0 0
Read Time:28 Second

Hacker claimed to have infiltrated the regional power systems of #Qom province and shared some examples with the general public. These examples include testing open ports as well as entering the FTP server and several other system models.

iran6.png

Several published photos are related to #Arak Heavy Water Location and also entering the industrial devices of #Parand Industrial City.

I do not know the accuracy of the claimed information, but considering the recent and various successive attacks, it can be considered that cyber attacks on Iranian industrial systems, including #SCADA, have become very severe.

TREADSTONE 71 TRAINING

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence