Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

How to automate exposure verification at the speed of AI attacks

Jacobi targets PFAS crisis with activated carbon technology

A critical cPanel authentication vulnerability has been identified – please update your servers immediately

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Pro-Israel hacktivist group claims responsibility for alleged Iranian bank hacking
Startups

Pro-Israel hacktivist group claims responsibility for alleged Iranian bank hacking

By June 17, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The pro-Israel hacktivist group Predatory Sparrow claimed on Tuesday that it had hacked and disrupted Iran’s Sepah Bank.

The group, also known by its Persian name Gonjeshke Darande, claimed responsibility for the X hack.

“We ‘Gonjesike Dalande’ carried out a cyber attack and destroyed the data of ‘Sepah Bank’ of the Islamic Revolutionary Guard Corps,” the group wrote.

The group claimed that Sepah Bank was an institution that “evaded international sanctions and used Iranian citizens’ funds to finance the regime’s terrorist proxies, ballistic missile program, and military nuclear program.”

inquiry

Do you have more information about Predatory Sparrow? Or is it another hacker group operating out of Israel and Iran? You can contact Lorenzo Franceschi-Bicchierai securely from any non-work device or network on Signal (+1 917 257 1382), Telegram and Keybase @lorenzofb, or email.

Independent news site Iran International reported “widespread banking disruption” across the country. According to Iran International, several Sepah Bank branches were closed on Tuesday, with customers reporting to the magazine that they could no longer access their accounts.

i24NEWS correspondent Ariel Osseran posted a photo of an Iranian ATM showing an error message.

TechCrunch was unable to independently verify the group’s alleged cyberattacks. We contacted two email addresses for Iranian Bank Sepah, but the messages returned errors. Sepa Bank’s affiliates in the UK and Italy did not respond to requests for comment.

Predatory Sparrow did not respond to requests for comment through its X account and Telegram.

The alleged cyber attack on Sepa Bank comes as Israel and Iran continue to bomb each other’s countries, with the conflict beginning on Friday when Israel began targeting nuclear energy facilities, military bases and senior Iranian military officials.

It’s unclear who is behind Predatory Sparrow. The group has been targeting Iranian businesses and organizations for years, posing as a clearly pro-Israel, or at least anti-Iranian, hacktivist group. Cybersecurity researchers believe the group has been successful in the past and has made credible claims.

“Despite appearances, this actor is not necessarily brash,” John Hultquist, chief analyst at Google’s Mandiant, wrote about X.

Rob Joyce, who previously worked for the NSA and the Biden administration, said that “Predatory Sparrow’s past cyberattacks on Iranian steel mills and gas stations have had a measurable impact inside Iran.”

The most high-profile hacking allegations by Predatory Sparrow were against a steel manufacturer, which allegedly caused an explosion and fire at a factory, and an Iranian gas station, which caused confusion for citizens trying to refill their cars’ gas tanks.


Source link

#Aceleradoras #CapitalRiesgo #EcosistemaStartup #Emprendimiento #InnovaciónEmpresarial #Startups
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLawyers say plea bargains are being pursued for Chinese scientists charged with toxic US fungi
Next Article A bug in Langsmith could expose Openai keys and user data via malicious agents

Related Posts

Google expands access to Pentagon AI after Anthropic rejection

April 28, 2026

Report says Paragon is not cooperating with Italian authorities investigating spyware attack

April 28, 2026

US Supreme Court appears divided over use of controversial ‘geofence’ search warrants

April 28, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How to automate exposure verification at the speed of AI attacks

Jacobi targets PFAS crisis with activated carbon technology

A critical cPanel authentication vulnerability has been identified – please update your servers immediately

CISA adds actively exploited ConnectWise and Windows flaws to KEV

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.