Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
The Predory Sparrow Hacktivist PRO-Israeli group said on Tuesday that it had hacked the Iranian bank.
The group, which is also known by its Persian name Gonjeshke Darande, Responsibility claimed for the hack on x.
“We,” Gonjeshke Darande “, directed cyber attacks that destroyed data from the” banking bank “of the Islamic Revolution Guard,” wrote the group.
The group said that the Bank SEPAH is an institution that “bypassed international sanctions and used Iran’s money to finance the regime’s terrorist attorney, its ballistic missile program and its military nuclear program”.
Do you have more information on the predatory sparrow? Or other active hacking groups in Israel and Iran? From a device and a non-work network, you can contact Lorenzo Franceschi-Bicchiera safely on the signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or e-mail.
According to the independent information site Iranian internationalThere are reports of “generalized banking disturbances” across the country. The Iranian international said that several SEPAH banking branches were closed on Tuesday and that customers told the publication that they could not have access to their accounts.
Ariel Oseran, correspondent for i24news, Photos published ATMs in Iran displaying an error message.
Techcrunch could not independently verify the alleged cyber attack of the group. We contacted two Iranian e-mail addresses from the SEPAH bank, but the messages returned an error. The affiliates of Bank Sepah in the United Kingdom and Italy did not immediately respond to requests for comments.
The predator Sparrow did not respond to a comment request sent to their X and Via Telegram account.
The alleged cyber attack on the Bank SEPAH intervenes while Israel and Iran bomb the countries with each other, a conflict that started after Israel began to target nuclear energy facilities, military bases and senior Iranian military officials on Friday.
We do not know who is behind the predatory sparrow. The group makes fun of a pro-Israeli hacktivist group or at least anti-Iran Has targeted companies and organizations in Iran for years. Cybersecurity researchers believe that the group has succeeded in the past and has made credible complaints.
“Despite appearances, this actor is not all sound,” said John Hultquist, chief analyst of Google Mandiant, Written on x.
According to Rob JoyceWho previously worked at the NSA and in the administration of Biden, “the previous cyber attacks of the predatory Sparrow against Iranian steel factories and the service stations have demonstrated tangible effects in Iran.”
Predory Sparrow’s most catchy hacks were against a steel, which would have caused an explosive fire in the plant, and Against Iranian service stationsThis has caused disruption to citizens who try to fill the gasoline tanks of their vehicles.