{"id":10835,"date":"2020-08-31T00:00:00","date_gmt":"2020-08-31T00:00:00","guid":{"rendered":"http:\/\/localhost\/cyber-operations\/pioneer-kitten\/"},"modified":"2020-08-31T00:00:00","modified_gmt":"2020-08-31T00:00:00","slug":"pioneer-kitten","status":"publish","type":"post","link":"https:\/\/www.cfr.org\/cyber-operations\/pioneer-kitten","title":{"rendered":"Pioneer Kitten"},"content":{"rendered":"<p>Responsible for gathering sensitive and private information relevant to Iran. In addition to stalking Iranian expats and dissidents, Pioneer Kitten has targeted North American and Israeli technology, government, defense, and healthcare organizations. Pioneer Kitten is unlikely to be an official part of the Iranian government, and is more likely contracted to act on its behalf.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Responsible for gathering sensitive and private information relevant to Iran. In addition to stalking Iranian expats and dissidents, Pioneer Kitten has targeted North American and Israeli technology, government, defense, and healthcare organizations. Pioneer Kitten is unlikely to be an official part of the Iranian government, and is more likely contracted to act on its behalf.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_cloudinary_featured_overwrite":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"cyber_operation":[49],"state_sponsor":[76],"victim_category":[32,63,138],"victim_government_response":[],"victim":[77,80],"class_list":["post-10835","post","type-post","status-publish","format-standard","hentry","category-threat-actor","cyber_operation-espionage","state_sponsor-iran-islamic-republic-of","victim_category-civil-society","victim_category-government","victim_category-private-sector","victim-iran-islamic-republic-of","victim-israel"],"acf":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/posts\/10835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/comments?post=10835"}],"version-history":[{"count":0,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/posts\/10835\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/media?parent=10835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/categories?post=10835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/tags?post=10835"},{"taxonomy":"cyber_operation","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/cyber_operation?post=10835"},{"taxonomy":"state_sponsor","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/state_sponsor?post=10835"},{"taxonomy":"victim_category","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/victim_category?post=10835"},{"taxonomy":"victim_government_response","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/victim_government_response?post=10835"},{"taxonomy":"victim","embeddable":true,"href":"https:\/\/www.cfr.org\/cyber-operations\/wp-json\/wp\/v2\/victim?post=10835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}