Read Time:1 Minute, 19 Second

Iranian hacker perspective

Following the series of attacks that took place in Iran in the past year, this time the radio and television were targeted, and we will briefly discuss its technical aspects.

First of all, because it is political, it can be defined in terms of previous attacks. Second, because several networks have been attacked, it can not be said that only a human error or a human factor was involved, because the conductor of each network is different. Is.

Next, attacks are not based on network edge vulnerabilities, and as in previous attacks, manpower has probably been used to gain access. There was control by the organization

There are other points that can not be expressed in a telegram post, but the evidence can be seen that the human factor has played a key role, whether intentionally or based on social engineering, has made such a mistake, it should be noted that in the network radio range Air-Gap also broadcasts jamming operations and radio interference can not occur.

بی احترامی

Iranian Statement:

  • Rapid action of the IRGC Intelligence Organization following the violation of norms, sabotage and actions against national security in the broadcasting of radio and television programs.
  • The head of the Radio and Television Security Organization was summoned to the National Security Organization.
    And following the technical follow-up of the IRGC intelligence network, the penetration network of this sabotage and shameful act was identified.
  • The main person fled Iran to Europe last night, and other people were arrested who are currently in the custody of the IRGC intelligence organization

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
%d bloggers like this: