Company Details
iran-energy-ministry
187
1,115
211
moe.gov.ir
0
MIN_1986423
In-progress


Ministry of Energy of I.R.IRAN - وزارت نیرو Company CyberSecurity Posture
moe.gov.irMinistry of Energy, is the main organ of the Government in charge of the regulation and implementation of policies applicable to energy, electricity, water and wastewater services. -The ministry consists of five deputies as follows: Deputy for Research and Human Resources Deputy for Planning and Economic Affairs Deputy for Electricity and Energy Deputy for Water and Wastewater Deputy for Support, Legal, and Parliamentary Affairs
Company Details
iran-energy-ministry
187
1,115
211
moe.gov.ir
0
MIN_1986423
In-progress
Between 700 and 749

MEI Global Score (TPRM)XXXX

Description: Escalating Cyber Conflict in the Middle East as Israel-Iran Tensions Fuel Hacktivist Surge The June 13 Israeli strikes on Iranian nuclear and military targets have triggered a sharp escalation in cyber warfare across the Middle East, with hacktivist groups launching a wave of attacks targeting Israel and regional allies. Between June 13 and 17, threat intelligence firm Cyble documented cyber operations by 74 hacktivist groups, over 90% of which are pro-Iran, focusing primarily on Israeli infrastructure while also striking entities in Egypt, Jordan, the UAE, Pakistan, and Saudi Arabia. ### Targets and Tactics Israel bore the brunt of the attacks, with government, defense, media, telecom, finance, education, and emergency services sectors hit by DDoS attacks, website defacements, unauthorized access, data breaches, and ransomware/wiper malware campaigns. Notable incidents included: - Five ransomware/extortion attacks by Handala Group against Israeli media, telecom, construction, education, and chemical/energy organizations, with data samples leaked in two cases. - A ransomware/wiper executable ("encryption.exe") attributed to the previously unknown Anon-g Fox, which checks for Israel Standard Time (IST) and Hebrew language settings before executing terminating if conditions aren’t met. - A banking malware campaign (IRATA) targeting 50+ Iranian financial and crypto apps, impersonating government entities like the Judicial System of Iran and the Ministry of Economic Affairs. The malware steals credentials, account balances, and card data while remotely controlling infected devices. Other documented attacks included 34 DDoS incidents, five defacements, two data breaches, and four credential leaks, with groups like Anonymous Guys, Arabian Ghosts, and GhostSec actively participating. Hashtags such as #OpIsrael, #FreePalestine, and #SupportIran dominated the campaigns, reflecting ideological alignment with pro-Palestinian and pro-Iranian narratives. ### Information Warfare and Psychological Tactics Beyond technical attacks, hacktivist groups leveraged Telegram channels to amplify geopolitical messaging, reposting claims from allied collectives to project decentralized coordination. Content streams featured pro-Iranian and pro-Palestinian propaganda, including missile strike footage and graphic images of Iranian casualties, blurring the line between cyber operations and psychological warfare. ### Regional Spillover and Broader Implications The conflict’s cyber dimension has extended beyond Israel and Iran, with Egypt, Jordan, Saudi Arabia, and the UAE facing collateral attacks. The U.S. had previously linked CyberAv3ngers (Mr. Soul), an IRGC-affiliated threat actor, to critical infrastructure attacks, underscoring the global reach of state-aligned hacktivism. As hacktivist groups exploit geopolitical tensions to advance ideological agendas, the surge in ransomware, wipers, and banking malware signals a shift toward more disruptive and financially motivated tactics in the region’s cyber landscape.


No incidents recorded for Ministry of Energy of I.R.IRAN - وزارت نیرو in 2026.
No incidents recorded for Ministry of Energy of I.R.IRAN - وزارت نیرو in 2026.
No incidents recorded for Ministry of Energy of I.R.IRAN - وزارت نیرو in 2026.
MEI cyber incidents detection timeline including parent company and subsidiaries

Ministry of Energy, is the main organ of the Government in charge of the regulation and implementation of policies applicable to energy, electricity, water and wastewater services. -The ministry consists of five deputies as follows: Deputy for Research and Human Resources Deputy for Planning and Economic Affairs Deputy for Electricity and Energy Deputy for Water and Wastewater Deputy for Support, Legal, and Parliamentary Affairs


NOV delivers technology-driven solutions to empower the global energy industry. For more than 150 years, NOV has pioneered innovations that enable its customers to safely produce abundant energy while minimizing environmental impact. The energy industry depends on NOV’s deep expertise and technology
Fortune Global 500 Company, Bharat Petroleum is the second largest Indian Oil Marketing Company and one of the premier integrated energy companies in India, engaged in refining of crude oil and marketing of petroleum products, with a significant presence in the upstream and downstream sectors of the
Baker Hughes (NASDAQ: BKR) is an energy technology company that provides solutions for energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, clea

Sonatrach (Société Nationale pour la Recherche, la Production, le Transport, la Transformation, et la Commercialisation des Hydrocarbures s.p.a.) is an Algerian government-owned company formed to exploit the hydrocarbon resources of the country. Its diversified activities cover all aspects of Oil &
At Repsol, we are at the forefront of the energy sector to build the future of energy with innovation and sustainability. We are a strong multienergy company that creates value in an integrated, diversified, and sustainable way to promote progress in society. We leverage our past experience to be pr

We’re a leading producer of the energy and chemicals that drive global commerce and enhance the daily lives of people around the globe by continuing delivering an uninterrupted supply of energy to the world. Our resilience and agility has built one of the world’s largest integrated energy and chemi

TechnipFMC is a leading technology provider to the traditional and new energies industry, delivering fully integrated projects, products, and services. With our proprietary technologies and comprehensive solutions, we are transforming our clients’ project economics, helping them unlock new possibi
Nosso propósito é prover energia que assegure prosperidade de forma ética, justa, segura e competitiva. Queremos ser a melhor empresa diversificada e integrada de energia na geração de valor, construindo um mundo mais sustentável, conciliando o foco em óleo e gás com a diversificação em negócios de
Shell is a global group of energy and petrochemical companies, employing 96,000 people across 70+ countries. We serve around 1 million commercial and industrial customers, and around 33 million customers daily at our Shell-branded retail service stations. Our purpose is to power progress together b
.png)
The European Commission has presented a new cybersecurity package to strengthen the European Union's resilience to increasing cyber and...
CHICAGO - Cybersecurity platform provider Coro announced Wednesday the appointment of Eyal Hen as its new Chief Financial Officer,...
HITRUST Certification validates that BrainCheck is meeting rigorous cybersecurity and data protection standards through independent...
Despite there being complex risks from AI adoption, there is an equally better response from cybersecurity entities, says Akshay Joshi.
This week in cybersecurity from the editors at Cybercrime Magazine.
Cybersecurity's premier global event series partners with the producers of Midnight in the War Room to debut a first-of-its-kind...
Security remediation startup Furl raised a $10 million seed round led by Ten Eleven Ventures, co-founder and CEO Derek Abdine tells Axios...
PALO ALTO, Calif.--(BUSINESS WIRE)--Identity-related attacks were the dominant threat vector in 2025 with 76% of organizations saying they...
The EU's Cybersecurity Act review (CSA2), unveiled on Tuesday, is raising alarm in Beijing, as Chinese tech companies face being looped into...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Ministry of Energy of I.R.IRAN - وزارت نیرو is http://www.moe.gov.ir/.
According to Rankiteo, Ministry of Energy of I.R.IRAN - وزارت نیرو’s AI-generated cybersecurity score is 739, reflecting their Moderate security posture.
According to Rankiteo, Ministry of Energy of I.R.IRAN - وزارت نیرو currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Ministry of Energy of I.R.IRAN - وزارت نیرو has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Ministry of Energy of I.R.IRAN - وزارت نیرو is not certified under SOC 2 Type 1.
According to Rankiteo, Ministry of Energy of I.R.IRAN - وزارت نیرو does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Ministry of Energy of I.R.IRAN - وزارت نیرو is not listed as GDPR compliant.
According to Rankiteo, Ministry of Energy of I.R.IRAN - وزارت نیرو does not currently maintain PCI DSS compliance.
According to Rankiteo, Ministry of Energy of I.R.IRAN - وزارت نیرو is not compliant with HIPAA regulations.
According to Rankiteo,Ministry of Energy of I.R.IRAN - وزارت نیرو is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Ministry of Energy of I.R.IRAN - وزارت نیرو operates primarily in the Oil and Gas industry.
Ministry of Energy of I.R.IRAN - وزارت نیرو employs approximately 187 people worldwide.
Ministry of Energy of I.R.IRAN - وزارت نیرو presently has no subsidiaries across any sectors.
Ministry of Energy of I.R.IRAN - وزارت نیرو’s official LinkedIn profile has approximately 1,115 followers.
Ministry of Energy of I.R.IRAN - وزارت نیرو is classified under the NAICS code 211, which corresponds to Oil and Gas Extraction.
No, Ministry of Energy of I.R.IRAN - وزارت نیرو does not have a profile on Crunchbase.
Yes, Ministry of Energy of I.R.IRAN - وزارت نیرو maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/iran-energy-ministry.
As of January 21, 2026, Rankiteo reports that Ministry of Energy of I.R.IRAN - وزارت نیرو has experienced 1 cybersecurity incidents.
Ministry of Energy of I.R.IRAN - وزارت نیرو has an estimated 10,647 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with hacktivist groups using telegram channels to amplify narratives and claims..
Title: Cyber Conflict Escalation in Middle East: Israel-Iran Hacktivism Surge
Description: The Israel-Iran conflict that began with Israeli attacks on Iranian nuclear and military targets on June 13 has sparked a wider cyber conflict in the region, including the launch of new malware campaigns. Cyble threat intelligence researchers documented cyberattacks by 74 hacktivist groups in the Middle East region between June 13 and 17, with over 90% being pro-Iran. The attacks targeted Israeli organizations and spilled over into Egypt, Jordan, UAE, Pakistan, and Saudi Arabia, involving DDoS attacks, website defacements, unauthorized access, data breaches, ransomware/wiper, and banking malware campaigns.
Date Detected: 2024-06-13
Date Publicly Disclosed: 2024-06-17
Type: DDoS
Attack Vector: Internet-facing systemsAccessibility service abuse (Android malware)Geopolitically targeted malware
Threat Actor: Handala GroupAnonymous GuysArabian GhostsServer KillersRipperSecDienetLulzSec BlackCyber Ghost TeamKeymous+GhostSecDark Storm TeamYemen Cyber ArmyAnonymous Syria HackersRed EagleMysterios TeamTunisian MaskersUnit NineIslamic Hacker ArmyCyber Islamic ResistanceNation of SaviorsUnknown Cybers TeamMr HamzaEvilByteDigital GhostCyber Fattah TeamPredatory SparrowAnon-g Fox
Motivation: GeopoliticalPro-PalestinianPro-IranianAnti-WesternIdeological
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: Banking and cryptocurrency data, personally identifiable information, credentials
Systems Affected: GovernmentDefenseMediaTelecomFinanceEducationEmergency servicesCryptocurrency exchangesChemical/Energy
Operational Impact: Disruption of services, unauthorized access, data exfiltration
Brand Reputation Impact: Significant (defacements, data leaks, ransomware claims)
Identity Theft Risk: High (banking data, PII exposed)
Payment Information Risk: High (card data, bank account details harvested)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Banking Data, Cryptocurrency Data, Personally Identifiable Information, Credentials, Card Data and .

Entity Name: Multiple Israeli organizations
Entity Type: Government, Defense, Media, Telecom, Finance, Education, Chemical/Energy
Industry: Government, Defense, Media, Telecommunications, Finance, Education, Energy
Location: Israel

Entity Name: Nobitex
Entity Type: Cryptocurrency exchange
Industry: Finance
Location: Iran

Entity Name: Iranian organizations
Entity Type: Government, Banking
Industry: Government, Finance
Location: Iran

Communication Strategy: Hacktivist groups using Telegram channels to amplify narratives and claims

Type of Data Compromised: Banking data, Cryptocurrency data, Personally identifiable information, Credentials, Card data
Sensitivity of Data: High (financial, PII, government-related)
Data Exfiltration: Yes (claimed by Handala Group)
Data Encryption: Yes (ransomware/wiper malware)
Personally Identifiable Information: Yes (bank account numbers, balances, card data)

Ransomware Strain: encryption.exe (Anon-g Fox)Handala Group ransomware
Data Encryption: Yes
Data Exfiltration: Yes (claimed by Handala Group)

Lessons Learned: Hacktivist groups are leveraging geopolitical conflicts to amplify cyberattacks, combining digital operations with information warfare. Organizations in conflict zones or allied nations are at heightened risk of DDoS, defacement, data breaches, and ransomware attacks.

Recommendations: Invest in DDoS protections, Enhance data breach prevention measures, Monitor for website defacements, Prepare for ransomware attacks, Implement geopolitical threat intelligence, Secure banking and cryptocurrency applications against malware, Abuse prevention for Accessibility services on AndroidInvest in DDoS protections, Enhance data breach prevention measures, Monitor for website defacements, Prepare for ransomware attacks, Implement geopolitical threat intelligence, Secure banking and cryptocurrency applications against malware, Abuse prevention for Accessibility services on AndroidInvest in DDoS protections, Enhance data breach prevention measures, Monitor for website defacements, Prepare for ransomware attacks, Implement geopolitical threat intelligence, Secure banking and cryptocurrency applications against malware, Abuse prevention for Accessibility services on AndroidInvest in DDoS protections, Enhance data breach prevention measures, Monitor for website defacements, Prepare for ransomware attacks, Implement geopolitical threat intelligence, Secure banking and cryptocurrency applications against malware, Abuse prevention for Accessibility services on AndroidInvest in DDoS protections, Enhance data breach prevention measures, Monitor for website defacements, Prepare for ransomware attacks, Implement geopolitical threat intelligence, Secure banking and cryptocurrency applications against malware, Abuse prevention for Accessibility services on AndroidInvest in DDoS protections, Enhance data breach prevention measures, Monitor for website defacements, Prepare for ransomware attacks, Implement geopolitical threat intelligence, Secure banking and cryptocurrency applications against malware, Abuse prevention for Accessibility services on AndroidInvest in DDoS protections, Enhance data breach prevention measures, Monitor for website defacements, Prepare for ransomware attacks, Implement geopolitical threat intelligence, Secure banking and cryptocurrency applications against malware, Abuse prevention for Accessibility services on Android
Key Lessons Learned: The key lessons learned from past incidents are Hacktivist groups are leveraging geopolitical conflicts to amplify cyberattacks, combining digital operations with information warfare. Organizations in conflict zones or allied nations are at heightened risk of DDoS, defacement, data breaches, and ransomware attacks.
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cyble Threat Intelligence AdvisoryDate Accessed: 2024-06-17.

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Hacktivist groups using Telegram channels to amplify narratives and claims.

Stakeholder Advisories: Organizations in the Middle East and allied nations advised to bolster cybersecurity defenses due to heightened hacktivist activity.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Organizations in the Middle East and allied nations advised to bolster cybersecurity defenses due to heightened hacktivist activity..

Root Causes: Geopolitical conflict escalation, ideologically motivated hacktivist groups, exploitation of regional tensions
Last Attacking Group: The attacking group in the last incident was an Handala GroupAnonymous GuysArabian GhostsServer KillersRipperSecDienetLulzSec BlackCyber Ghost TeamKeymous+GhostSecDark Storm TeamYemen Cyber ArmyAnonymous Syria HackersRed EagleMysterios TeamTunisian MaskersUnit NineIslamic Hacker ArmyCyber Islamic ResistanceNation of SaviorsUnknown Cybers TeamMr HamzaEvilByteDigital GhostCyber Fattah TeamPredatory SparrowAnon-g Fox.
Most Recent Incident Detected: The most recent incident detected was on 2024-06-13.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-06-17.
Most Significant Data Compromised: The most significant data compromised in an incident were Banking and cryptocurrency data, personally identifiable information and credentials.
Most Significant System Affected: The most significant system affected in an incident was GovernmentDefenseMediaTelecomFinanceEducationEmergency servicesCryptocurrency exchangesChemical/Energy.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Banking and cryptocurrency data, personally identifiable information and credentials.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Hacktivist groups are leveraging geopolitical conflicts to amplify cyberattacks, combining digital operations with information warfare. Organizations in conflict zones or allied nations are at heightened risk of DDoS, defacement, data breaches, and ransomware attacks.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Invest in DDoS protections, Monitor for website defacements, Secure banking and cryptocurrency applications against malware, Implement geopolitical threat intelligence, Prepare for ransomware attacks, Abuse prevention for Accessibility services on Android and Enhance data breach prevention measures.
Most Recent Source: The most recent source of information about an incident is Cyble Threat Intelligence Advisory.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Organizations in the Middle East and allied nations advised to bolster cybersecurity defenses due to heightened hacktivist activity., .
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.