GeneralThe Iranian Regime Collaborates with Ransomware Criminals  

The Iranian Regime Collaborates with Ransomware Criminals  

-

U.S. intelligence agencies have warned that the Iranian regime is collaborating with cybercriminal groups to conduct ransomware attacks against organizations in the United States, Israel, Azerbaijan, and the United Arab Emirates.

On Wednesday, August 28, the FBI, the Pentagon’s Cyber Crime Center, and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced that in recent times, Iran has targeted not only government institutions but also educational, healthcare, and defense sectors in these countries.

The FBI’s assessment indicates that a significant percentage of these Iranian cyber hacking operations have been conducted to gain access to the networks of these institutions through ransomware.

In addition to deploying ransomware, hackers linked to the Iranian regime have pursued extensive campaigns to steal sensitive technical data from Israeli and Azerbaijani institutions.

The three U.S. intelligence agencies based their report on data provided by several organizations that had been affected by these malicious activities.

The findings of these three agencies indicate that hackers linked to Iran either use ransomware themselves or collaborate with prominent ransomware operators in espionage and data theft operations.

U.S. agencies have concluded that hackers associated with Iran, in exchange for assisting in deploying ransomware, receive a share of the information obtained through these cyber traps.

In some cases, hackers have collaborated with ransomware groups that lock victims’ networks and seek to extort them.

Multiple hacking operations targeting Israeli organizations and companies  

The report by these three U.S. agencies noted that cyber actors linked to the Iranian regime have been behind multiple hacking operations targeting Israeli organizations and companies over the past four years. The primary motive was not financial extortion but rather to embarrass Israel by sharing the stolen data from these Israeli entities online.

The report mentioned the Iranian technology company “Danesh Novin Sahand,” which it described as a “cover for the cyber activities” of the Iranian regime. According to U.S. agencies, this company exploited vulnerabilities in cybersecurity products such as Check Point or Palo Alto Networks VPN equipment.

Hackers backed by the regime, upon entering the victim’s network and before expanding their infiltration operations and data theft, created a user account under the name “John McCain,” a prominent late U.S. senator.

The hackers disable antivirus programs or security software on the victim’s computer to freely operate within the compromised network without triggering any warnings, allowing them to carry out their intended actions, steal information, and monitor the victim’s activities.

U.S. government cybersecurity experts believe that the hackers typically do not conceal their affiliation with the Iranian regime and deliberately keep the origin of their actions ambiguous.

In their advisory, the three U.S. intelligence agencies wrote that merely addressing the vulnerabilities in the software used on victims’ computers is insufficient for protection. Instead, organizations must take additional measures to protect themselves from these traps and report any ransomware attack or cyber incident.

The U.S. agencies identified four specific vulnerabilities in the software used on computers that need to be addressed.

The report by the three U.S. agencies was released amid renewed attention by U.S. intelligence organizations on Iran’s cyber activities aimed at influencing the upcoming U.S. presidential election.

Microsoft also reported on Wednesday that hacking agents linked to the Islamic Revolutionary Guard Corps (IRGC) have installed malware on computers in the satellite, oil, gas, and communications sectors of the United States and the United Arab Emirates.

The Iranian regime, in its effort to bolster its intelligence capabilities, is increasingly using cyberattacks and, more recently, artificial intelligence.

Latest news

Restrictions, Pressure, and Detention of Families of Opponents of Iran’s Regime

According to a report by Sky News on April 26, Iran's regime has intensified its repressive policies against opponents. In...

Iran’s Regime Ramps Up Execution of Baluch Political Prisoners to Control Society

Documented reports from recent years show that the execution of Baluch political prisoners in Iran has become a consistent...

Iran’s Regime Nearing Oil Export Deadlock

Bloomberg, citing the analytics firm Kpler, reported that the Iranian regime is facing a growing oil storage crisis, with...

Iran’s ‘No To Execution Tuesdays’ Campaign Marks 118th Week

On Tuesday, April 28, the “No to Execution Tuesdays” campaign entered its 118th week. Prisoners participating in the campaign...

Iranian Political Prisoner Naser Bakrzadeh’s at Risk of Execution

Following the confirmation of Naser Bakrzadeh’s death sentence by Iran’s Supreme Court, the risk of his imminent execution has...

A New Wave of Mass Arrests in Iran

Following the wave of repression after the nationwide protests of January 2026, the Iranian regime’s security and judicial institutions...

Must read

Iran leader denounces Arab ‘traitors’ in Gaza crisis

AFP: Iran's supreme leader Ayatollah Ali Khamenei denounced Arab...

Past Iran president warns top leader before vote

AP: A powerful former Iranian president urged the country's...

You might also likeRELATED
Recommended to you