FBI takes down leak sites tied to Iran’s Ministry of Intelligence and Security
好的,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内。首先,我需要通读整篇文章,抓住主要信息。文章主要讲的是FBI指控伊朗政府利用四个域名来托管从阿尔巴尼亚政府、伊朗异议人士、以色列政府官员和美国公司窃取的信息。 接下来,文中提到FBI在一份40页的扣押令中详细描述了伊朗情报和安全部门通过多个在线名称进行的多次数字活动,最近使用的名字是“Handala”。司法部扣押了四个域名,这些域名被用于从2022年开始的行动。 然后,Handala声称对一起针对美国医疗科技公司Stryker的攻击负责,这次攻击导致数千台设备被擦除,并对紧急医疗服务和医院造成了直接影响。此外,Handala还发布了从以色列政府官员和以色列国防军员工那里窃取的信息,并威胁他们。 文章还提到,Handala网站托管了从桑泽哈西迪犹太社区成员那里窃取的851 GB信息,并与阿尔巴尼亚在2022年遭受的两次网络攻击有关。FBI表示他们尚未完成揭露伊朗网络行动的任务,并悬赏1000万美元寻求相关信息。 最后,Handala的一个小组创建了一个新网站回应扣押行动,并威胁进一步攻击。以色列官员称参与Handala的一些伊朗领导人最近被空袭击毙。 现在我需要将这些信息浓缩到100字以内。要突出FBI指控伊朗使用四个域名窃取信息,涉及多个国家和公司,包括Stryker受到严重影响,导致医院暂停连接并影响紧急医疗服务。同时提到司法部扣押域名和悬赏金额。 确保内容准确且简洁,不使用“这篇文章”等开头词。可能需要调整句子结构以适应字数限制。 </think> FBI指控伊朗政府利用四个域名托管从阿尔巴尼亚、伊朗异议人士、以色列官员及美国公司窃取的信息。司法部扣押了这些域名,并指出伊朗情报部门通过“Handala”等名称开展网络攻击。其中一起攻击导致医疗科技公司Stryker数千台设备被擦除,影响了美国多地医院的紧急服务。 2026-3-20 17:33:9 Author: therecord.media(查看原文) 阅读量:15 收藏

The FBI accused the Iranian government of using four domains to host information stolen from the government of Albania, Iranian dissidents, Israeli government officials and U.S. companies.

In a 40-page seizure warrant, the FBI outlined multiple digital campaigns launched by Iran’s Ministry of Intelligence and Security (MOIS) through a variety of online monikers, most recently going by the name “Handala.”

The Justice Department seized four domains — Justicehomeland[.]org, Handala-Hack[.]to, Karmabelow80[.]org, and Handala-Redwanted[.]to — allegedly used by Iran’s MOIS in operations dating back to 2022. 

Last week, Handala took credit for an attack on Michigan-based medical tech company Stryker. The group used one of the sites to post information stolen from the company and boast of how it wiped thousands of the company’s devices. 

In court documents, the Justice Department provided more detailed descriptions of the impact of the attack on Stryker, which produces critical technology used in hospitals around the world.  

Prosecutors said the Stryker attack "had a direct impact on emergency medical services and hospitals within Maryland” and “prompted some hospitals to temporarily suspend connections” to the company out of fear of being affected by the wiper incident.

One Stryker employee stationed at a hospital in Maryland struggled to continue working after their device had been wiped following the cyberattack. 

Stryker produces a variety of hospital technology including bed sensors and hands-free communication devices that allow nurses and doctors to contact each other. 

Court documents said that "as a result of the disruption to [Stryker] systems… clinicians were instructed to rely on radio consultation and verbal description."

“The disruption to required clinical communication systems demonstrates that the cyberattack on [Stryker] in some cases interfered with the delivery of emergency medical care in Maryland hospitals,” prosecutors wrote. 

Stryker recently sent out urgent notices to customers assuring them that their technology is safe to use and is not connected to the cyberattack — which was targeted at internal corporate Microsoft systems. 

Yesterday, the FBI released guidance to Microsoft Intune users, which allows IT departments to remotely manage company devices. The hackers used a native functionality within Intune – the device wipe feature — to destroy all company data on more than 200,000 devices across Stryker’s employee base in the U.S., Ireland, India and other countries. 

Prosecutors said Handala also used its websites to post stolen information on a range of Israeli government officials and Israeli Defense Force employees. Following the onset of kinetic hostilities between the U.S., Israel and Iran, Handala began posting the addresses of IDF officials and sending them threatening emails. 

The websites also hosted 851 GB of information allegedly stolen from members of the Sanzer Hasidic Jewish community.

Albania and Mexican cartels

The FBI said the Handala website was linked to other domains used by Iran’s MOIS in operations dating back to 2022. 

One of the websites was used to host information stolen from Albania during two cyberattacks on the country’s government in 2022. 

The first hack occurred in July 2022, prior to a conference in Albania slated to be attended by members of the Mujahideen-e Khalq, also known as MEK, an Iranian group that Tehran considers a terrorist organization. The incident knocked some government services offline, causing officials to scramble to recover.

In September 2022, Albania’s Prime Minister Edi Rama announced a second cyberattack that hit the country’s Total Information Management System, which helps automate things like passport checks and cross-referencing people on fugitive databases.

The Cybersecurity and Infrastructure Security Agency (CISA) later said the Iranian hackers had been inside Albania's networks for over a year. The cyberattack granted Iranian actors access to Albanian government email systems and they stole information that included correspondence between the U.S. and Albania. 

FBI Director Kash Patel said in a statement that the agency is “not done” uncovering Iranian cyber operations. The State Department issued a $10 million reward for information on anyone who participated in the creation of the websites or was involved in the cyberattacks. 

A group claiming to be Handala created a new website where they responded to the takedowns and threatened further cyberattacks. 

Israeli officials claimed this week that several of the Iranian leaders behind Handala were recently killed in airstrikes.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/fbi-takes-down-leak-sites-iran-mois
如有侵权请联系:admin#unsafe.sh