Port in a Storm: Iranian Cyber Operations and Chinese Strategic Interests in Middle Eastern Maritime Infrastructure

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper examines the strategic implications of Iranian cyber attacks targeting port facilities in the Middle East, focusing on their intersection with China's Belt and Road Initiative (BRI). Analysing six case studies involving Iranian Advanced Persistent Threat (APT) groups between 2022 and 2024, we investigate how these cyber operations reflect broader geopolitical tensions and reveal potential friction between Iranian and Chinese regional objectives. The research demonstrates that Iranian cyber campaigns combine sophisticated technical approaches—including custom malware deployment, spear-phishing, and SCADA system exploitation—with influence operations to achieve immediate disruption and longer-term strategic goals. While Iran and China maintain formal cooperation through their 25-year Comprehensive Cooperation Agreement, their divergent approaches to regional engagement—Iran's confrontational stance versus China's economic pragmatism—create notable strategic tensions. Our findings suggest that, though technically sophisticated, Iran's cyber operations targeting maritime infrastructure may ultimately undermine China's BRI objectives of stable trade routes and regional economic integration. This research contributes to understanding how state-sponsored cyber operations against critical maritime infrastructure reflect and influence broader geopolitical dynamics while highlighting the complex interplay between physical and digital security in modern conflict.
Original languageEnglish
Title of host publicationIEEE European Symposium on Security and Privacy
Place of PublicationVenice, Italy
PublisherIEEE
ISBN (Electronic)979-8-3315-9546-3
ISBN (Print)979-8-3315-9547-0
DOIs
Publication statusPublished - 1 Sept 2025

Keywords

  • APT
  • Maritime
  • Cybersecurity
  • Port Security
  • Middle East
  • Cybercrime

Cite this