U.S. Shuts Down Websites Behind Iran-Linked Cyber Attacks and Death Threats
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得通读全文,抓住主要信息。 文章讲的是美国司法部查封了四个与伊朗有关的网络攻击相关的域名。这些域名被指控由伊朗情报和安全部门运营,用于声称对网络攻击负责、发布被盗数据以及威胁记者、异议人士和与以色列相关的人士。 接着,文中提到这些网站伪装成黑客活动家组织,实际上是受国家支持的行动。他们不仅进行网络攻击,还发布敏感数据,并公开声称责任以扩大影响。例如,Handala-hack[.]to声称对一起针对美国医疗技术公司的恶意软件攻击负责。 此外,这些网站还泄露个人数据并发出威胁,比如发布近190名与以色列国防军和政府有关的个人的详细信息,并警告他们可能面临后果。威胁还通过电子邮件直接发送给记者和伊朗流亡人士,声称分享他们的家庭住址,并提供奖金鼓励暴力行为。 司法部的行动旨在破坏这些活动的基础设施,并强调恐怖主义宣传可能煽动现实中的暴力。FBI局长也表示将继续追捕这些背后的演员。 总结一下,文章的核心是美国查封四个伊朗相关域名,揭露其用于网络攻击、威胁和宣传的活动,并指出这种结合技术与宣传的策略正在演变。 </think> 美国司法部查封了四个与伊朗有关的网络攻击域名,指控其用于网络攻击、数据泄露和威胁活动。这些域名伪装成黑客组织,实为伊朗情报部门操控,用于发布敏感数据、威胁记者和异议人士,并结合网络攻击与宣传扩大影响力。 2026-3-20 07:36:4 Author: thecyberexpress.com(查看原文) 阅读量:6 收藏

The U.S. Justice Department has seized four domains tied to Iran-linked cyberattacks, disrupting what officials describe as a coordinated effort to combine hacking with online intimidation and propaganda.

The domains—Justicehomeland[.]org, Handala-Hack[.]to, Karmabelow80[.]org, and Handala-Redwanted[.]to—were allegedly operated by Iran’s Ministry of Intelligence and Security (MOIS). According to investigators, these sites were used to claim responsibility for cyberattacks, publish stolen data, and issue threats targeting journalists, dissidents, and individuals linked to Israel.

This action highlights a shift in how Iran-linked cyberattacks are being carried out—moving beyond system breaches into public messaging and pressure tactics.

Iran-Linked Cyberattacks Used Fake Hacktivist Fronts

Authorities say the domains were connected through shared infrastructure, including Iranian IP ranges and common leak platforms. More importantly, they followed a similar pattern of activity.

The sites operated under the guise of hacktivist groups, but investigators say they were part of a state-backed effort. This included launching disruptive cyberattacks, leaking sensitive data, and amplifying the impact by publicly claiming responsibility.

One such platform, Handala-hack[.]to, was used to claim a March 2026 malware attack on a U.S.-based medical technology company. The group framed the attack as retaliation linked to ongoing geopolitical tensions.

report-ad-banner

This mix of hacking and messaging is becoming a defining feature of Iran-linked cyberattacks, where the goal is not just access, but visibility.

Data Leaks and Threats Target Individuals Directly

The same infrastructure was also used to expose personal data and issue threats.

According to court documents, the Handala-redwanted[.]to domain published identifying details of nearly 190 individuals associated with the Israeli Defense Force and government. The posts included messages suggesting these individuals were being tracked and could face consequences.

Other posts named individuals allegedly linked to Israeli institutions, warning that their locations were known and encouraging others to act. In another instance, the group claimed to have stolen 851 gigabytes of data from members of the Sanzer Hasidic Jewish community, along with a warning that more information would follow.

These actions show how Iran-linked cyberattacks are increasingly focused on individuals, not just organizations.

Threats Extended Beyond Websites

Investigators found that the campaign did not stop at public posts. Email accounts tied to the same operation were used to send direct threats to journalists and Iranian dissidents living in the United States and abroad.

In some messages, the senders claimed to have shared victims’ home addresses and offered financial rewards for acts of violence. The emails also referenced alleged links to criminal groups, adding another layer of intimidation.

The use of direct communication alongside public leaks suggests a more aggressive approach in Iran-linked cyberattacks, where the aim is to pressure targets both publicly and privately.

Justice Department Targets Infrastructure Behind Iran-Linked Cyberattacks

The Justice Department’s move focused on taking down the infrastructure enabling these activities.

“Terrorist propaganda online can incite real-world violence — thanks to our National Security Division and the U.S. Attorney’s Office for the District of Maryland, this network of Iranian-backed sites will no longer broadcast anti-American hate,” said Attorney General Pamela Bondi.

FBI Director Kash Patel added, “Iran thought they could hide behind fake websites and keyboard threats to terrorize Americans and silence dissidents. We took down four of their operation’s pillars and we’re not done. This FBI will hunt down every actor behind these cowardly death threats and cyberattacks and will bring the full force of American law enforcement down on them.”

Iran-Linked Cyberattacks
Image Source: FBI

Officials also confirmed that the domains Justicehomeland[.]org and Karmabelow80[.]org had previously been used to claim responsibility for data theft targeting Albanian government systems, linked to tensions over support for an Iranian dissident group.

Iran-Linked Cyberattacks Show a Broader Shift

The takedown reflects a wider pattern. Iran-linked cyberattacks are no longer limited to stealing data or disrupting systems—they are being used to send messages, target individuals, and amplify political narratives.

By combining cyberattacks with data leaks and direct threats, these campaigns extend their reach beyond technical impact. The Justice Department’s action removes part of that network, but it also points to how these operations are evolving.

For now, the focus is on disruption. But the methods behind these Iran-linked cyberattacks suggest this kind of activity is unlikely to disappear anytime soon.


文章来源: https://thecyberexpress.com/iran-linked-cyberattacks/
如有侵权请联系:admin#unsafe.sh