Iran:
(Cyber Sword + Crescents of Anon)
The objective of this operation is to take control of Iranian communication via malware.
The malware attack must be undetected, with the DDOS being the decoy as well as a hinder to all organizations involved.
Server breach of the specified companies is also key, if possible. Complete destruction of the server is ideal.
News Stations:
(Breach, broadcast message, while infecting with Malware I provided, then DDOS for as long as possible) I have message to broadcast!
http://tv1.ir/
http://www.tv2.ir/
http://www.tv3.ir/
http://www.tv4.ir/
http://www.tv5.ir/
https://www.iribnews.ir/
http://www.tv7.ir/
http://www.qurantv.ir/
http://www.doctv.ir/
http://www.namayeshtv.ir/
http://www.varzeshtv.ir/
http://www.pooyatv.ir/
http://www.nahaltv.ir/
http://salamattv.irib.ir/
http://www.shomatv.ir/
https://tamashatv.ir/
http://www.tvnasim.ir/
http://www.ofoghtv.com/
http://www.omidtv.ir/
http://www.ifilmtv.com/
https://www.iribuhd.ir/
Police:
(Breach, Infect with Malware, Wipe Server, DDOS for as long as possible) We can monitor communication
http://police.ir/
Iran, Shiraz OK 0.163 s 301 (Moved Permanently) 185.12.101.54
Iran, Tehran OK 0.010 s 301 (Moved Permanently) 185.12.101.54
Telecom:
(Infect with Malware, DDOS)
http://www.tci.ir/
https://www.tic.ir/
http://www.mci.ir/web/en/home
Internet:
(Infect with Malware, DDOS)
https://www.shatel.ir/
http://www.tci.ir/
https://www.parsonline.com/
http://www.shahrad.com/
http://www.sepanta.com/
http://www.dpco.net/en/aboutus/contactus/sabanetcomp
https://www.asiatech.ir/en/
https://esmcell.com/
https://day.ir/
http://www.iranthuraya.com/
https://www.nak-mci.ir/fa
taliya.ir
http://www.hiweb.ir/
https://shatelmobile.ir/
http://www.datak.ir/
https://rayanehabad.ir/%D9%85%D8%B1%DA%A9%D8%B2-%D9%85%D8%AE%D8%A7%D8%A8%D8%B1%D8%A7%D8%AA%DB%8C-%D9%BE%DB%8C%D8%A7%D9%85-%D9%86%D9%88%D8%B1/
https://flipnet.ir/
https://afranet.com/fa
https://www.nak-mci.ir/fa
https://www.sinacomsys.com/
http://kantelecom.com/
mobinnet.ir
http://argtelecom.com/
https://e.fanaptelecom.ir/User/Login?ReturnUrl=%2f
https://cytco.net/
https://payaco.com/
https://www.ioptc.ir/
Airlines:
(Breach, Infect with Malware, Wipe Server, DDOS for as long as possible)
http://www.iranair.com/
http://www.iranairtour.ir/
http://www.iaa.ir/
http://www.zagrosairlines.com/
https://www.kishairlines.ir/
http://www.qeshm-air.com/
https://www.mahan.aero/en/
http://www.ataair.ir/
http://meraj.aero/en/
http://taban.aero/en/
http://caspian.aero/
https://www.karunair.ir/
http://www.flysepehran.com/
https://varesh.aero/
https://flypersia.aero/
http://www.farsairlines.com/
http://www.payamaviation.ir/
http://www.pouyaair.com/
Rail Ways:
(DDOS and Wipe Severs)
https://www.rai.ir/
https://www.tappersia.com/
https://caravanistan.com/
Key Targets:
(DDOS and Wipe Severs)
https://tse.ir/en/
http://en.nioc.ir/
http://www.imidro.gov.ir/
http://www.nipc.ir/
http://bmi.ir/
http://www.bsi.ir/
http://www.parsian-bank.com/
http://en.bankmellat.ir/
https://www.banksepah.ir/default-1077.aspx
http://www.tejaratbank.ir/
https://www.bank-maskan.ir/web/english
http://www.bki.ir/
http://enbank.ir/
http://en.bpi.ir/
http://www.bim.ir/
http://www.ghdir-grp.ir/
https://khargpetrochemical.ir/
http://pgpco.org/
http://www.sinabank.ir/
http://karafarinbank.ir/
https://www.pasargadoil.com/
http://behranoil.com/
http://www.tidewater.ir/
https://www.fnpetro.ir/
http://www.mehr-fci.ir
http://www.mebank.ir
http://www.razip.com/
