Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

US Posts $10 Million Bounty for Iranian Hackers

Posted on December 9, 2025December 9, 2025 By CWS

The US authorities has introduced rewards of as much as $10 million for data on members of the Iranian hacking group often called Emennet Pasargad.

The reward provides come roughly a 12 months after a US-Israel joint advisory described the actions of the group, which was then recognized by the identify of its entrance firm, Aria Sepehr Ayandehsazan (ASA).

Noting that the group was beforehand recognized as Emennet Pasargad, Ayandeh Sazan Sepehr Arya (ASSA), Eeleyanet Gostar, and Internet Peygard Samavat Firm, the US now calls it Shahid Shushtari.

Within the personal sector, the menace group has been often called Cotton Sandstorm, Marnanbridge, and Haywire Kitten.

In line with the US, which has been monitoring the actions of the group since 2020, Shahid Shushtari is a corporation working underneath Iran’s Islamic Revolutionary Guard Corps Cyber-Digital Command (IRGC-CEC).

Final 12 months, the group was blamed for assaults in opposition to the 2024 Summer time Olympics and the techniques of a US-based IPTV streaming firm, and was beforehand sanctioned for affect operations concentrating on the 2020 presidential election.

Now, the US has named Mohammad Bagher Shirinkar because the chief of Shahid Shushtari, and Fatemeh Sedighian Kashi as a long-time worker of the entrance firm.

“Sedighian and Shirinkar keep an in depth relationship, and Sedighian works carefully with Shirinkar within the planning and conduct of cyber operations,” the US says.

In line with the US, the hackers are working out of Tehran, conducting cyberattacks and affect operations in opposition to vital infrastructure sectors within the US, Europe, and the Center East, together with information, delivery, journey, power, monetary, and telecommunications organizations.Commercial. Scroll to proceed studying.

“Anybody with data on Mohammad Bagher Shirinkar, Fatemeh Sedighian Kashi, Shahid Shushtari or related entities and/or people linked to malicious cyber actions concentrating on U.S. vital infrastructure or overseas interference in U.S. elections ought to contact Rewards for Justice by way of our Tor-based tips-reporting channel,” the US notes.

Associated: Amazon Particulars Iran’s Cyber-Enabled Kinetic Assaults Linking Digital Spying to Bodily Strikes

Associated: Iranian Hackers Goal Protection and Authorities Officers in Ongoing Marketing campaign

Associated: In Different Information: Iranian Ships Hacked, Verified Android Builders, AI Utilized in Assaults

Associated: Iranian APT Targets Android Customers With New Variants of DCHSpy Spy ware

Security Week News Tags:Bounty, Hackers, Iranian, Million, Posts

Post navigation

Previous Post: Proofpoint Completes $1.8 Billion Acquisition of Hornetsecurity 
Next Post: Zoom Rooms for Windows and macOS Flaws Enable Privilege Escalation and Sensitive Data Leaks

Related Posts

Radiflow Unveils New OT Security Platform Security Week News
1.5 Million Impacted by Allianz Life Data Breach Security Week News
Cisco Patches Critical Vulnerabilities in Contact Center Appliance Security Week News
Aisuru Botnet Powers Record DDoS Attack Peaking at 29 Tbps Security Week News
Call for Presentations Open for 2025 CISO Forum Virtual Summit Security Week News
Cloudflare Puts a Default Block on AI Web Scraping Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security
  • React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
  • .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
  • Critical Ivanti EPM Vulnerability Allows Admin Session Hijacking via Stored XSS
  • Over 644,000 Domains Exposed to Critical React Server Components Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security
  • React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
  • .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
  • Critical Ivanti EPM Vulnerability Allows Admin Session Hijacking via Stored XSS
  • Over 644,000 Domains Exposed to Critical React Server Components Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark