Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange

Posted on June 24, 2025June 24, 2025 By CWS

In a big escalation of cyber warfare within the Center East, suspected Israeli state-sponsored risk actors working below the identify “Gonjeshke Darande” (Predatory Sparrow) efficiently infiltrated Nobitex, Iran’s largest cryptocurrency trade, on June 18, 2025.

Fairly than extracting funds for revenue, the attackers intentionally “burned” roughly US$90 million in varied cryptocurrencies by transferring them to invalid pockets addresses containing the politically charged string “FuckiRGCTerroristsNoBiTE,” straight implicating Iran’s Islamic Revolutionary Guard Corps (IRGC).

The assault occurred inside a unstable geopolitical context, simply 5 days after Israeli airstrikes focused key Iranian navy and nuclear amenities on June 13, which had triggered instant retaliation from Iran.

By focusing on a monetary establishment accused of sanctions evasion, Gonjeshke Darande aimed to ship a symbolic strike in opposition to Iran’s financial infrastructure whereas exposing alleged regime corruption.

Outpost24 researchers recognized that the operation bore hallmarks of long-term strategic planning, with proof suggesting the risk actors had established persistent entry to Nobitex’s inner programs properly earlier than executing the ultimate assault.

The timing seems calculated to maximise each psychological and monetary affect throughout heightened regional tensions.

The group’s technical sophistication turned additional obvious after they revealed Nobitex’s full supply code on Telegram, revealing delicate deployment configurations, inner privateness mechanisms, and scripts associated to chilly pockets administration programs.

Gonjeshke Darande issued a press release asserting the approaching launch of Nobitex’s full supply code (Supply – Outpost24)

The iinternal server configurations allegedly from Nobitex that had been revealed by the risk actors, demonstrating entry to backend infrastructure and datacenter sources.

The infiltration methodology doubtless concerned both exploitation of privileged entry credentials obtained by means of prior reconnaissance or potential insider collaboration.

Based on Nobitex’s public assertion, unauthorized entry affected components of their infrastructure together with sizzling wallets, prompting instant service suspension and community isolation of compromised servers.

// Simplified illustration of the focused pockets construction
const invalidWallet = “1FuckiRGCTerroristsNoBiTExxxxxxxxxxxxx”;
perform transferFunds(sourceWallet, quantity) {
// Irreversible switch to politically-named burn deal with
return blockchain.switch(sourceWallet, invalidWallet, quantity);
}

This incident represents a evolution in cyber-enabled geopolitical confrontation, the place cryptocurrency infrastructure has grow to be a brand new frontline in state-level conflicts. Nobitex estimates restoration efforts would require 4-5 days, additional difficult by nationwide web disruptions in Iran following the assault.

Cybersecurity consultants anticipate further strikes in opposition to Iranian monetary establishments within the coming weeks, significantly these with alleged connections to sanctions evasion or IRGC funding channels.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free tria

Cyber Security News Tags:Actors, Crypto, Darande, Exchange, Gonjeshke, Hacktivist, Infiltrated, Iranian, Pose, Threat

Post navigation

Previous Post: 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes
Next Post: New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands

Related Posts

Malicious VS Code Extensions Attacking Windows Solidity Developers to Steal Login Credentials Cyber Security News
Encrypting Data to Meet Global Privacy Law Requirements Cyber Security News
Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Cyber Security News
Threat Actors Using Fake Travel Websites to Infect Users’ PCs with XWorm Malware Cyber Security News
Identity Theft Surges as Criminals Deploy Advanced Tactics to Steal Personal Data Cyber Security News
1inch rolls out expanded bug bounties with rewards up to $500K Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Disable Unused Network Ports
  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
  • Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • How to Disable Unused Network Ports
  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
  • Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News