Saturday, June 14, 2025
HomeHacksTwo Iranian Hackers Charged For Gaining Access to Confidential Voter Information

Two Iranian Hackers Charged For Gaining Access to Confidential Voter Information

Published on

SIEM as a Service

Follow Us on Google News

The US department of justice has recently announced that they are awarding a $10 million prize for reporting the two Iranian hackers who are blamed and charged for intimidating, provoking, manipulating, influencing, and gaining access to the confidential voter information of American voters throughout the 2020 US presidential campaign.

The two Iranian hackers, Seyyed Kazemi and Sajjad Kashian are claimed for transmitting harassing emails to Democratic voters in Florida. 

While it has also been claimed that the voters are being threatened to physically hurt them if they do vote for President Donald Trump.

- Advertisement - Google News

And not only this, even both the Iranian hackers, Seyyed Kazemi and Sajjad Kashian has tried to break into 11 state voter registration and in the websites that have all kinds of data.

According to the DOJ report, Both the threat actors used the data that they have stolen to spread misleading news through Facebook and email that says that the Democratic Party was preparing to interpose in the elections by hacking voter registration sites.

Both the defendants are not yet arrested, but the expert believed that they are in Iran, but US officials expect that the charges and penalties will decrease their ability for further movements.

Four Components

Here below we have mentioned the four key components:-

  • The conspiracy members have conducted surveillance in September and October 2020, and they have also tried to negotiate nearly eleven state voter websites, that include state voter registration websites and state voter information websites.
  • The conspiracy members claimed to be a group of Proud Boys volunteers in October 2020, and later they have also sent several false Facebook messages and emails to the Republican Senators, Republican members of Congress. They also sent many individuals linked with the Presidential campaign of Donald J. Trump, White House advisors.
  • The associates got involved in an online voter coercion campaign in October 2020, and this campaign involves some threatening messages. However, it is expected that the messages came from the Proud Boys to tens of thousands of registered voters.
  • While the day after the 2020 U.S. Presidential election, on November 4, 2020, the associates tried to leverage previous September and October 2020 interventions into an American media company’s computer networks. 

Moreover, the Justice Ministry affirmed that the two defendants “are experienced computer hackers from Iran” and operated as entrepreneurs for a data security company Emennet Pasargad.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Volkswagen Car Hack Exposes Owner’s Personal Data and Service Records

Tech-savvy Volkswagen owner has uncovered critical security flaws in the My Volkswagen app that...

North Korean Hacker Tries to Infiltrate Kraken Through Job Application

Leading cryptocurrency exchange Kraken has disclosed that it recently thwarted an infiltration attempt by...

Gain Legends International Suffers Security Breach – Customers Data Stolen

Gain Legends International, a prominent name in sports, entertainment, and venue management, has confirmed...