ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Ministry of Energy, is the main organ of the Government in charge of the regulation and implementation of policies applicable to energy, electricity, water and wastewater services. -The ministry consists of five deputies as follows: Deputy for Research and Human Resources Deputy for Planning and Economic Affairs Deputy for Electricity and Energy Deputy for Water and Wastewater Deputy for Support, Legal, and Parliamentary Affairs

Ministry of Energy of I.R.IRAN - وزارت نیرو A.I CyberSecurity Scoring

MEI

Company Details

Linkedin ID:

iran-energy-ministry

Employees number:

187

Number of followers:

1,115

NAICS:

211

Industry Type:

Oil and Gas

Homepage:

moe.gov.ir

IP Addresses:

Scan still pending

Company ID:

MIN_1986423

Scan Status:

In-progress

AI scoreMEI Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/iran-energy-ministry.jpeg
MEI Oil and Gas
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreMEI Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/iran-energy-ministry.jpeg
MEI Oil and Gas
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Ministry of Energy of I.R.IRAN - وزارت نیرو

Moderate
Current Score
739
Ba (Moderate)
01000
1 incidents
-11.0 avg impact

Incident timeline with MITRE ATT&CK tactics, techniques, and mitigations.

JANUARY 2026
739
DECEMBER 2025
739
NOVEMBER 2025
738
OCTOBER 2025
738
SEPTEMBER 2025
737
AUGUST 2025
737
JULY 2025
736
JUNE 2025
746
Cyber Attack
18 Jun 2025 • Ministry of Economic Affairs and Finance: Israel-Iran Conflict Sparks Wider Cyber Conflict, New Malware
Cyber Conflict Escalation in Middle East: Israel-Iran Hacktivism Surge

**Escalating Cyber Conflict in the Middle East as Israel-Iran Tensions Fuel Hacktivist Surge** The June 13 Israeli strikes on Iranian nuclear and military targets have triggered a sharp escalation in cyber warfare across the Middle East, with hacktivist groups launching a wave of attacks targeting Israel and regional allies. Between June 13 and 17, threat intelligence firm Cyble documented cyber operations by **74 hacktivist groups**, over **90% of which are pro-Iran**, focusing primarily on Israeli infrastructure while also striking entities in Egypt, Jordan, the UAE, Pakistan, and Saudi Arabia. ### **Targets and Tactics** Israel bore the brunt of the attacks, with government, defense, media, telecom, finance, education, and emergency services sectors hit by **DDoS attacks, website defacements, unauthorized access, data breaches, and ransomware/wiper malware campaigns**. Notable incidents included: - **Five ransomware/extortion attacks** by **Handala Group** against Israeli media, telecom, construction, education, and chemical/energy organizations, with data samples leaked in two cases. - A **ransomware/wiper executable ("encryption.exe")** attributed to the previously unknown **Anon-g Fox**, which checks for **Israel Standard Time (IST) and Hebrew language settings** before executing—terminating if conditions aren’t met. - A **banking malware campaign (IRATA)** targeting **50+ Iranian financial and crypto apps**, impersonating government entities like the **Judicial System of Iran** and the **Ministry of Economic Affairs**. The malware steals credentials, account balances, and card data while remotely controlling infected devices. Other documented attacks included **34 DDoS incidents, five defacements, two data breaches, and four credential leaks**, with groups like **Anonymous Guys, Arabian Ghosts, and GhostSec** actively participating. Hashtags such as **#OpIsrael, #FreePalestine, and #SupportIran** dominated the campaigns, reflecting ideological alignment with pro-Palestinian and pro-Iranian narratives. ### **Information Warfare and Psychological Tactics** Beyond technical attacks, hacktivist groups leveraged **Telegram channels to amplify geopolitical messaging**, reposting claims from allied collectives to project decentralized coordination. Content streams featured **pro-Iranian and pro-Palestinian propaganda**, including **missile strike footage and graphic images of Iranian casualties**, blurring the line between cyber operations and psychological warfare. ### **Regional Spillover and Broader Implications** The conflict’s cyber dimension has extended beyond Israel and Iran, with **Egypt, Jordan, Saudi Arabia, and the UAE** facing collateral attacks. The U.S. had previously linked **CyberAv3ngers (Mr. Soul)**, an IRGC-affiliated threat actor, to critical infrastructure attacks, underscoring the global reach of state-aligned hacktivism. As hacktivist groups exploit geopolitical tensions to advance ideological agendas, the surge in **ransomware, wipers, and banking malware** signals a shift toward more disruptive and financially motivated tactics in the region’s cyber landscape.

735
critical -11
IRA1767601584
DDoS Website Defacement Unauthorized Access Data Breach Ransomware Wiper Malware Banking Malware
Internet-facing systems Accessibility service abuse (Android malware) Geopolitically targeted malware
Geopolitical Pro-Palestinian Pro-Iranian Anti-Western Ideological
Data Compromised: Banking and cryptocurrency data, personally identifiable information, credentials Government Defense Media Telecom Finance Education Emergency services Cryptocurrency exchanges Chemical/Energy Operational Impact: Disruption of services, unauthorized access, data exfiltration Brand Reputation Impact: Significant (defacements, data leaks, ransomware claims) Identity Theft Risk: High (banking data, PII exposed) Payment Information Risk: High (card data, bank account details harvested)
Communication Strategy: Hacktivist groups using Telegram channels to amplify narratives and claims
Banking data Cryptocurrency data Personally identifiable information Credentials Card data Sensitivity Of Data: High (financial, PII, government-related) Data Exfiltration: Yes (claimed by Handala Group) Data Encryption: Yes (ransomware/wiper malware) Personally Identifiable Information: Yes (bank account numbers, balances, card data)
Hacktivist groups are leveraging geopolitical conflicts to amplify cyberattacks, combining digital operations with information warfare. Organizations in conflict zones or allied nations are at heightened risk of DDoS, defacement, data breaches, and ransomware attacks.
Invest in DDoS protections Enhance data breach prevention measures Monitor for website defacements Prepare for ransomware attacks Implement geopolitical threat intelligence Secure banking and cryptocurrency applications against malware Abuse prevention for Accessibility services on Android
['Ongoing']
Organizations in the Middle East and allied nations advised to bolster cybersecurity defenses due to heightened hacktivist activity.
Root Causes: Geopolitical conflict escalation, ideologically motivated hacktivist groups, exploitation of regional tensions
MAY 2025
746
APRIL 2025
746
MARCH 2025
746
FEBRUARY 2025
746

Frequently Asked Questions

According to Rankiteo, the current A.I.-based Cyber Score for Ministry of Energy of I.R.IRAN - وزارت نیرو is 739, which corresponds to a Moderate rating.

According to Rankiteo, the A.I. Rankiteo Cyber Score for December 2025 was 739.

According to Rankiteo, the A.I. Rankiteo Cyber Score for November 2025 was 738.

According to Rankiteo, the A.I. Rankiteo Cyber Score for October 2025 was 738.

According to Rankiteo, the A.I. Rankiteo Cyber Score for September 2025 was 737.

According to Rankiteo, the A.I. Rankiteo Cyber Score for August 2025 was 737.

According to Rankiteo, the A.I. Rankiteo Cyber Score for July 2025 was 736.

According to Rankiteo, the A.I. Rankiteo Cyber Score for June 2025 was 746.

According to Rankiteo, the A.I. Rankiteo Cyber Score for May 2025 was 746.

According to Rankiteo, the A.I. Rankiteo Cyber Score for April 2025 was 746.

According to Rankiteo, the A.I. Rankiteo Cyber Score for March 2025 was 746.

According to Rankiteo, the A.I. Rankiteo Cyber Score for February 2025 was 746.

Over the past 12 months, the average per-incident point impact on Ministry of Energy of I.R.IRAN - وزارت نیرو’s A.I Rankiteo Cyber Score has been -11.0 points.

You can access Ministry of Energy of I.R.IRAN - وزارت نیرو’s cyber incident details on Rankiteo by visiting the following link: https://www.rankiteo.com/company/iran-energy-ministry.

You can find the summary of the A.I Rankiteo Risk Scoring methodology on Rankiteo by visiting the following link: Rankiteo Algorithm.

You can view Ministry of Energy of I.R.IRAN - وزارت نیرو’s profile page on Rankiteo by visiting the following link: https://www.rankiteo.com/company/iran-energy-ministry.

With scores of 18.5/20 from OpenAI ChatGPT, 20/20 from Mistral AI, and 17/20 from Claude AI, the A.I. Rankiteo Risk Scoring methodology is validated as a market leader.