Thursday, May 21, 2020

Two High-Profile OSINT and Technical Collection Analysis Reports on Iran's Hacking Scene and the Ashiyane Digital Security Team - Available for Free!

Dear blog readers,

It's a pleasure and an honor to let you know that I've just made two of my most important and high-profile studies on Iran's Hacking Scene and Iran's Hacking Ecosystem including a high-profile and never-published before SNA (Social Network Analysis) of Iran's Hacking Scene using Maltego publicly accessible with the idea to get more people to read them and actually act upon them potentially assisting the U.S Intelligence Community and U.S Law Enforcement on its way to track down the prosecute the cybercriminals behind these campaigns.

I've decided to share direct download copies of the two reports with the idea to assist you and your team including possibly a vendor or an organization on its way to catch up with what Iran's Hacking Scene has been up to including the infamous Ashiyane Digital Security Team in the context of offering an in-depth and never-published before OSINT analysis on Iran's Hacking Scene including an in-depth and comprehensive SNA (Social Network Analysis) graph of Iran's Hacking Scene using Maltego.

  • Consider going through the following post to go through an OSINT analysis on the FBI's Most Wanted Iran-based cybercriminals including actionable intelligence and in-depth OSINT analysis including a SNA (Social Network Analysis) graph of Sun Army Team Members, ITSec Team Members, and the Mersad Co. company.
An excerpt from the first report which you can grab from here:

"In this report I’ll provide in-depth analysis of the Iranian Hacking Scene and potentially its use of offensive and defensive cyber warfare practices including possible capability measurement and estimation in terms of technical capabilities and offer in-depth technical and qualitative analysis of some of the key factors that actually drive the Iranian Hacking Scene including in-depth Technical Collection material and OSINT gathered artifacts to assist in the process of acting upon the growing threat posed by Iranian Hackers and the Ashiyane Digital Security Team internationally with the idea to empower decision-makers and the Industry including third-party stakeholders with the necessary analysis to act upon and take measures against in terms of offensive and defensive cyber warfare operations and actual Law Enforcement tracking down and prosecution including never-published and released before personally identifiable information on the Ashiyane Digital Security Team including its key members including a never-published before Social Network Analysis Graph of Iran’s Hacking Scene and Iran’s Hacking Underground."

An excerpt from the second report which you can grab from here:

"This qualitative analysis (45 pages) seeks to assess the Computer Network Operations (CNO) of Islamic Republic of Iran, through the prism of the adversary’s understanding of Tactics, Techniques and Procedures (TTP), a structured and geopolitically relevant, enriched OSINT assessment of their operations, consisting of interpreted hacking literature, videos, and, custom made hacking tools, extensive SNA (Social Network Analysis) of the country’s Hacking Ecosystem, real-life personalization of the key individuals behind the groups (personally identifiable photos, personal emails, phone numbers, Blogs, Web Sites, Social Networking accounts etc.). It’s purpose is to ultimately empower decision/policy makers, as well as intelligence analysts, with recommendations for countering Islamic Republic of Iran’s growing understanding and application of CNO tactics and strategies."
  • Overview and In-Depth Analysis of Iran’s Most Popular Hacking Groups
  • Personally Identifiable Information and Enriched OSINT Analysis
  • Iran Hacking Group’s Team Members Personal Photos
  • Iran Hacking Team’s Personal Group Photos
  • Personal and Group-Published Hacking and Security Tools
  • Analysis of Iran’s Cyber Academic Sector
  • Social Network Analysis Maltego Graph
Iran-based Hacking Groups and Team covered and discussed in-depth:
  • Overview and In-Depth Analysis of Iran’s Most Popular Hacking Groups
  • Personally Identifiable Information and Enriched OSINT Analysis
  • Iran Hacking Group’s Team Members Personal Photos
  • Iran Hacking Team’s Personal Group Photos
  • Personal and Group-Published Hacking and Security Tools
  • Analysis of Iran’s Cyber Academic Sector
  • Social Network Analysis Maltego Graph
Enjoy!