Pro-Israeli Hacktivist Group Dedatory Sparrow claimed on Tuesday that it was tired and went down to Iran’s bank.
The team, which is also known by the Persian name Gonjeshke Darande, assumes responsibility for hack in x.
“We,” Gonjeshke Darande, “conducted Cyberettacks that destroyed the data of the Islamic Revolutionary Guard” Bank Sepah “,” the team wrote.
The group claimed that Bank Sepah is an institution that “bypassing international sanctions and used Iran’s money to finance the terrorist proxies of the regime, the ballistic missile program and its military nuclear program.”
Contact us
Do you have more information about the sparrow predator? Or other hacking groups active in Israel and Iran? From a device and non-work network, you can contact Lorenzo Franceschi-bicchierai safely on the signal on +1 917 257 1382, or through the telegram and keybase @lorenzofb or email.
According to the independent news website IranThere are reports of “extensive banking disorders” across the country. Iran international said that many Sepah Branches were closed on Tuesday and customers told the publication that they were unable to access their accounts.
Ariel Oseran, a correspondent for i24news, Published photos of ATMs in Iran showing an error message.
TechCrunch could not independently verify the group’s supposed Cyberettack. We arrived at two Banks Sepah Iranian e -mail addresses, but the messages returned an error. Bank Sepah’s subsidiaries in the United Kingdom and Italy did not immediately respond to comments.
The sparrow predator did not respond to a request for comments sent to their X account and via a telegram.
The alleged cyberspace at Sepah is coming as Israel and Iran bombard the countries of the other, a conflict that began after the start of Israel aims at nuclear power facilities, military bases and senior Iranian military officials.
It is not clear who is behind the predatory sparrow. The team is clearly shaped as an over-Israel or at least anti-Iran hacktivist group and has targeted companies and organizations in Iran for years. Cyber researchers believe that the team has been successful in the past and made reliable claims.
“Despite the appearances, this actor is not all inflated,” John Hultquist, the head of Google’s Mandiant, wrote to x.
According to Rob Joycewho has previously worked on the NSA and Biden administration, “the previous attacks by Department Sparrow’s cyberrow on Iranian steel and gas stations have shown tangible results in Iran.”
The most striking supposedly deployment sparrow’s halves were against a steel manufacturer who allegedly caused an explosive fire in the factory and Against Iran’s gas stationwho caused disorders for citizens who were trying to refill their vehicles gas tanks.
