Pro-Israeli Hacktivist Group Claims Cyberattack on Iran’s Bank Sepah
Overview of the Attack
On Tuesday, the pro-Israeli hacktivist group known as Predatory Sparrow, or Gonjeshke Darande in Persian, announced on social media platform X that it had successfully executed a cyber operation against Iran’s Bank Sepah. The group stated that the attack resulted in the destruction of critical data linked to the bank, which it accused of supporting Iran’s military and terrorist activities.
Allegations Against Bank Sepah
In its communication, Predatory Sparrow asserted that Bank Sepah facilitates circumvention of international sanctions, using funds from Iranian citizens to bolster the regime’s terrorist proxies, ballistic missile endeavors, and nuclear military initiatives. “We, ‘Gonjeshke Darande,’ conducted cyberattacks which destroyed the data of the Islamic Revolutionary Guard Corps’ Bank Sepah,” the group announced.
Impact on Banking Operations
Reports from the independent news outlet Iran International indicated that the hack led to "widespread banking disruptions" throughout Iran. Several branches of Bank Sepah reportedly closed, and customers experienced difficulties accessing their accounts. Aerie Oseran, a correspondent for i24NEWS, shared images of ATMs displaying error messages, highlighting the operational chaos caused by the attack.
Verification Challenges
TechCrunch has not been able to independently verify the claims of the cyberattack. Efforts to contact Bank Sepah through two Iranian email addresses were unsuccessful due to errors in messages returned. Additionally, affiliates of Bank Sepah located in the United Kingdom and Italy did not respond to inquiries about the incident.
Predatory Sparrow has also not offered any comments in response to media outreach on X or via Telegram.
Context of the Cyberattack
This cyberattack on Bank Sepah occurs amid escalating tensions between Israel and Iran, which have engaged in aerial assaults on each other’s territories since Israel initiated strikes targeting Iranian nuclear facilities, military installations, and high-ranking military officials as of last Friday.
Unveiling Predatory Sparrow
The identities and affiliations of Predatory Sparrow remain unclear; however, it is generally regarded as a pro-Israeli or at least anti-Iran group that has been active in cyber operations against Iranian entities over the years. Cybersecurity experts have acknowledged the group’s past successes, bolstered by credible claims they have made in previous incidents.
John Hultquist, Chief Analyst at Google’s Mandiant, noted on X, “Despite appearances, this actor is not all bluster.” Rob Joyce, a former official at the NSA and in the Biden administration, pointed out that “Predatory Sparrow’s previous cyberattacks on Iranian steel plants and gas stations have shown tangible impact within Iran.”
Notable Previous Activities
Among Predatory Sparrow’s most prominent operations are those targeting Iranian steel manufacturing and gas stations, with one alleged attack reportedly leading to a significant fire at a steel facility. Another attack caused major disruptions for citizens attempting to access fuel for their vehicles.
Conclusion
As the situation develops, the ramifications of the alleged attack on Bank Sepah continue to unfold, bringing to light the ongoing digital warfare between Iran and pro-Israeli factions. Stakeholders in cybersecurity and international relations will closely monitor these dynamics as they evolve.
