Risky Bulletin

Between Two Nerds: Unleashing Iran's hackers

16 snips
Mar 16, 2026
A wide-ranging chat about how bombing Iran could push its hacker groups to expand and adapt. They dig into Stryker ransomware, Handala's impact, and the resilience of decentralized, low-tech networks. The conversation contrasts destructive commodity attacks with bespoke espionage and compares Iran’s cyber trajectory to North Korea’s.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Espionage Only Works If You Can Use It

  • Espionage is valuable in war but only if you can exploit the access against a militarily comparable opponent.
  • The Grugq argues Iran couldn't meaningfully exploit US military intelligence even with full access, so effects operations become more attractive.
INSIGHT

Cyber Effects Trade Visibility For Strategic Impact

  • Destructive cyber effects can aim to annoy civilian populations when a state lacks conventional options to influence the battlefield.
  • Tom Uren and The Grugq compare annoyance campaigns to RAF WWII bombing: visible but strategically limited and possibly ignored.
ANECDOTE

RAF Butt Report Shows Visible Damage Can Mislead

  • The Grugq recounts WWII RAF bombing misassessments where pilots bombed by vibe and post-war analysis (the Butt report) exposed limited effectiveness.
  • He uses the example to illustrate that visible attacks can feel like success without strategic effect.
Get the Snipd Podcast app to discover more snips from this episode
Get the app