{"id":27496,"date":"2019-06-25T16:40:00","date_gmt":"2019-06-25T16:40:00","guid":{"rendered":"https:\/\/www.darkreading.com\/companies-on-watch-after-us-iran-claim-cyberattacks\/d\/d-id\/1335045"},"modified":"2019-06-25T16:40:00","modified_gmt":"2019-06-25T16:40:00","slug":"companies-on-watch-after-us-iran-claim-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/","title":{"rendered":"Companies on Watch After US, Iran Claim Cyberattacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<header>\n<\/header>\n<p><span class=\"strong black\">With the cyber conflict between the United States and Iran ramping up, companies traditionally targeted by the countries &#8211; such as those in the oil and gas and financial industries &#8211; need to bolster their security efforts, experts say.<\/span> <\/p>\n<p class=\"p1\">With tensions ratcheting up in the Middle East \u2014 and both the US and Iran claiming to have begun offensive cyber operations \u2014 critical infrastructure companies and firms with links to the region need to take a heightened security posture, cyberattack and cyber espionage experts say.<\/p>\n<p class=\"p2\">In the past, Iran&#8217;s cyber operators and proxies have attacked companies with wiper software that deleted data and, more recently, targeted safety systems at critical infrastructure firms, such as oil and gas providers and electric utilities. The country has also conducted wide-ranging cyber espionage attacks against other countries and organizations in the region, as well as deployed surveillance software against dissidents and political targets.<\/p>\n<p class=\"p2\">Companies, government agencies, and other organizations should look at those capabilities and targets and determine whether they might be in any of those categories, says Ben Read, senior manager of cyber espionage analysis at FireEye.<\/p>\n<p class=\"p2\">&#8220;Companies need to ask: Has my sector been targeted before?&#8221; he says. &#8220;They don&#8217;t see these activities in a vacuum, so companies that have done business in the region should, perhaps, have more concern \u2014 the oil and gas and financial industries, for example.&#8221;<\/p>\n<p class=\"p2\">On June 20, the US Cyber Command attacked Iranian computer systems used to control air defense systems and missile launchers, targeting an Iranian intelligence group that the Trump administration claims took part in previous attacks on oil tankers, US officials told <a href=\"https:\/\/www.wsj.com\/articles\/u-s-launched-cyberattacks-on-iran-11561263454?mod=article_inline\" target=\"_blank\" rel=\"noopener noreferrer\">multiple<\/a> <a href=\"https:\/\/www.nytimes.com\/2019\/06\/22\/us\/politics\/us-iran-cyber-attacks.html\" target=\"_blank\" rel=\"noopener noreferrer\">news<\/a> <a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/with-trumps-approval-pentagon-launched-cyber-strikes-against-iran\/2019\/06\/22\/250d3740-950d-11e9-b570-6416efdc0803_story.html\" target=\"_blank\" rel=\"noopener noreferrer\">organizations<\/a>. For its part, Iranian proxies <a href=\"https:\/\/www.wired.com\/story\/iran-hackers-us-phishing-tensions\/\" target=\"_blank\" rel=\"noopener noreferrer\">reportedly launched attacks<\/a> against the US on the same day.<\/p>\n<p class=\"p2\">Given the history of cyber operations, and the general lack of repercussions for the attacking nations, the option of launching cyberattacks is seen as an option that minimizes the chance of escalation, <a href=\"https:\/\/www.jpost.com\/Middle-East\/Ex-NSA-chief-Iran-US-cyber-wars-means-hacking-attacks-to-increase-593613\" target=\"_blank\" rel=\"noopener noreferrer\">said Mike Rogers<\/a>, former director of the National Security Agency and former head of the US Cyber Command, at the Cyberweek conference in Israel.&nbsp;<\/p>\n<p class=\"p2\">&#8220;The US and Iran both view cybersecurity as a potential response option that offers lower risk than a kinetic or military strike,&#8221; he said. &#8220;So we will continue to see more of this because it doesn&#8217;t necessarily trigger an escalatory response from the other side.\u201d<\/p>\n<p class=\"p2\">The latest spate of attacks followed the downing of a US drone by Iran&#8217;s military. The US government claims that the drone was in international airspace, while Iran claims the drone was in its territory.<\/p>\n<p class=\"p2\"><strong>An Escalation for US Firms<br \/><\/strong>For companies, however, the increase in cyber operations between the two countries could result in increased attack activity.&nbsp;<\/p>\n<p class=\"p2\">The US Department of Homeland Security&#8217;s Cybersecurity and Infrastructure Security Agency (CISA) warned companies and industries in the United States to shore up their basic defenses, deploying hardening technologies such as multifactor authentication to ward off increased attacks.<\/p>\n<p class=\"p2\">&#8220;Iranian regime actors and proxies are increasingly using destructive &#8216;wiper&#8217; attacks, looking to do much more than just steal data and money,&#8221; said CISA director Christopher Krebs <a href=\"https:\/\/www.dhs.gov\/cisa\/news\/2019\/06\/22\/cisa-statement-iranian-cybersecurity-threats\" target=\"_blank\" rel=\"noopener noreferrer\">in a statement<\/a>. &#8220;These efforts are often enabled through common tactics like spear phishing, password spraying, and credential stuffing. What might start as an account compromise, where you think you might just lose data, can quickly become a situation where you\u2019ve lost your whole network.&#8221;<\/p>\n<p class=\"p2\">In many cases, US companies are not up for the challenge. In a recent study, real-time monitoring firm Endace found that <a href=\"https:\/\/www.endace.com\/endace-releases-global-research-report-challenges-of-managing-and-protecting-the-network-2019\" target=\"_blank\" rel=\"noopener noreferrer\">almost 90% of surveyed firms<\/a> did not have good visibility into network activity.&nbsp;<\/p>\n<p class=\"p2\"><strong>Iran&#8217;s Skilled Attackers<br \/><\/strong>Iran&#8217;s cyber capability is significant. Its 2012 attack against Saudi Arabia&#8217;s state-owned oil company Saudi Aramco resulted in the <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/30000-machines-infected-in-targeted-attack-on-saudi-aramco\/d\/d-id\/1138287\" target=\"_blank\" rel=\"noopener noreferrer\">destruction of data on tens of thousands of hard drives<\/a>. More recently, attacks against oil and gas companies and electric utilities that&nbsp;<a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/triton-attacks-underscore-need-for-better-defenses\/d\/d-id\/1334418\" target=\"_blank\" rel=\"noopener noreferrer\">targeted a specific type of safety system<\/a> has also been linked to Iranian actors.&nbsp;&nbsp;<\/p>\n<p class=\"p2\">FireEye has attributed multiple attacks against large companies to Iranian cyberattackers, including one it has been tracking for more than four years. The group \u2014 labeled &#8220;APT39&#8221; by FireEye, Helix Kitten by CrowdStrike, and Chafer by Symantec \u2014 has <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/iran-ups-its-traditional-cyber-espionage-tradecraft\/d\/d-id\/1333764\" target=\"_blank\" rel=\"noopener noreferrer\">targeted telecommunications, travel, and technology firms<\/a>.<\/p>\n<p class=\"p2\">&#8220;Iran certainly has gotten into lots of US companies,&#8221; FireEye&#8217;s Read says. &#8220;I know because we have responded to incidents and had to kick them out.&#8221;<\/p>\n<p class=\"p2\">In the &#8220;Worldwide Threat Assessment of the U.S. Intelligence Community,&#8221; an annual report delivered to the US Congress, director of national intelligence Daniel Coats warned that Iran&#8217;s cyber capabilities pose an increasing threat to US companies.<\/p>\n<p class=\"p2\">&#8220;Iran uses increasingly sophisticated cyber techniques to conduct espionage,&#8221; he stated. &#8220;It is also attempting to deploy cyberattack capabilities that would enable attacks against critical infrastructure in the United States and allied countries.&#8221;<\/p>\n<p class=\"p2\">He added: &#8220;[Iran] is capable of causing localized, temporary disruptive effects \u2014 such as disrupting a large company&#8217;s corporate networks for days to weeks \u2014 similar to its data deletion attacks against dozens of Saudi governmental and private-sector networks in late 2016 and early 2017.&#8221;<\/p>\n<p class=\"p2\"><strong>Back to Basics<br \/><\/strong>Security experts stress that companies need to do the basics well. The US Department of Homeland Security prodded firms to deploy multifactor authentication to stymie account takeovers and urged firms to work on speeding up their incident response.<\/p>\n<p class=\"p2\">FireEye&#8217;s Read also recommends that companies make sure they are doing the basics consistently.<\/p>\n<p class=\"p2\">&#8220;Doing the basics right is the most important thing for security,&#8221; he says. &#8220;If you already are doing that, take it to the next level \u2014 look at the tactics of specific adversaries and make sure you can spot those in your own network.&#8221;<\/p>\n<p class=\"p2\">In the end, while the US and Iran gear up for cyber operations, businesses will find themselves at the front lines.<\/p>\n<p class=\"p2\"><strong>Related Content<\/strong><\/p>\n<p><strong>&nbsp;<\/strong><\/p>\n<p><span class=\"italic\">Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT&#8217;s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=1161\">View Full Bio<\/a><\/span> <\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/companies-on-watch-after-us-iran-claim-cyberattacks\/d\/d-id\/1335045?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the cyber conflict between the United States and Iran ramping up, companies traditionally targeted by the countries &#8211; such as those in the oil and gas and financial industries &#8211; need to bolster their security efforts, experts say. Read More <a href=\"https:\/\/www.darkreading.com\/companies-on-watch-after-us-iran-claim-cyberattacks\/d\/d-id\/1335045?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-27496","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Companies on Watch After US, Iran Claim Cyberattacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Companies on Watch After US, Iran Claim Cyberattacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-25T16:40:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-on-watch-after-us-iran-claim-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-on-watch-after-us-iran-claim-cyberattacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Companies on Watch After US, Iran Claim Cyberattacks\",\"datePublished\":\"2019-06-25T16:40:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-on-watch-after-us-iran-claim-cyberattacks\\\/\"},\"wordCount\":1018,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-on-watch-after-us-iran-claim-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-on-watch-after-us-iran-claim-cyberattacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-on-watch-after-us-iran-claim-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-on-watch-after-us-iran-claim-cyberattacks\\\/\",\"name\":\"Companies on Watch After US, Iran Claim Cyberattacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-on-watch-after-us-iran-claim-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-on-watch-after-us-iran-claim-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"datePublished\":\"2019-06-25T16:40:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-on-watch-after-us-iran-claim-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-on-watch-after-us-iran-claim-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-on-watch-after-us-iran-claim-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-on-watch-after-us-iran-claim-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Companies on Watch After US, Iran Claim Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Companies on Watch After US, Iran Claim Cyberattacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Companies on Watch After US, Iran Claim Cyberattacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-06-25T16:40:00+00:00","og_image":[{"url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Companies on Watch After US, Iran Claim Cyberattacks","datePublished":"2019-06-25T16:40:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/"},"wordCount":1018,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/","url":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/","name":"Companies on Watch After US, Iran Claim Cyberattacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","datePublished":"2019-06-25T16:40:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/#primaryimage","url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","contentUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/companies-on-watch-after-us-iran-claim-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Companies on Watch After US, Iran Claim Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27496"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27496\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}