PNN – In a report, citing information published by the Palo Alto-based private company, Channel 10 of the Israeli television network announced that Iranian hackers succeeded in carrying out a major hacking and espionage operation against sensitive centers, and that these attacks continued continuously between February and April.
According to the report of Pakistan News Network; a Hebrew-language media outlet announced that sensitive American, Israeli, and Emirati centers have been taken over by Iranian hackers.
In a report, Channel 10, the Israeli television channel, citing information published by the Palo Alto-based private company, announced that Iranian hackers succeeded in carrying out a major hacking and espionage operation against sensitive centers, and that these attacks continued continuously between February and April.
The report continues: Researchers at Palo Alto Networks (TASE: Ciber, NASDAQ: PANW) have published a report that reveals a sophisticated espionage operation by the Iranian-backed Screening Siren group (also known as the Iranian group), which has used new malware and attack techniques (and achieved significant success).
According to the report, the group targeted entities in the United States, Israel (Occupied Palestine), and the United Arab Emirates, and appears to have targeted two other entities in the Middle East.
The investigation focuses on the evolution of cyber-attacks carried out between mid-February and April of this year.
According to the media outlet, the timing of these operations coincided with the American-Zionist aggression against the Islamic Republic of Iran.
During the investigation, six new types of remote access programs (RATs) were identified that were developed and deployed on the servers of these sensitive centers in the aforementioned months.
According to experts, the six new types of Trojan horse programs were classified into two new families of malware that were deployed as part of parallel espionage campaigns.
Based on activation time, the company’s analysis revealed two waves of cyber-attacks. At least one of these attacks was coded and executed with specific timing instructions.
The most significant development in the group’s latest operation is the use of a technique that exploits the startup phase of .NET applications.

