Pro-Israel Hacktivist Group Claims Iran Bank Hack | Cyberattack News

Report of Cyberattack on Iran’s Bank Sepah
On Tuesday, the pro-Israel hacktivist collective known as Predatory Sparrow asserted responsibility for a successful cyberattack against Iran’s Bank Sepah.
Claim of Responsibility
The group, also identified by its Persian designation Gonjeshke Darande, publicized their claim on the X platform.
In a statement, the group declared, “We, ‘Gonjeshke Darande,’ executed cyberattacks that resulted in the destruction of data belonging to the Islamic Revolutionary Guard Corps’ ‘Bank Sepah.’”
Allegations Against Bank Sepah
Predatory Sparrow alleges that Bank Sepah functions as an entity that actively bypasses international sanctions.
The group further contends that the bank utilizes funds from Iranian citizens to support the regime’s network of proxy organizations, its ballistic missile development, and its nuclear military program.
Reported Disruptions in Iran
According to reports from Iran International, a news outlet, there is evidence of “widespread banking disruptions” occurring throughout Iran.
Several branches of Bank Sepah were reportedly closed on Tuesday, with customers reporting an inability to access their financial accounts.
Ariel Oseran, a correspondent for i24NEWS, shared images depicting ATMs within Iran displaying error messages.
Verification Attempts
TechCrunch was unable to independently confirm the validity of the group’s claimed cyberattack.
Attempts to contact Bank Sepah through two Iranian email addresses resulted in error messages.
Affiliates of Bank Sepah located in the U.K. and Italy did not provide immediate responses to requests for comment.
Lack of Response from Predatory Sparrow
Predatory Sparrow did not respond to a request for comment submitted via their X account or through Telegram.
Context of Regional Conflict
This alleged cyberattack on Bank Sepah occurs amidst escalating tensions, with Israel and Iran engaging in reciprocal bombing campaigns.
This conflict was initiated following Israel’s targeting of nuclear facilities, military installations, and senior Iranian military personnel on Friday.
Background on Predatory Sparrow
The identity of those behind Predatory Sparrow remains unclear.
The group consistently presents itself as a pro-Israel, or at least anti-Iran, hacktivist organization, having targeted various entities within Iran for several years.
Cybersecurity analysts believe the group has demonstrated past successes and made credible assertions regarding their operations.
Expert Analysis
John Hultquist, chief analyst at Google’s Mandiant, stated on X, “Despite appearances this actor is not all bluster.”
Rob Joyce, a former NSA official and member of the Biden administration, noted that “Predatory Sparrow’s past cyber attacks on Iranian steel plants and gas stations have demonstrated tangible effects in Iran.”
Previous Notable Attacks
Predatory Sparrow’s most publicized alleged attacks include a cyberattack on a steel manufacturer, which reportedly triggered an explosive fire, and an attack on Iran’s gas stations, causing disruptions to fuel access for citizens.
Related Posts

FTC Upholds Ban on Stalkerware Founder Scott Zuckerman

Google Details Chrome Security for Agentic Features

Petco Data Breach: SSNs, Driver's Licenses Exposed

Petco Data Breach: Customer Data Exposed - What You Need to Know

Intellexa Spyware: Direct Access to Government Espionage Victims
