The US authorities has introduced rewards of as much as $10 million for data on members of the Iranian hacking group generally known as Emennet Pasargad.
The reward gives come roughly a 12 months after a US-Israel joint advisory described the actions of the group, which was then recognized by the identify of its entrance firm, Aria Sepehr Ayandehsazan (ASA).
Noting that the group was beforehand recognized as Emennet Pasargad, Ayandeh Sazan Sepehr Arya (ASSA), Eeleyanet Gostar, and Web Peygard Samavat Firm, the US now calls it Shahid Shushtari.
Within the non-public sector, the risk group has been generally known as Cotton Sandstorm, Marnanbridge, and Haywire Kitten.
In response to the US, which has been monitoring the actions of the group since 2020, Shahid Shushtari is a corporation working beneath Iran’s Islamic Revolutionary Guard Corps Cyber-Digital Command (IRGC-CEC).
Final 12 months, the group was blamed for assaults in opposition to the 2024 Summer season Olympics and the methods of a US-based IPTV streaming firm, and was beforehand sanctioned for affect operations focusing on the 2020 presidential election.
Now, the US has named Mohammad Bagher Shirinkar because the chief of Shahid Shushtari, and Fatemeh Sedighian Kashi as a long-time worker of the entrance firm.
“Sedighian and Shirinkar preserve a detailed relationship, and Sedighian works intently with Shirinkar within the planning and conduct of cyber operations,” the US says.
In response to the US, the hackers are working out of Tehran, conducting cyberattacks and affect operations in opposition to crucial infrastructure sectors within the US, Europe, and the Center East, together with information, delivery, journey, vitality, monetary, and telecommunications organizations.
“Anybody with data on Mohammad Bagher Shirinkar, Fatemeh Sedighian Kashi, Shahid Shushtari or related entities and/or people linked to malicious cyber actions focusing on U.S. crucial infrastructure or overseas interference in U.S. elections ought to contact Rewards for Justice by way of our Tor-based tips-reporting channel,” the US notes.
Associated: Amazon Particulars Iran’s Cyber-Enabled Kinetic Assaults Linking Digital Spying to Bodily Strikes
Associated: Iranian Hackers Goal Protection and Authorities Officers in Ongoing Marketing campaign
Associated: In Different Information: Iranian Ships Hacked, Verified Android Builders, AI Utilized in Assaults
Associated: Iranian APT Targets Android Customers With New Variants of DCHSpy Spyware and adware







