Security

Jordan thwarts Iranian cyberattack on national wheat silos

Jordan's cybersecurity teams stopped an Iranian-linked cyberattack targeting national wheat silos, preventing a disruption that could have threatened the Kingdom's food supply.

Hackers compete in the cybersecurity section of Iran's 2025 Technology Olympics at Pardis Technology Park in Tehran, Iran, on October 28, 2025. Participants from eight countries, including Pakistan, Tunisia, China and Russia, took part in the cybersecurity competition. [Morteza Nikoubazl/NurPhoto via AFP]
Hackers compete in the cybersecurity section of Iran's 2025 Technology Olympics at Pardis Technology Park in Tehran, Iran, on October 28, 2025. Participants from eight countries, including Pakistan, Tunisia, China and Russia, took part in the cybersecurity competition. [Morteza Nikoubazl/NurPhoto via AFP]

By Al-Fassel |

A cyberattack targeting Jordan's national wheat storage infrastructure has highlighted how modern conflicts increasingly extend beyond battlefields into essential civilian systems.

According to official statements and cybersecurity experts, Iranian-linked actors attempted to infiltrate the electronic control systems that manage the Kingdom's wheat silos.

The attack, if successful, could have disrupted food supplies and triggered widespread economic and social instability.

Jordanian cybersecurity teams quickly detected the intrusion and neutralized the threat, preventing any operational damage and protecting one of the country's most critical food security assets.

A cyber campaign targeting food security

Jordanian officials said the attempted intrusion relied on advanced malware designed to penetrate industrial control systems that regulate grain storage and distribution.

These systems manage temperature controls, inventory monitoring and logistics that ensure wheat remains safe and accessible across the Kingdom.

Security teams blocked the malware before it reached operational networks, preserving both the national supply chain and sensitive infrastructure data.

According to official reports, the attackers sought to disrupt wheat distribution and potentially provoke a domestic crisis.

State-backed cyber actors increasingly target civilian infrastructure to create political pressure without triggering conventional military escalation.

Groups such as Handala Hack are often used as proxies, allowing states to obscure attribution while benefiting from disruption.

This strategy enables governments to deny direct involvement while still exerting geopolitical pressure on regional partners.

Allowing attackers to frame operations as retaliation or activism rather than state aggression. In practice, however, the targets frequently include systems essential to everyday life.

Indiscriminate harm and international norms

Targeting food infrastructure raises serious ethical and legal concerns, particularly during conflicts where civilians depend heavily on stable food and water supplies for survival.

International humanitarian law, including the Geneva Conventions, prohibits attacks against objects indispensable to civilian survival, such as food supplies, agricultural areas and water systems.

Unlike strikes against military bases, cyber operations against wheat storage facilities affect entire populations.

Analysts say that attempting to create a "crisis within the Kingdom" by sabotaging wheat reserves would represent a calculated effort to generate social instability.

Such tactics are widely viewed as morally disproportionate, especially when framed as retaliation for unrelated military actions.

Jordan has increasingly invested in cybersecurity defenses to protect critical infrastructure, including food storage, energy systems and transportation networks.

The swift response to this attempted attack demonstrates the growing importance of digital resilience in national security.

As regional tensions continue to evolve, experts warn that protecting civilian infrastructure from cyber threats will remain a central challenge for governments across the region.

Do you like this article?


Comment Policy