Risky Bulletin: Cyber Command Conducted Cyberattacks Ahead of Iran Strikes
Podcast: Risky Bulletin by Risky Business Media
Date: March 3, 2026
Host: Claire Aird (prepared by Catalyn Kimpanu)
Episode Overview
This episode delivers a concise roundup of key cybersecurity and digital policy events from around the globe. The main focus is on the recent US and Israeli cyber operations against Iran, as well as major updates on Russia’s push for internet sovereignty, cyberattack trends involving mobile and web technologies, and noteworthy law enforcement actions against cybercriminals.
Key Discussion Points & Insights
1. US and Israeli Cyber Operations Preceding Strikes on Iran
-
[00:11] The Pentagon confirms cyber operations were used by US Cyber Command, alongside Space Command, to "blind Iran's ability to respond to airstrikes" conducted at the weekend.
-
Israeli cyber units reportedly carried out complementary operations, including disrupting mobile towers around Iran’s leader to hinder security communications.
-
Highlight: The integration of cyber and kinetic military operations is increasingly central to modern conflict.
“Cyber Command worked with Space Command to blind Iran's ability to respond to airstrikes at the weekend.”
— Claire Aird, [00:18]
2. U.S. Customs and Border Protection Buys Ad Data for Tracking
-
[00:40] Internal documents reveal Customs and Border Protection purchases real-time location data from advertising platforms, bypassing the need for a warrant or coordination with mobile providers.
-
This practice raises serious privacy concerns.
“This allows the agency access to location data without a warrant or having to go through mobile operators.”
— Claire Aird, [00:48]
3. Russia Targets Internet Independence by 2028
- [00:56] Russian officials aim for “digital sovereignty,” planning to fully segregate their internet infrastructure by 2028 at an estimated cost of $13 billion.
- Implementation relies on replacing Western tech with Chinese and Indian systems, posing supply chain and compatibility challenges.
4. China’s Military Pushes for Widespread AI Integration
- [01:18] Intelligence procurement documents show the People’s Liberation Army employing AI for intrusion detection, cyber operations, disinformation, big data analysis, drone piloting, and autonomous attacks.
- Notable: Beijing’s interest in using AI to accelerate decision-making and avoid chain-of-command bottlenecks in combat scenarios.
5. Dutch Political Push for Citizen Cybersecurity Suite
- [01:44] Dutch opposition urges the government to offer free security tools—VPN, ad blockers, password managers, antivirus—to all citizens.
6. French Investigate Sale of Mobile Impersonation Devices
- [01:55] French authorities are prosecuting a Chinese national and buyers of IMSI catchers—devices mimicking cell towers to send SMS spam and facilitate online scams.
7. US: Social Media Hacking and Sextortion Case
- [02:12] Jamarcus Mosley of Alabama pleads guilty to hacking and extorting hundreds of (mostly female) victims—including minors—by compromising accounts on Snapchat and Instagram between 2022-2025.
8. Florida Software Trafficker Sentenced
- [02:33] Heidi Richards, via Trinity Software Distribution, illegally resold millions in Microsoft license keys harvested from physical labels over five years. She receives a 22-month prison term.
9. Indian Crackdown on Social Media Investment Scams
- [02:52] Police arrest 27 individuals running scams via WhatsApp and Instagram, recovering part of the $1.5M stolen through fraudulent schemes.
10. iOS Exploit Kit ‘Karun’ Targets Users Worldwide
-
[03:11] Russian APT and Chinese eCrime groups deploy the Karun exploit kit, boasting 23 exploits and five exploit chains capable of hacking devices up to iOS 17 (released in 2023).
-
Kit origins possibly trace to a US government program, drawing parallels to earlier exploits used against Russian officials.
“Security firm Iverify told Wired. The kit may originally have been developed for the US government.”
— Claire Aird, [03:32]
11. US High School Sports Platform Fined for Privacy Violations
- [03:49] California fines Play On Sports $1.1M for using purchased user data for targeted ads from over 1,400 high schools’ ticket sales.
12. Threat Actors Abuse OAuth Redirection in Phishing
- [04:02] Government organizations are targeted by malicious campaigns exploiting OAuth URL redirections. Microsoft has begun removing affected apps.
13. Indian Espionage Group Targets Pakistan, Bangladesh
- [04:17] "Sloppy Lemming" hacking group attacks critical systems including Pakistan Navy and nuclear bodies; campaign exposed by open directories on control servers.
14. Vehicle Tire Pressure Systems Leak Driver Data
- [04:34] Wireless tire pressure monitors emit unencrypted signals identifiable up to 50 meters, creating unforeseen physical tracking risks for drivers.
15. Google Patches Active Android Zero-Day
- [04:50] An exploited Qualcomm zero-day discovered by Google’s security team in December is fixed in this month’s Android update.
16. Chrome Moves to Two-Week Release Cycle
-
[04:59] Starting September, Chrome will update every two weeks (from four), with emergency security patches as needed.
“Security updates will continue to be released every week if needed.”
— Claire Aird, [05:05]
Notable Quotes & Memorable Moments
- On US military cyber and space collaboration:
“Cyber Command worked with Space Command to blind Iran's ability to respond to airstrikes at the weekend.” ([00:18])
- On location data privacy:
“This allows the agency access to location data without a warrant or having to go through mobile operators.” ([00:48])
- On iOS exploit kit origins:
“The kit may originally have been developed for the US government. It has similarities to the triangulation exploits used against Russian officials in early 2023.” ([03:32])
Important Segment Timestamps
- US/Iran/Israel cyber operations: [00:11] – [00:39]
- U.S. Customs ad data purchase: [00:40] – [00:55]
- Russia plans internet sovereignty: [00:56] – [01:18]
- China AI and military: [01:18] – [01:43]
- Dutch digital security push: [01:44] – [01:54]
- French IMSI catcher case: [01:55] – [02:12]
- Alabama social media hacking: [02:12] – [02:33]
- Florida software trafficking: [02:33] – [02:52]
- Indian investment scam crackdown: [02:52] – [03:11]
- iOS exploit kit ‘Karun’: [03:11] – [03:49]
- High school sports privacy case: [03:49] – [04:01]
- OAuth phishing attacks: [04:02] – [04:16]
- Indian espionage campaign: [04:17] – [04:34]
- Vehicle tire pressure tracking: [04:34] – [04:49]
- Android zero-day patch: [04:50] – [04:58]
- Chrome release changes: [04:59] – [05:10]
Episode Tone & Style
The reporting is brisk, clinical, and informative, focusing on fact-based summaries and expert analysis. The tone is straightforward with minimal editorializing, maintaining a serious, no-nonsense approach suited to cybersecurity professionals and enthusiasts.
