{"id":59236,"date":"2022-10-19T11:24:17","date_gmt":"2022-10-19T03:24:17","guid":{"rendered":"https:\/\/version-2.com\/?p=59236"},"modified":"2022-10-31T11:26:54","modified_gmt":"2022-10-31T03:26:54","slug":"new-insights-into-ghostsec-attacks-on-irans-infrastructure","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/10\/new-insights-into-ghostsec-attacks-on-irans-infrastructure\/","title":{"rendered":"New Insights into GhostSec Attacks on Iran\u2019s Infrastructure"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"59236\" class=\"elementor elementor-59236\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/blog.scadafence.com\/hubfs\/GhostSecAttack-1.png\" width=\"1024\" height=\"512\" \/><\/p><p>Multiple factions of the hacker group known as \u201c<a href=\"https:\/\/www.hackread.com\/opiran-anonymous-iran-state-sites-cctv-camera-hack\/\">Anonymous<\/a>\u201d have banded together to carry out coordinated cyber attacks targeting Iran as retaliation for the deaths of multiple young women in Iran who were protesting the circumstances surrounding the death of Mahsa Amini.<\/p><\/div><\/div><\/div><\/div><\/div><\/section><\/div> <a href=\"https:\/\/version-2.com\/en\/2022\/10\/new-insights-into-ghostsec-attacks-on-irans-infrastructure\/#more-59236\" class=\"more-link elementor-more-link\"><span aria-label=\"Continue reading New Insights into GhostSec Attacks on Iran\u2019s Infrastructure\">(more&hellip;)<\/span><\/a>","protected":false},"excerpt":{"rendered":"<p>Multiple factions of the hacker group known as \u201cAnonymo [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[488,417,61],"tags":[418,489],"class_list":["post-59236","post","type-post","status-publish","format-standard","hentry","category-488","category-scadafence","category-press-release","tag-scadafence","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Insights into GhostSec Attacks on Iran\u2019s Infrastructure - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.scadafence.com\/ghostsec-attacks-on-iranian-infrastructure\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Insights into GhostSec Attacks on Iran\u2019s Infrastructure - Version 2\" \/>\n<meta property=\"og:description\" content=\"Multiple factions of the hacker group known as \u201cAnonymo [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.scadafence.com\/ghostsec-attacks-on-iranian-infrastructure\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-19T03:24:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-31T03:26:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.scadafence.com\/hubfs\/GhostSecAttack-1.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/ghostsec-attacks-on-iranian-infrastructure#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/10\\\/new-insights-into-ghostsec-attacks-on-irans-infrastructure\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"New Insights into GhostSec Attacks on Iran\u2019s Infrastructure\",\"datePublished\":\"2022-10-19T03:24:17+00:00\",\"dateModified\":\"2022-10-31T03:26:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/10\\\/new-insights-into-ghostsec-attacks-on-irans-infrastructure\\\/\"},\"wordCount\":865,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/ghostsec-attacks-on-iranian-infrastructure#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.scadafence.com\\\/hubfs\\\/GhostSecAttack-1.png\",\"keywords\":[\"SCADAfence\",\"2022\"],\"articleSection\":[\"2022\",\"SCADAfence\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/10\\\/new-insights-into-ghostsec-attacks-on-irans-infrastructure\\\/\",\"url\":\"https:\\\/\\\/blog.scadafence.com\\\/ghostsec-attacks-on-iranian-infrastructure\",\"name\":\"New Insights into GhostSec Attacks on Iran\u2019s Infrastructure - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/ghostsec-attacks-on-iranian-infrastructure#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/ghostsec-attacks-on-iranian-infrastructure#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.scadafence.com\\\/hubfs\\\/GhostSecAttack-1.png\",\"datePublished\":\"2022-10-19T03:24:17+00:00\",\"dateModified\":\"2022-10-31T03:26:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/ghostsec-attacks-on-iranian-infrastructure#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.scadafence.com\\\/ghostsec-attacks-on-iranian-infrastructure\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/ghostsec-attacks-on-iranian-infrastructure#primaryimage\",\"url\":\"https:\\\/\\\/blog.scadafence.com\\\/hubfs\\\/GhostSecAttack-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.scadafence.com\\\/hubfs\\\/GhostSecAttack-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/ghostsec-attacks-on-iranian-infrastructure#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Insights into GhostSec Attacks on Iran\u2019s Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Insights into GhostSec Attacks on Iran\u2019s Infrastructure - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.scadafence.com\/ghostsec-attacks-on-iranian-infrastructure","og_locale":"en_US","og_type":"article","og_title":"New Insights into GhostSec Attacks on Iran\u2019s Infrastructure - Version 2","og_description":"Multiple factions of the hacker group known as \u201cAnonymo [&hellip;]","og_url":"https:\/\/blog.scadafence.com\/ghostsec-attacks-on-iranian-infrastructure","og_site_name":"Version 2","article_published_time":"2022-10-19T03:24:17+00:00","article_modified_time":"2022-10-31T03:26:54+00:00","og_image":[{"url":"https:\/\/blog.scadafence.com\/hubfs\/GhostSecAttack-1.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.scadafence.com\/ghostsec-attacks-on-iranian-infrastructure#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/10\/new-insights-into-ghostsec-attacks-on-irans-infrastructure\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"New Insights into GhostSec Attacks on Iran\u2019s Infrastructure","datePublished":"2022-10-19T03:24:17+00:00","dateModified":"2022-10-31T03:26:54+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/10\/new-insights-into-ghostsec-attacks-on-irans-infrastructure\/"},"wordCount":865,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/blog.scadafence.com\/ghostsec-attacks-on-iranian-infrastructure#primaryimage"},"thumbnailUrl":"https:\/\/blog.scadafence.com\/hubfs\/GhostSecAttack-1.png","keywords":["SCADAfence","2022"],"articleSection":["2022","SCADAfence","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/10\/new-insights-into-ghostsec-attacks-on-irans-infrastructure\/","url":"https:\/\/blog.scadafence.com\/ghostsec-attacks-on-iranian-infrastructure","name":"New Insights into GhostSec Attacks on Iran\u2019s Infrastructure - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.scadafence.com\/ghostsec-attacks-on-iranian-infrastructure#primaryimage"},"image":{"@id":"https:\/\/blog.scadafence.com\/ghostsec-attacks-on-iranian-infrastructure#primaryimage"},"thumbnailUrl":"https:\/\/blog.scadafence.com\/hubfs\/GhostSecAttack-1.png","datePublished":"2022-10-19T03:24:17+00:00","dateModified":"2022-10-31T03:26:54+00:00","breadcrumb":{"@id":"https:\/\/blog.scadafence.com\/ghostsec-attacks-on-iranian-infrastructure#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.scadafence.com\/ghostsec-attacks-on-iranian-infrastructure"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.scadafence.com\/ghostsec-attacks-on-iranian-infrastructure#primaryimage","url":"https:\/\/blog.scadafence.com\/hubfs\/GhostSecAttack-1.png","contentUrl":"https:\/\/blog.scadafence.com\/hubfs\/GhostSecAttack-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.scadafence.com\/ghostsec-attacks-on-iranian-infrastructure#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"New Insights into GhostSec Attacks on Iran\u2019s Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-fpq","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/59236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=59236"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/59236\/revisions"}],"predecessor-version":[{"id":59243,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/59236\/revisions\/59243"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=59236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=59236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=59236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}