xorl %eax, %eax

Iran Cyber Operations Groups

with 6 comments

Unsurprisingly, after Russia, US, China, DPRK (North Korea), and EU… Here comes the mapping of the offensive cyber operations groups of Iran that have been attributed to a known government entity. Just like in the previous posts, sources and change log are available under the diagram.

If you notice anything missing, incorrect information, mistakes or anything like that please let me know to update it accordingly.

Last update: 13 January 2022

Sources

ChangeLog

  • Version 2.0 (13 Jan 2022): Updated MOIS based on US CYBERCOM statement.
  • Version 1.5 (06 May 2021): Fixed a typo. Added missing “Focus” entries.
  • Version 1.2 (06 May 2021): Minor fixes (typos, etc.)
  • Version 1.0 (06 May 2021): First publication.

Written by xorl

May 6, 2021 at 13:00

6 Responses

Subscribe to comments with RSS.

  1. how did you miss israel. its a major player. please do for it.

    jonathan

    May 16, 2021 at 12:34

  2. I only know of IDF Unit 8200 doing offensive cyber operations in Israel and being linked with known APT groups.

    I have it in my backlog.

    xorl

    May 17, 2021 at 15:17

  3. hello. nice job! could you share how you link DomesticKitten to IRGC-IO ? is there opensource attribution ?

    eli

    June 15, 2022 at 18:12

  4. It’s highlighted in the sources. Check the ones referencing DOMESTIC KITTEN.

    xorl

    June 22, 2022 at 07:18

  5. It is been more than a year since you did the last update. Can you update the structure if you have additional findings

    AAA

    February 8, 2023 at 17:13

  6. Couldn’t find any changes that aren’t reflected there already. If you did find, please share them and will update it.

    xorl

    October 10, 2023 at 15:24


Leave a comment