Iran pays ransom to threat actor following cyberattack on country’s banking system
Iran reportedly paid threat actors millions in ransom after a cyberattack last month targeted the country’s banking system.
Last month, a threat group called IRLeaks attacked the country’s banking system and threatened to sell the data it extracted. The data reportedly included credit card and personal data of millions of Iranians.
The attack targeted the Central Bank of Iran (CBI) along with other banks, whose ATMs were filled with political notes.
“Dear customers, it is not possible to withdraw money from the bank because the entire budget and national resources of Iran have been invested in the war for the benefit of the corrupt regime of the Islamic Republic,” the notes said.
IRLeaks, a group known for attacking Iranian organizations, demanded $10 million (approximately AU$14.9 million) in cryptocurrency for the deletion of the data.
The disclosure of the data would be problematic for the country, which is under pressure thanks to international sanctions. Additionally, Iranian media suggested that the attack could be the largest ever perpetrated against the country’s state infrastructure to date.
Now, according to sources close to the matter who spoke to the media, the threat actors agree to a $3 million (approximately A$4.5 million) ransom, which was paid by an Iranian company, even though the nation had never before acknowledged the attack.
The attack comes as tensions in the Middle East continue to escalate and criticism of Iran’s actions increases.
Last month, Iran’s Supreme Leader Ayatollah Ali Khamenei vowed revenge after the assassination of Hamas leader Ismail Haniyeh.
The leaders of France, Germany and the United Kingdom responded with a joint statement, saying that Iran will “take responsibility” for any action it takes against Israel.
The leaders of the three countries have called on Iran to refrain from launching attacks against Israel, emphasizing the risk of jeopardizing ceasefire negotiations between it and Hamas.