Wednesday, March 5, 2025
Homecyber securityRewards Up to $10 Million for Information on Iranian Hackers

Rewards Up to $10 Million for Information on Iranian Hackers

Published on

SIEM as a Service

Follow Us on Google News

The United States Justice Department has announced big rewards for information leading to the capture of four Iranian nationals.

These individuals are accused of conducting a sophisticated multi-year cyber campaign against American companies.

The announcement underscores the gravity of cyber threats and the U.S. government’s commitment to countering such illegal activities.

The indictment, unsealed in a Manhattan federal court, names Hossein Harooni, Reza Kazemifar, Komeil Baradaran Salmani, and Alireza Shafie Nasab as the perpetrators behind a concerted effort to compromise the U.S. government and business networks.

Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

This cyber campaign is believed to be part of a larger strategy by Iranian actors to exert influence and gain unauthorized access to critical information and systems.

The Reward for Justice has recently tweeted about a lucrative opportunity for information related to Iranian hackers.

The reward for such information has been set at a maximum of $10 million.

Charges

The charges laid out by the Justice Department are severe and reflect the serious nature of the offenses.

The four individuals are accused of engaging in a cyber-enabled campaign that targeted U.S. infrastructure.

While the specific charges have not been detailed in the press release, such indictments typically include counts of unauthorized access to computer systems, data theft, and potentially espionage-related activities.

Impact

The impact of these cyber-attacks is far-reaching.

They represent a direct threat to the security of sensitive U.S. government and corporate information and undermine trust in digital infrastructure.

The announcement of rewards, which can reach $10 million, clearly signals that the U.S. is taking a proactive stance in deterring such cyber threats and is willing to invest significant resources in bringing the perpetrators to justice.

The Justice Department’s move also serves as a deterrent to other would-be cyber attackers, demonstrating that the U.S. will pursue and potentially prosecute individuals involved in cyber espionage and cybercrime, regardless of location.

The unsealing of the indictment and the subsequent reward offer marks a critical step in the fight against international cybercrime.

The U.S. government’s approach reflects an understanding that cyber threats require a robust and multi-faceted response, combining legal action, international cooperation, and public-private partnerships.

As the digital landscape continues to evolve, such measures will be vital in safeguarding national interests and maintaining the integrity of global cyberinfrastructure.

Free Webinar: Mastering Web Application and API Protection/WAF ROI Analysis -  Book Your Spot

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Alli AI Announces Upcoming Public Launch of AI-Powered Content Creation Platform

AI Soft has announced the upcoming public release of Alli AI, an advanced artificial...

CISA Issues Alert on Actively Exploited VMware Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated warnings on March 4, 2025,...

Cisco Webex for BroadWorks Flaw Opens Door for Attackers to Access Credentials

Cisco Systems has disclosed a security vulnerability in its Webex for BroadWorks unified communications...

Over 10,000 WordPress Sites Exposed by Donation Plugin Code Execution Vulnerability

A critical security flaw in the widely used GiveWP – Donation Plugin and Fundraising Platform has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CISA Issues Alert on Actively Exploited VMware Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated warnings on March 4, 2025,...

Cisco Webex for BroadWorks Flaw Opens Door for Attackers to Access Credentials

Cisco Systems has disclosed a security vulnerability in its Webex for BroadWorks unified communications...

Over 10,000 WordPress Sites Exposed by Donation Plugin Code Execution Vulnerability

A critical security flaw in the widely used GiveWP – Donation Plugin and Fundraising Platform has...