ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Islamic Republic of Iran Broadcasting, or IRIB, (Persian: صدا و سيمای جمهوری اسلامی ايران‎, Sedā va Sima-ye Jomhūrī-ye Eslāmī-ye Īrān literally Voice (or Sound) and Vision of the Islamic Republic of Iran), formerly called the National Iranian Radio and Television until the Islamic revolution of 1979, is a giant Iranian corporation in control of radio and television which is among the largest media organizations in Asia and Pacific region, and a regular member of Asia-Pacific Broadcasting Union.

IRIB A.I CyberSecurity Scoring

IRIB

Company Details

Linkedin ID:

irib

Employees number:

3,796

Number of followers:

6,757

NAICS:

51211

Industry Type:

Media Production

Homepage:

http://www.irib.ir

IP Addresses:

0

Company ID:

IRI_7004611

Scan Status:

In-progress

AI scoreIRIB Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/irib.jpeg
IRIB Media Production
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreIRIB Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/irib.jpeg
IRIB Media Production
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

IRIB Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
IRIBCyber Attack10056/1979
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Iran’s state-owned television station, the Islamic Republic of Iran Broadcasting (IRIB) was targeted by Adalat Ali (Ali’s Justice), a hacktivist group. The group hijacked its web-based TV and radio streaming platform,Telewebion, to broadcast an anti-regime message containing a short 50-second video. The Iran’s national TV stream hacked for the second time in a week A hacktivist group known as Adalat Ali (Ali’s Justice) has hijacked the web stream of Iran’s state-owned television station, the Islamic Republic of Iran Broadcasting (IRIB), in order to broadcast an anti-regime message earlier this week. The incident took place on Tuesday, February 1, and hit Telewebion, IRIB’s web-based TV and radio streaming platform. During a live broadcast of the Iran-UAE soccer match, the Adalat Ali group hijacked the web stream and aired a short 50-second video in which it urged Iranians to rise up in nationwide protests against the ruling Khamenei regime during the Fajr Decade, an 11-day celebration of the 1979 Revolution that takes place each year between February 1 and February 11. The message was replayed at various intervals for hours before Telewebion regained control over its platform and removed the access. This was the second hijacking incident that took place in the past few weeks.

IRIB
Cyber Attack
Severity: 100
Impact: 5
Seen: 6/1979
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: Iran’s state-owned television station, the Islamic Republic of Iran Broadcasting (IRIB) was targeted by Adalat Ali (Ali’s Justice), a hacktivist group. The group hijacked its web-based TV and radio streaming platform,Telewebion, to broadcast an anti-regime message containing a short 50-second video. The Iran’s national TV stream hacked for the second time in a week A hacktivist group known as Adalat Ali (Ali’s Justice) has hijacked the web stream of Iran’s state-owned television station, the Islamic Republic of Iran Broadcasting (IRIB), in order to broadcast an anti-regime message earlier this week. The incident took place on Tuesday, February 1, and hit Telewebion, IRIB’s web-based TV and radio streaming platform. During a live broadcast of the Iran-UAE soccer match, the Adalat Ali group hijacked the web stream and aired a short 50-second video in which it urged Iranians to rise up in nationwide protests against the ruling Khamenei regime during the Fajr Decade, an 11-day celebration of the 1979 Revolution that takes place each year between February 1 and February 11. The message was replayed at various intervals for hours before Telewebion regained control over its platform and removed the access. This was the second hijacking incident that took place in the past few weeks.

Ailogo

IRIB Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for IRIB

Incidents vs Media Production Industry Average (This Year)

No incidents recorded for IRIB in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for IRIB in 2025.

Incident Types IRIB vs Media Production Industry Avg (This Year)

No incidents recorded for IRIB in 2025.

Incident History — IRIB (X = Date, Y = Severity)

IRIB cyber incidents detection timeline including parent company and subsidiaries

IRIB Company Subsidiaries

SubsidiaryImage

Islamic Republic of Iran Broadcasting, or IRIB, (Persian: صدا و سيمای جمهوری اسلامی ايران‎, Sedā va Sima-ye Jomhūrī-ye Eslāmī-ye Īrān literally Voice (or Sound) and Vision of the Islamic Republic of Iran), formerly called the National Iranian Radio and Television until the Islamic revolution of 1979, is a giant Iranian corporation in control of radio and television which is among the largest media organizations in Asia and Pacific region, and a regular member of Asia-Pacific Broadcasting Union.

Loading...
similarCompanies

IRIB Similar Companies

Freelancer

A freelancer or freelance worker is a term commonly used for a person who is self-employed and is not necessarily committed to a particular employer long-term. Freelance workers are sometimes represented by a company or a temporary agency that resells freelance labor to clients; others work independ

Bertelsmann SE & Co. KGaA

Bertelsmann is a media, services and education company with more than 80,000 employees that operates in about 50 countries around the world. It includes the entertainment group RTL Group, the trade book publisher Penguin Random House, the music company BMG, the service provider Arvato Group, Bertels

newsone

IRIB CyberSecurity News

December 06, 2025 08:00 AM
Tehran and Moscow sign deal on AI, cybersecurity | Iran International

Iran and Russia have signed a new cooperation agreement on artificial intelligence and cybersecurity, Iranian state media reported,...

September 16, 2025 07:00 AM
Knowledge-based companies to attend ITEX in Iraq

TEHRAN – An Iranian delegation will participate in the 4th International Telecommunications and Information Technology Exhibition and...

July 18, 2025 07:00 AM
Iranian, Iraqi officials discuss enhancing technological ties

TEHRAN –The Information and Communication Technology (ICT) Minister, Sattar Hashemi, and the Iraqi ambassador to Tehran, Naseer Abdul Mohsen...

June 25, 2025 07:00 AM
Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games

Thousands of personal records from Saudi Games leaked by Cyber Fattah, fueling geopolitical tensions between Iran, Israel, and the U.S..

June 18, 2025 07:00 AM
10 Things to Know About Tehran’s Propaganda Network, the Islamic Republic of Iran Broadcasting

IRIB is far from an independent news channel. Rather, it is a tool of the Islamic Republic that uses torture and other unlawful and internationally condemned...

June 18, 2025 07:00 AM
Iran-Israel Conflict Spills to Digital World, Inflaming Rivalry

The conflict between Israel and Iran is spilling over into the digital world, inflaming a decades-long campaign of hacks and espionage between two nations.

June 18, 2025 07:00 AM
Hackers steal and destroy millions from Iran’s largest crypto exchange

It's the latest cyberattack on Iran claimed by a pro-Israeli hacking group since the latest flare up in tensions between the two countries.

June 17, 2025 07:00 AM
In Iran's ban on internet-connected devices, a reminder of Israel's Lebanon walkie-talkie, pager blasts | World News

Iran's cybersecurity command has banned the use of internet-connected devices for government officials and their security teams.

May 27, 2023 07:00 AM
Khorramshahr-4 missile capable of neutralizing cyber-attacks

TEHRAN, May 27 (MNA) – Newly-unveiled Khorramshahr-4 missile is capable of neutralizing enemy cyber-attacks, the Iranian deputy defense...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

IRIB CyberSecurity History Information

Official Website of IRIB

The official website of IRIB is http://www.irib.ir.

IRIB’s AI-Generated Cybersecurity Score

According to Rankiteo, IRIB’s AI-generated cybersecurity score is 767, reflecting their Fair security posture.

How many security badges does IRIB’ have ?

According to Rankiteo, IRIB currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does IRIB have SOC 2 Type 1 certification ?

According to Rankiteo, IRIB is not certified under SOC 2 Type 1.

Does IRIB have SOC 2 Type 2 certification ?

According to Rankiteo, IRIB does not hold a SOC 2 Type 2 certification.

Does IRIB comply with GDPR ?

According to Rankiteo, IRIB is not listed as GDPR compliant.

Does IRIB have PCI DSS certification ?

According to Rankiteo, IRIB does not currently maintain PCI DSS compliance.

Does IRIB comply with HIPAA ?

According to Rankiteo, IRIB is not compliant with HIPAA regulations.

Does IRIB have ISO 27001 certification ?

According to Rankiteo,IRIB is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of IRIB

IRIB operates primarily in the Media Production industry.

Number of Employees at IRIB

IRIB employs approximately 3,796 people worldwide.

Subsidiaries Owned by IRIB

IRIB presently has no subsidiaries across any sectors.

IRIB’s LinkedIn Followers

IRIB’s official LinkedIn profile has approximately 6,757 followers.

NAICS Classification of IRIB

IRIB is classified under the NAICS code 51211, which corresponds to Motion Picture and Video Production.

IRIB’s Presence on Crunchbase

No, IRIB does not have a profile on Crunchbase.

IRIB’s Presence on LinkedIn

Yes, IRIB maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/irib.

Cybersecurity Incidents Involving IRIB

As of December 16, 2025, Rankiteo reports that IRIB has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

IRIB has an estimated 6,561 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at IRIB ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.

How does IRIB detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with regained control over the platform and removed the access..

Incident Details

Can you provide details on each incident ?

Incident : Hacktivism

Title: Hacktivist Group Hijacks Iran’s State-Owned Television Station

Description: The hacktivist group Adalat Ali (Ali’s Justice) hijacked the web-based TV and radio streaming platform, Telewebion, of Iran’s state-owned television station, the Islamic Republic of Iran Broadcasting (IRIB), to broadcast an anti-regime message.

Date Detected: 2022-02-01

Type: Hacktivism

Attack Vector: Web-based streaming platform hijacking

Threat Actor: Adalat Ali (Ali’s Justice)

Motivation: Political activism against the ruling Khamenei regime

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Web-based streaming platform.

Impact of the Incidents

What was the impact of each incident ?

Incident : Hacktivism IRI18395522

Systems Affected: Telewebion web-based streaming platform

Operational Impact: Interruption of live broadcast

Brand Reputation Impact: Negative impact on state-owned television's reputation

Which entities were affected by each incident ?

Incident : Hacktivism IRI18395522

Entity Name: Islamic Republic of Iran Broadcasting (IRIB)

Entity Type: State-owned television station

Industry: Media and Broadcasting

Location: Iran

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Hacktivism IRI18395522

Containment Measures: Regained control over the platform and removed the access

Data Breach Information

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by regained control over the platform and removed the access.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Hacktivism IRI18395522

Entry Point: Web-based streaming platform

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Adalat Ali (Ali’s Justice).

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2022-02-01.

Impact of the Incidents

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Telewebion web-based streaming platform.

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Regained control over the platform and removed the access.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Web-based streaming platform.

cve

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=irib' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge