2026年3月13日 / 美国东部时间上午10:52 / CBS新闻
伊朗正在扩大其在中东地区的袭击范围,以报复美国和以色列对其军事、安全部队及领导层的持续攻击。伊朗已将多家美国主要科技公司列为潜在袭击目标。
与伊朗强大的伊斯兰革命卫队有关联的半官方塔斯尼姆通讯社(Tasnim News Agency)周二在社交媒体上发布了一份美国主要科技公司名单,其中包括亚马逊(Amazon)、微软(Microsoft)、帕兰提尔(Palantir)和甲骨文(Oracle),并配文:“敌人的技术基础设施:伊朗在该地区的新目标。”
伊朗的无人机袭击已造成该地区数据中心受损,上周亚马逊在两个国家的设施遭到袭击。
塔斯尼姆发布的名单还附带了一个威胁:“随着地区战争规模扩大到基础设施、网络战及范围,伊朗的合法目标正在逐步扩大。”
被伊朗点名的公司在中东地区设有办事处、研发中心、数据中心和云基础设施,包括在阿联酋、以色列和巴林。
CBS新闻已就塔斯尼姆点名的公司是否采取了保护其在该地区员工和利益的措施请求评论。
白宫副新闻秘书安娜·凯利(Anna Kelly)周四告诉CBS新闻:“美国已为‘史诗狂怒行动’(Operation Epic Fury)准备了一段时间,我们知道所有潜在的伊朗目标。”
凯利称:“事实是,这个恐怖主义伊朗政权正在被彻底击垮。美国正达到或超过所有基准——伊朗弹道导弹袭击减少90%,无人机袭击减少83%。”
上周,亚马逊云服务(Amazon Web Services)表示,伊朗无人机袭击已损坏其在阿联酋的两个设施,另有一架无人机在巴林设施附近降落,损坏了部分基础设施。
亚马逊云服务称:“这些袭击造成了结构性损坏,中断了我们基础设施的电力供应,在某些情况下还需要进行灭火作业,导致了额外的水损。我们正在与当地当局密切合作,并在恢复工作中优先保障人员安全。”
周三,美国医疗技术巨头史赛克(Stryker)承认其遭到网络攻击,导致“微软环境的全球网络中断”。
该公司周四表示:“我们没有发现恶意软件或勒索软件的迹象,我们认为情况仅限于我们内部的微软环境。”
《华尔街日报》周三报道称,与伊朗有关联的黑客组织“汉达拉”(Handala)的标志出现在史赛克的登录页面上。
网络安全分析师布莱恩·克雷布斯(Brian Krebs)周三在博客文章中称,该黑客组织已在社交媒体上承认对此次攻击负责,但这些帖子已从Telegram上删除。
克雷布斯引述该组织的帖子称:“我们的主要网络行动已圆满完成。”
美国国土安全部前网络安全和基础设施安全局局长克里斯·克雷布斯(Chris Krebs)周四在接受CBS早间新闻采访时表示,该组织与伊朗的联系“模糊不清”。
“我们目前所处的局势重大之处在于,伊朗几乎采取了全员出击的方式。他们所有的组织,无论是直接与军方或情报部门相关,还是其代理组织、黑客活动分子、同情者,无论你怎么称呼他们,都在针对目标行动。”
史赛克周三向美国证券交易委员会(SEC)提交的监管文件显示,针对此次事件的调查正在进行中,“目前尚不清楚事件对运营和财务的影响。”
网络安全公司帕洛阿尔托网络(Palo Alto Networks)在其对“汉达拉”的介绍中称,该组织直接与伊朗情报和安全部有关联,并且“针对以色列政治和国防机构开展网络行动”。
CBS新闻的合作媒体BBC新闻上周报道称,包括亚马逊、谷歌、Snap和英伟达在内的多家美国科技巨头已实施紧急协议,以保护中东数千名员工的安全。
Iran says major U.S. tech firms are targets in the Middle East, with drone and cyberattacks already underway
March 13, 2026 / 10:52 AM EDT / CBS News
Iran has listed a number of major U.S. tech companies as potential targets as it expands its attacks across the Middle East in retaliation for the ongoing U.S. and Israeli attacks on its military and security forces and leadership.
Iran’s semi-official Tasnim News Agency, which is linked to the country’s powerful Islamic Revolutionary Guard Corps, published a list of major U.S. tech companies in a social media post on Tuesday, which included Amazon, Microsoft, Palantir, and Oracle, with the caption: “Enemy’s technological infrastructure: Iran’s new goals in the region.”
Iranian drone strikes have already damaged data centers in the region, hitting Amazon facilities in two countries last week.
The list published by Tasnim was accompanied by a threat that, “with the expansion of regional war dimensions into infrastructure, cyberwarfare, and scope, Iran’s legitimate targets are gradually expanding.”
The companies named by Iran have offices, research and development centers, data centers and cloud infrastructure across the Middle East, including in the United Arab Emirates, Israel and Bahrain.
CBS News has requested comment from the companies named by Tasnim about any steps they’re taking to protect staff and interests in the region.
White House Deputy Press Secretary Anna Kelly told CBS News Thursday that “The United States has been prepared for Operation Epic Fury for some time, and we are aware of all potential Iranian targets.”
“As it stands, the terrorist Iranian regime is getting absolutely crushed. The United States is meeting or exceeding all of its benchmarks — Iranian ballistic missile attacks are down by 90 percent, and drone attacks are down by 83 percent,” Kelly said.
Last week, Amazon Web Services, the company’s cloud platform, said Iranian drone strikes had damaged two of its facilities in the UAE, while another drone landed in close proximity to its facility in Bahrain, damaging some of its infrastructure.
“These strikes have caused structural damage, disrupted power delivery to our infrastructure, and in some cases required fire suppression activities that resulted in additional water damage. We are working closely with local authorities and prioritizing the safety of our personnel throughout our recovery efforts,” Amazon Web Services said.
On Wednesday, U.S. medical technology giant Stryker acknowledged that it had been hit by a cyberattack that caused a temporary “global network disruption to our Microsoft environment.”
The company said Thursday that it had “no indication of malware or ransomware and we believe the situation is contained to our internal Microsoft environment only.”
The Wall Street Journal reported Wednesday that the logo of Handala, a hacking group linked to Iran, had appeared on Stryker’s login pages.
Brian Krebs, a cybersecurity analyst, said in a blog post Wednesday that the hacking group had acknowledged responsibility for the attack in social media posts, which he said had been removed from Telegram.
“Our major cyber operation has been executed with complete success,” the group’s post said, according to Krebs.
Chris Krebs, a former United States Director of the Cybersecurity and Infrastructure Security Agency at the Department of Homeland Security, told CBS Mornings that the ties between the group and Iran are “blurry.”
“What is significant about where we are at this moment is that it’s almost an all hands on deck approach by Iran. All of their groups, whether they’re directly related to the military or intelligence or their proxies, hacktivists, sympathizers, whatever you want to call them, they are all going for targets,” Krebs told CBS Mornings Thursday.
In a regulatory filing made Wednesday with the U.S. Securities and Exchange Commission, Stryker said an investigation into the incident was ongoing and that the “operational and financial impacts of the incident are not yet known.”
The cybersecurity firm Palo Alto Networks says in its profile of Handala that the group is directly linked to Iran’s Ministry of Intelligence and Security, and that it conducts “cyber operations against the Israeli political and defense establishment.”
CBS News’ partner network BBC News reported last week that tech giants Amazon, Google, Snap and Nvidia were among many U.S. firms that have implemented emergency protocols to protect the safety of thousands of workers across the Middle East.
发表回复