%D8%AA%D8%A7%D8%AF%D9%86%D8%AF-%D8%A7%DB%8C%D9%86-%D8%A7%D8%AE%D8%AA%D9%84%D8%A7%D9%84-%D8%AF%D8%B1-%D8%B4%D8%B1%D8%A7%DB%8C%D8%B7%DB%8C-%D8%B1%D8%AE-%D8%AF%D8%A7%D8%AF-%DA%A9%D9%87-%DA%AF%DB%8C%D8%AA%E2%80%8C%D9%88%DB%8C%E2%80%8C%D9%87%D8%A7%DB%8C-%D8%A8%DB%8C%D9%86%E2%80%8C%D8%A7%D9%84%D9%85%D9%84%D9%84-%D8%B9%D9%85%D9%84%D8%A7%D9%8B-%D9%85%D8%B3%D8%AF%D9%88%D8%AF-%D8%A8%D9%88%D8%AF%D9%86%D8%AF-%D8%A8%D9%86%D8%A7%D8%A8%D8%B1%D8%A7%DB%8C%D9%86-%D9%81%D8%B1%D9%88%D9%BE%D8%A7%D8%B4%DB%8C-%D9%85%D8%B0%DA%A9%D9%88%D8%B1-%D9%86%D8%B4%D8%A7%D9%86-%D8%A7%D8%B2-%DB%8C%DA%A9-%D8%AE%D8%B1%D8%A7%D8%A8%DA%A9%D8%A7%D8%B1%DB%8C-%D8%B9%D9%85%DB%8C%D9%82-%D8%AF%D8%A7%D8%B1%D8%AF-%D8%B3%D9%86%D8%A7%D8%B1%DB%8C%D9%88%DB%8C-%D8%AE%D8%B7%D8%B1%D9%86%D8%A7%DA%A9-%D8%AF%D8%B3%D8%AA%DA%A9%D8%A7%D8%B1%DB%8C-%D8%AF%D8%B1-%D9%85%D8%A8%D8%AF%D8%A3-%D8%AA%D9%88%D9%84%DB%8C%D8%AF-%D8%A7%D8%B3%D8%AA-%D8%A7%DA%AF%D8%B1-%D9%81%D8%A7%DB%8C%D9%84%E2%80%8C%D9%87%D8%A7%DB%8C-%D9%86%D8%B5%D8%A8%DB%8C-%D9%82%D8%A8%D9%84-%D8%A7%D8%B2-%D9%88%D8%B1%D9%88%D8%AF-%D8%A8%D9%87-%D8%A7%DB%8C%D8%B1%D8%A7%D9%86-%D8%A2%D9%84%D9%88%D8%AF%D9%87-%D8%B4%D8%AF%D9%87-%D8%A8%D8%A7%D8%B4%D9%86%D8%AF-%D8%AD%D8%AA%DB%8C-%D8%AA%D8%B9%D9%88%DB%8C%D8%B6-%D8%B3%DB%8C%D8%B3%D8%AA%D9%85-%D8%B9%D8%A7%D9%85%D9%84-%D9%87%D9%85-%D9%85%D8%B4%DA%A9%D9%84-%D8%B1%D8%A7-%D8%AD%D9%84-%D9%86%D9%85%DB%8C%E2%80%8C%DA%A9%D9%86%D8%AF\">claim<\/a>&nbsp;hardware made by Cisco, Juniper, Fortinet, and MikroTik either rebooted or disconnected during recent attacks on Iran \u2013 despite the regime disconnecting the nation from the global internet.<\/p>\n\n\n\n<p>The reports suggest that\u2019s only possible because someone \u2013 probably the US \u2013 can sabotage the equipment at will.<\/p>\n\n\n\n<p>The report linked to above hypothesizes that a hidden backdoor in firmware or bootloader allows remote attacks at a pre-determined time or can be activated by a signal from a satellite. In either scenario, the US uses the backdoor to bring down networks at the most inconvenient moment for Iran.<\/p>\n\n\n\n<p>The thrust of the Iranian stories we\u2019ve seen is that US-based vendors are complicit in the installation of backdoors.<\/p>\n\n\n\n<p>Another scenario Iranian reports float is that someone has installed a botnet on networking equipment and has therefore been able to target devices from Cisco \u2013 and from MikroTik, the Latvian networking equipment vendor that emphasizes its product development takes place within the European Union.<\/p>\n\n\n\n<p>As Iran\u2019s internet is currently mostly closed \u2013 more on that later \u2013 it\u2019s almost impossible to verify reports of a mass outage.<\/p>\n\n\n\n<p>That the USA possesses the ability to conduct attacks in cyberspace is not in doubt. After the US takeover of Venezuela, president Trump and general Dan Caine, chairman of the Joint Chiefs of Staff,&nbsp;<a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2026\/01\/08\/cloudflare_venezuela_bgp_attack_theory\/\" rel=\"noreferrer noopener\">alluded<\/a>&nbsp;to online action being one element of the operation. Caine also&nbsp;<a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/www.war.gov\/News\/Releases\/Release\/Article\/4222543\/secretary-of-defense-pete-hegseth-and-chairman-of-the-joint-chiefs-of-staff-gen\/\">said<\/a>&nbsp;US Cyber Command assisted with the June 2025 \u201cOperation Midnight Hammer\u201d attack on Iran, without elaborating on the agency\u2019s role.<\/p>\n\n\n\n<p>Whatever is going on, Chinese state media has seized on the Iranian reports to restate Beijing\u2019s position that China is a pacifist in cyberspace and the US is the real cyber-villain.<\/p>\n\n\n\n<p>China\u2019s National Computer Virus Emergency Response Center (CVERC) regularly posts a&nbsp;<a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/10\/15\/china_volt_typhoon_false_flag\/\" rel=\"noreferrer noopener\">theory<\/a>&nbsp;that information leaked by Edward Snowden shows the US embeds backdoors in networking equipment, and that all allegations that Beijing conducts cyberattacks is therefore just a sham to shift the blame to the Middle Kingdom. CVERC has even&nbsp;<a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/07\/19\/volt_typhoon_china_theory\/\" rel=\"noreferrer noopener\">argued<\/a>&nbsp;that the Volt Typhoon attacks \u2013 which the Five Eyes nations agree was a Chinese attack on critical infrastructure \u2013 were a false flag operation run by US intelligence community to give it credibility when smearing China.<\/p>\n\n\n\n<p id=\"bd11\">Chinese state media has given credence to the Iranian reports and even\u00a0<a href=\"https:\/\/english.news.cn\/20260417\/7c6c61509f1e4f4c87f97ad9f7a20bf0\/c.html\" target=\"_blank\" rel=\"noreferrer noopener\">published<\/a>\u00a0the cartoon below to express Beijing\u2019s feelings on the alleged events in Iran.<\/p>\n\n\n\n<p id=\"bd11\"><\/p>\n\n\n\n<p>More &amp; posted from: <a href=\"https:\/\/www.theregister.com\/2026\/04\/21\/iran_claims_us_used_backdoors\/?td=rt-3a\">https:\/\/www.theregister.com\/2026\/04\/21\/iran_claims_us_used_backdoors\/?td=rt-3a<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Iranian media is claiming that the US used backdoors and\/or botnets to disable networking equipment during the current war, and Chinese state media is dining out on the allegations. Reports from Iran&nbsp;claim&nbsp;hardware made by Cisco, Juniper, Fortinet, and MikroTik either rebooted or disconnected during recent attacks on Iran \u2013 despite the regime disconnecting the nation&hellip;&nbsp;<a href=\"https:\/\/roglacup.com\/klaus62\/2026\/04\/23\/iran-claims-us-used-backdoors-to-knock-out-networking-equipment-during-war-the-register\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Iran claims US used backdoors to knock out networking equipment during war |The Register<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":18557,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[384,4],"tags":[],"class_list":["post-18556","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-science","category-security"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/roglacup.com\/klaus62\/wp-json\/wp\/v2\/posts\/18556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/roglacup.com\/klaus62\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/roglacup.com\/klaus62\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/roglacup.com\/klaus62\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/roglacup.com\/klaus62\/wp-json\/wp\/v2\/comments?post=18556"}],"version-history":[{"count":1,"href":"https:\/\/roglacup.com\/klaus62\/wp-json\/wp\/v2\/posts\/18556\/revisions"}],"predecessor-version":[{"id":18558,"href":"https:\/\/roglacup.com\/klaus62\/wp-json\/wp\/v2\/posts\/18556\/revisions\/18558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/roglacup.com\/klaus62\/wp-json\/wp\/v2\/media\/18557"}],"wp:attachment":[{"href":"https:\/\/roglacup.com\/klaus62\/wp-json\/wp\/v2\/media?parent=18556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/roglacup.com\/klaus62\/wp-json\/wp\/v2\/categories?post=18556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/roglacup.com\/klaus62\/wp-json\/wp\/v2\/tags?post=18556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}