Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Iran says ‘specific foreign country’ behind hacktivist leak of atomic energy emails

admin by admin
Dec 21, 2022
in Hacktivism
A A
0

Iran’s Atomic Energy Organization (AEOI) said on Sunday that “a specific foreign country” which it did not name was behind the hacking of an email server a hacktivist group claimed responsibility for.

The group, Black Reward, claimed to have accessed the organization’s documents in statements posted on Twitter and Telegram that included the hashtags #OpIran and #MahsaAmini, which are used in ongoing digital activities targeting the regime.

Black Reward threatened to release stolen information unless the Iranian government released people who had been arrested during the ongoing protests following Amini’s death on September 16 while in the custody of the Islamic Republic’s morality police.

Concluding its statement on Telegram on Saturday, Black Reward said the hack was conducted “in the name of Mahsa Amini and for women, life, freedom.”

“We, as a part of the Iranian hacker community and born from among you, unlike Westerners, are not flirting with criminal mullahs, and if we say something, we follow it 100%,” the message said.

Black Reward claimed to be publishing “Iran’s public and private conversations with the International Atomic Energy Agency” which is responsible for monitoring Iran’s nuclear activities to ensure they are peaceful.

The group released additional details regarding Iran’s Bushehr power plant, including its management and operational schedules, as well as details about tasks being conducted by Iranian and Russian specialists who were working there, alongside the passports and visas for these individuals.

The AEOI has dismissed the significance of the hack and the stolen information, claiming: “It is obvious that the purpose of such illegal efforts, which are carried out out of desperation, is to attract public attention, create media atmosphere, and psychological operations, and lack any other value.”

The nationwide protests in Iran are among the most significant to have challenged the clerical regime in recent years, featuring widespread disobedience regarding the mandatory wearing of the hijab and even calls of “death to the dictator.”

Anonymous hackers have claimed to be behind attacks on several websites affiliated with the Iranian government conducted in support of the protests. Criminal groups have also been identified attempting to sell what they claim is information stolen from government systems.

Read more: The Record’s Click Here team spoke to a protester about the dangers of using social media and technology while participating in street demonstrations.

Alexander Martin is the UK Editor for The Record. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.