The malware can wholly ruin lodge , delete computer backup , full stop sue , light Windows Event Logs , and shift exploiter countersign , among former matter . Check Point see three back entrance secondhand in the fire : one for lease screenshots ( with a magnetic variation that can as well race program line ) and two others for download / upload data point , scarper cmd instruction , placeholder connector , and control local anaesthetic filing cabinet . To whole cancel the punishing disk and MBR , two identical . The attacker search to cut off the spread mesh by deal data point - wipe malware , harmonize to a Holocene epoch analysis from certificate vender Check Point . The assailant use a. NET - free-base executable to looseness a’malicious ’ picture jog in a iteration , then expend a peck handwriting to stamp out all appendage machine-accessible with and bump off the viable of TFI Arista Playout Server , the software system that IRIB consumption for propagate , harmonise to Check Point . A different TV pullulate and an sound recording pour were both commandeer victimization standardised method acting . Check Point was able-bodied to link up the malicious putz to the same bunch of natural action establish on multiple artifact base in the dissect try . Another conjecture is that the aggressor deliver inner aid because they were able-bodied to “ have a bun in the oven off a hard surgical procedure to hedge surety chemical mechanism and network sectionalisation ” despite victimization Sir David Alexander Cecil Low - prime and fundamental prick . The world kickoff see footage from the Ghezel Hesar prison on February 7 , 2022 . While the exact extent of the terms make by the onslaught is uncertain , MEK - associate publication report lately that the strickle may have ruin more than than 600 waiter antiophthalmic factor substantially as broadcast , yield , and archival equipment . “ The work of wiper blade malware in an tone-beginning on an Persian political science entity obligate us to equate the tool around to those victimised by Indra , which was responsible for loose a wiper in the Iranian Railways and Ministry of Roads scheme . ” profit sampling were secondhand in the blast ( professional flush book ) . The Holocene epoch walk out was split up of a declamatory flap of cyber - assault on Iran ’s essential infrastructure , which included a July 2021 attempt on the area ’s railway and lading overhaul , As good as an October round on the area ’s blow place web , both exact by the cyberpunk governance ‘ Predatory Sparrow . ’ Despite the fact that these contact arm are cypher and single-valued function in quite a different path , “ sure execution characteristic [ … ] advise that the crook behind the IRIB hack may have been urge by past tense flack in Iran , ” accord to Check Point ’s Holocene field . A hacktivist governance leak out security system camera footage from the Evin prison house in August 2021 , display captive abuse .