Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 2
37 résultats taggé Iran  ✕
Wartime cyberattack wiped data from two major Iranian banks, expert says | Iran International https://www.iranintl.com/en/202507192001
22/07/2025 11:30:50
QRCode
archive.org
thumbnail

iranintl.com - A cyberattack during the 12-day Iran-Israel war destroyed banking data at major Iranian banks Sepah and Pasargad, halting services nationwide and triggering a high-stakes emergency response by an Iranian banking software firm, a senior engineer said.
“Nothing was accessible. Nothing was visible,” wrote Hamidreza Amouzegar, deputy head of product development at the software firm Dotin, in a LinkedIn post recounting the June 17 breach.

“We tried the backup site—same story there.”

The internet banking, mobile banking, and ATMs of the two banks remained largely non-functional until recently.

Dotin, a major provider of digital systems to Iranian banks, found itself at the center of the crisis.

“Sepah Bank’s primary data center had gone dark, with monitoring dashboards frozen and all stored data apparently corrupted,” he added.

When engineers attempted to switch over to the disaster recovery site, they found that it too had failed, with matching damage reported.

“At that point, the priority was no longer identifying the culprit or mapping the technical details,” Amouzegar wrote. “It was about getting public banking services back online—fast.”

To that end, he wrote, teams turned to Samsonite, a portable data center in a suitcase developed by Dotin following service disruptions in 2022. The system was designed to provide core banking functions—particularly card transactions—for short periods without reliance on the main network.

Nobitex, Iran’s largest cryptocurrency exchange, had also confirmed cyberattacks against its systems during the war.

The pro-Israel hacker group Predatory Sparrow, known for prior cyberattacks on Iran’s fuel infrastructure, claimed responsibility for "paralyzing" Sepah Bank and draining more than $90 million from Nobitex.

Sepah Bank is responsible for processing the payments of military personnel.

Pasargad Bank had already deployed Samsonite, allowing it to restore limited services by the early hours of June 19. Sepah, which had not yet installed the system, remained offline longer, Amouzegar added.

Basic card functionality there was only restored by June 20 after a full system rebuild from partial offline backups, he wrote.

“For a bank processing over a billion transactions monthly, losing just one day meant more than 30 million transactions vanished,” Amouzegar said.

Sepah’s full recovery took until June 27, during which time Samsonite processed more than 60 million transactions.

“The cyber war ended three days after the ceasefire,” he added. “But recovery will take months. What I’ve shared here is only a fragment of the story.”

iranintl.com EN 2025 Iran bank Pasargad Sepah cyberattack
Pay2Key’s Resurgence: Iranian Cyber Warfare Targets the West https://www.morphisec.com/blog/pay2key-resurgence-iranian-cyber-warfare/
09/07/2025 09:33:51
QRCode
archive.org

morphisec - In the volatile aftermath of the Israel-Iran-USA conflict, a sophisticated cyber threat has re-emerged, targeting organizations across the West. Morphisec’s threat research team has uncovered the revival of Pay2Key, an Iranian-backed ransomware-as-a-service (RaaS) operation, now operating as Pay2Key.I2P. Linked to the notorious Fox Kitten APT group and closely tied to the well-known Mimic ransomware, previously analyzed by Morphisec for its ELENOR-Corp variant, Pay2Key.I2P appears to partner with or incorporate Mimic’s capabilities. Officially, the group offers an 80% profit share (up from 70%) to affiliates supporting Iran or participating in attacks against the enemies of Iran, signaling their ideological commitment. With over $4 million in ransom payments collected in just four months and individual operators boasting $100,000 in profits, this campaign merges technical prowess with geopolitical motives. Our upcoming report includes personal communications from the group, revealing their dedication and the reasons behind rewriting their ransomware.

This blog introduces our technical analysis and OSINT findings, exposing Pay2Key.I2P’s operations and its ties to Mimic.

ince its debut in February 2025, Pay2Key.I2P has expanded rapidly. Strategic marketing on Russian and Chinese darknet forums, combined with a presence on X since January 2025, indicates a planned rollout. With over 51 successful ransom payouts in four months, the group’s effectiveness is undeniable.

While profit is a motivator, Pay2Key.I2P’s ideological agenda is clear. Their focus on Western targets, coupled with rhetoric tied to Iran’s geopolitical stance, positions this campaign as a tool of cyber warfare. The addition of a Linux-targeted ransomware build in June 2025 further expands their attack surface, threatening diverse systems.

morphisec EN 2025 Pay2Key Cyber-Warfare Iran
Hacktivists' Claimed Breach of Nuclear Secrets Debunked https://www.databreachtoday.com/hacktivists-claimed-breach-nuclear-secrets-debunked-a-28881
05/07/2025 13:47:03
QRCode
archive.org
thumbnail

Security experts are dismissing a pro-Iranian hacktivist group's claim to have breached Indian nuclear secrets in reprisal for the country's support of Israel.

The LulzSec Black group last week claimed to have hacked "the company responsible for Indian nuclear reactors" and to have stolen 80 databases, of which it was now selling 17 databases containing 5.2 gigabytes of data. The group claimed the information detailed the precise location of India's nuclear reactors, numerous chemical laboratories, employee personally identifiable information, industrial and engineering information, precise details of guard shifts and "other sensitive data related to infrastructure."

LulzSec Black, named after the notorious hacktivist collective that committed a string of high-profile hits in 2011, claims to be a group of "Palestinian hackers." Previous attacks tied to the group include disruptions targeting Israel, as well as countries that support Israel, including France and Cyprus.

Threat intelligence firm Resecurity said the group's nuclear claims vary from being dramatically overstated to outright lies.

"This activity is related to the 'pseudo-hacktivist' activities by Iran" designed to provoke fear, uncertainty and doubt, Resecurity told Information Security Media Group. "Many of their statements are overstatements, having no connection to reality. For example, they clearly do not have '80 databases' or even 5.2 GB of data."

LulzSec Black's claims arrive amidst U.S. government alerts of the "heightened threat environment" facing critical infrastructure networks and operational technology environments, following Israel launching missile strikes against Iran on June 13 (see: Infrastructure Operators Leaving Control Systems Exposed).

While the resulting regional war appears to now be moderated by a fragile ceasefire, many governments are still bracing for reprisals (see: Israel-Iran Ceasefire Holding Despite Fears of Cyberattacks).

What LulzSec Black may actually possess is identity and contact information for nuclear specialists, likely stolen from third-party HR firms and recruitment websites such as the CATS Software applicant tracking system and recruitment software, Resecurity said. This can be seen in the long list of various job titles - "security auditor, heavy water unit," "nuclear engineer, analysis lab, tritium gas," and "radiation officer, fuel fabrication, uranium dioxide" - in a sample of dumped data.

In that data, tags such as "Top Secret," appear, which Resecurity said likely either reflect clearances held by job candidates, or were added by the hackers themselves "so it will look like it is from some nuclear energy facility."

databreachtoday EN 2025 hacktivist Iran Israel LulzSec-Black
Iran-linked hackers threaten to release Trump aides' emails https://www.reuters.com/legal/government/iran-linked-hackers-threaten-release-trump-aides-emails-2025-06-30/
02/07/2025 10:58:10
QRCode
archive.org
thumbnail
  • Hackers say they might try to sell emails from Trump aides
  • Group leaked documents from Republican president's campaign last year
  • US has said group known as Robert works for Iran's Revolutionary Guards

WASHINGTON, June 30 (Reuters) - Iran-linked hackers have threatened to disclose more emails stolen from U.S. President Donald Trump's circle, after distributing a prior batch to the media ahead of the 2024 U.S. election.
In online chats with Reuters on Sunday and Monday, the hackers, who go by the pseudonym Robert, said they had roughly 100 gigabytes of emails from the accounts of White House Chief of Staff Susie Wiles, Trump lawyer Lindsey Halligan, Trump adviser Roger Stone and porn star-turned-Trump antagonist Stormy Daniels.

reuters EN 2025 Iran US Trump leak threaten emails
Dozens of pro-Indy accounts go dark after Israeli strikes https://ukdefencejournal.org.uk/dozens-of-pro-indy-accounts-go-dark-after-israeli-strikes/
30/06/2025 12:08:20
QRCode
archive.org
thumbnail

On 12 June 2025, dozens of anonymous X (formerly Twitter) accounts advocating Scottish independence abruptly went silent. Many had posted hundreds of times per week, often using pro-independence slogans, anti-UK messaging, and identity cues like “NHS nurse” or “Glaswegian socialist.”
Their sudden disappearance coincided with a major Israeli airstrike campaign against Iranian military and cyber infrastructure. Within days, Iran had suffered severe power outages, fuel shortages, and an internet blackout affecting 95 percent of national connectivity.
What appeared at first glance to be a curious coincidence has since emerged as the most visible rupture to date in a long-running foreign influence operation.

ukdefencejournal EN 2025 Iran Uk X influence operation twitter accounts Scotland
Hacktivists Launch DDoS Attacks at U.S. Following Iran Bombings https://cyble.com/blog/hacktivists-launch-ddos-attacks-at-us-iran-bombings/
24/06/2025 13:42:23
QRCode
archive.org
thumbnail

Hacktivist attacks surge on U.S. targets after Iran bombings, with groups claiming DDoS hits on military, defense, and financial sectors amid rising tensions.
The U.S. has become a target in the hacktivist attacks that have embroiled several Middle Eastern countries since the start of the Israel-Iran conflict.

Several hacktivist groups have claimed DDoS attacks against U.S. targets in the wake of U.S. airstrikes on Iranian nuclear sites on June 21.

The attacks—most notably from hacktivist groups Mr Hamza, Team 313, Cyber Jihad, and Keymous+—targeted U.S. Air Force domains, major U.S. Aerospace and defense companies, and several banks and financial services companies.

The cyberattacks follow a broader campaign against Israeli targets that began after Israel launched attacks on Iranian nuclear and military targets on June 13. Israel and Iran have exchanged missile and drone strikes since the conflict began, and Iran also launched missiles at a U.S. military base in Qatar on June 23.

The accompanying cyber warfare has included DDoS attacks, data and credential leaks, website defacements, unauthorized access, and significant breaches of Iranian banking and cryptocurrency targets by Israel-linked Predatory Sparrow. Electronic interference with commercial ship navigation systems has also been reported in the Strait of Hormuz and the Persian Gulf.

cyble EN 2025 DDoS Attacks US Iran
Iran's state TV hacked, protest videos aired | Iran International https://www.iranintl.com/en/202506188310
23/06/2025 09:36:35
QRCode
archive.org

Jun 18, 2025, 19:09 GMT+1

Iran’s state broadcaster was hacked Wednesday night, with videos calling for street protests briefly aired.

Footage circulated on social media showed protest-themed clips interrupting regular programming.

"If you experience disruptions or irrelevant messages while watching various TV channels, it is due to enemy interference with satellite signals," state TV said.

The hacking of the programming on Wednesday night was limited to satellite transmissions, the Islamic Republic of Iran Broadcasting (IRIB) said.

iranintl EN 2025 Iran hacked Footage state-TV
Iran's government says it shut down internet to protect against cyberattacks https://techcrunch.com/2025/06/20/irans-government-says-it-shut-down-internet-to-protect-against-cyberattacks/
20/06/2025 21:50:50
QRCode
archive.org
thumbnail

The government cited the recent hacks on Bank Sepah and cryptocurrency exchange Nobite as reasons to shut down internet access to virtually all Iranians.

Earlier this week, virtually everyone in Iran lost access to the internet in what was called a “near-total national internet blackout.”

At the time, it was unclear what happened or who was responsible for the shutdown, which has severely limited Iranians’ means to get information about the ongoing war with Israel, as well as their ability to communicate with loved ones inside and outside of the country.

Now Iran’s government has confirmed that it ordered the shutdown to protect against Israeli cyberattacks.

“We have previously stated that if necessary, we will certainly switch to a national internet and restrict global internet access. Security is our main concern, and we are witnessing cyberattacks on the country’s critical infrastructure and disruptions in the functioning of banks,” Fatemeh Mohajerani, Iran’s government spokesperson, was quoted as saying in a local news story. “Many of the enemy’s drones are managed and controlled via the internet, and a large amount of information is exchanged this way. A cryptocurrency exchange was also hacked, and considering all these issues, we have decided to impose internet restrictions.”

techcrunch EN 2025 Iran Internet shut-down
Pro-Israel hacktivist group claims responsibility for alleged Iranian bank hack https://techcrunch.com/2025/06/17/pro-israel-hacktivist-group-claims-responsibility-for-alleged-iranian-bank-hack/
18/06/2025 09:28:09
QRCode
archive.org
thumbnail

The pro-Israeli hacktivist group Predatory Sparrow claimed on Tuesday to have hacked and taken down Iran’s Bank Sepah.

The group, which is also known by its Persian name Gonjeshke Darande, claimed responsibility for the hack on X.

“We, ‘Gonjeshke Darande,’ conducted cyberattacks which destroyed the data of the Islamic Revolutionary Guard Corps’ ‘Bank Sepah,’” the group wrote.

The group claimed Bank Sepah is an institution that “circumvented international sanctions and used the people of Iran’s money to finance the regime’s terrorist proxies, its ballistic missile program and its military nuclear program.”

According to the independent news site Iran International, there are reports of “widespread banking disruptions” across the country. Iran International said several Bank Sepah branches were closed on Tuesday, and customers told the publication that they were unable to access their accounts.

Ariel Oseran, a correspondent for i24NEWS, posted pictures of ATMs in Iran displaying an error message.

TechCrunch could not independently verify the group’s alleged cyberattack. We reached out to two Bank Sepah Iranian email addresses, but the messages returned an error. Bank Sepah’s affiliates in the U.K. and Italy did not immediately respond to requests for comment.

Predatory Sparrow did not respond to a request for comment sent to their X account, and via Telegram.

The alleged cyberattack on Bank Sepah comes as Israel and Iran are bombing each other’s countries, a conflict that started after Israel began targeting nuclear energy facilities, military bases, and senior Iranian military officials on Friday.

It’s unclear who is behind Predatory Sparrow. The group clearly fashions itself as a pro-Israel or at least anti-Iran hacktivist group and has targeted companies and organizations in Iran for years. Cybersecurity researchers believe the group has had success in the past and made credible claims.

techcrunch EN 2025 Pro-Israel hacktivist Iran Isreal bank hack
European Parliament’s Iran delegation chair victim of Tehran-linked hacking https://www.politico.eu/article/european-parliament-iran-delegation-chair-victim-tehran-linked-hacking-hannah-neumann/
27/04/2025 12:00:30
QRCode
archive.org
thumbnail

Hannah Neumann was targeted in a cyber-espionage operation by an infamous Iranian hacking group earlier this year, she said.
A prominent European Parliament member was the victim of what is believed to be a cyber-espionage operation tied to her role as chair of the chamber's Iran delegation, she told POLITICO.

The office of Hannah Neumann, a member of the German Greens and head of the delegation spearheading work on European Union-Iran relations, was targeted by a hacking campaign that started in January, she said. Her staff was contacted with messages, phone calls and emails by hackers impersonating a legitimate contact. They eventually managed to target a laptop with malicious software.

"It was a very sophisticated attempt using various ways to manage that someone accidentally opens a link, including putting personal pressure on them," Neumann said.

politico EN 2025 Europe Iran cyber-espionage operation EU delegation Parliament
CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide https://www.wired.com/story/cyberav3ngers-iran-hacking-water-and-gas-industrial-systems/
27/04/2025 11:57:14
QRCode
archive.org
thumbnail

Despite their hacktivist front, CyberAv3ngers is a rare state-sponsored hacker group bent on putting industrial infrastructure at risk—and has already caused global disruption.
The intermittent cyberwar between Israel and Iran, stretching back to Israel's role in the creation and deployment of the Stuxnet malware that sabotaged Iran's nuclear weapons program, has been perhaps the longest-running conflict in the era of state-sponsored hacking. But since Hamas' October 7 attack and Israel's retaliatory invasion of Gaza, a new player in that conflict threatens not just digital infrastructure in Israel but also critical systems in the US and around the world.
The group known as CyberAv3ngers has, in the last year and a half, proven to be the Iranian government's most active hackers focused on industrial control systems. Its targets include water, wastewater, oil and gas, and many other types of critical infrastructure. Despite being operated by members of Iran's Revolutionary Guard Corps, according to US officials who have offered a $10 million bounty for information leading to their arrest, the group initially took on the mantle of a “hacktivist” campaign.

wired EN 2025 CyberAv3ngers iran malware Critical-Infrastructure state-sponsored
New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran https://www.greynoise.io/blog/new-ddos-botnet-discovered
03/03/2025 20:46:23
QRCode
archive.org
thumbnail

A newly discovered global cyber threat is rapidly expanding, infecting tens of thousands of internet-connected devices to launch powerful cyberattacks.

greynoise EN 2025 analysis botnet internet-connected devices to Iran
DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7 https://www.404media.co/dhs-says-china-russia-iran-and-israel-are-spying-on-people-in-us-with-ss7/
20/12/2024 09:11:28
QRCode
archive.org
thumbnail

The Department of Homeland Security knows which countries SS7 attacks are primarily originating from. Others include countries in Europe, Africa, and the Middle East.

404media EN 2024 SS7 China Russia Iran Israel spy US attacks telco
Iran Reportedly Grapples With Major Cyberattack on Banking Systems https://www.darkreading.com/cyberattacks-data-breaches/iran-reportedly-grapples-with-major-cyberattack-on-banking-systems
21/08/2024 12:08:11
QRCode
archive.org
thumbnail

The last known cyberattack waged against Iranian infrastructure took place last December with blame placed on Israel and the US.

darkreading EN 2024 Iran cyberattack Banking Systems
Disrupting a covert Iranian influence operation https://openai.com/index/disrupting-a-covert-iranian-influence-operation/
17/08/2024 02:49:59
QRCode
archive.org

We banned accounts linked to an Iranian influence operation using ChatGPT to generate content focused on multiple topics, including the U.S. presidential campaign. We have seen no indication that this content reached a meaningful audience.

openai EN 2024 chatgpt Iran influence-operation US disrupted report
A Single Iranian Hacker Group Targeted Both Presidential Campaigns https://www.wired.com/story/iran-apt42-trump-biden-harris-phishing-targeting/
15/08/2024 06:24:28
QRCode
archive.org
thumbnail

APT42, which is believed to work for Iran’s Revolutionary Guard Corps, targeted about a dozen people associated with both Trump’s and Biden’s campaigns this spring, according to Google’s Threat Analysis Group.

iran elections joe biden politics harris cybersecurity kamala donald trump hacking phishing
Iran Targeting 2024 US Election https://blogs.microsoft.com/on-the-issues/2024/08/08/iran-targeting-2024-us-election/?ref=news.risky.biz
12/08/2024 07:07:54
QRCode
archive.org
thumbnail

Discover how Iran is allegedly targeting the 2024 US election, the potential impacts, and the measures being taken to safeguard the democratic process.

microsoft EN 2024 Iran election US
Turkey blocks access to Instagram – POLITICO https://www.politico.eu/article/turkey-blocks-access-to-instagram/
02/08/2024 19:43:02
QRCode
archive.org
thumbnail

A senior official previously condemned the platform for ‘censoring’ Hamas-related content.

politico EN 2024 Israel-Hamas Turkey war Social Media Communications Israel Palestine Platforms Iran
Revealed: How a secret Dutch mole aided the U.S.-Israeli Stuxnet cyberattack on Iran https://news.yahoo.com/revealed-how-a-secret-dutch-mole-aided-the-us-israeli-stuxnet-cyber-attack-on-iran-160026018.html?guccounter=1
08/01/2024 20:18:42
QRCode
archive.org
thumbnail

For years, an enduring mystery has surrounded the Stuxnet virus attack that targeted Iran’s nuclear program: How did the U.S. and Israel get their malware onto computer systems at the highly secured uranium-enrichment plant?

yahoo EN 2019 Iran Stuxnet-virus sanctions-against-Iran nuclear-program Iran’s-nuclear-program Iran Natanz Natanz centrifuges centrifuges intelligence Iran-nuclear-deal AIVD Stuxnet
Iranian Hackers Claim They Disrupted Albanian Institutions https://www.databreachtoday.eu/iranian-hackers-claim-they-disrupted-albanian-institutions-a-23992
29/12/2023 14:24:36
QRCode
archive.org
thumbnail

Albania's Parliament and a telecommunications service provider faced online attacks on Christmas day, according to the Albanian National Authority for Electronic
#AKCESK #Albania #Authority #Certification #Cyber #Cyberwarfare #Electronic #Hacking #Homeland #Iran #Justice #MEK #National #Security #Warfare #and #for

Iran Homeland Warfare Electronic Hacking Albania Authority Certification Justice Security and for MEK Cyber National Cyberwarfare AKCESK
page 1 / 2
4560 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio