FBI Takes Down Leak Sites Tied to Iran’s MOIS Cyber Operations

Related

CISO Whisperer/TVC Analyst Official Sales Leaders Rankings

The cybersecurity industry continues to experience one of the...

Female Cybersecurity Leaders to Watch in Maryland

Maryland’s cybersecurity leadership bench is shaped by a distinctive...

BuddyBoss Platform Compromised as Hundreds of Websites Are Hacked

What happened BuddyBoss platform compromised as hundreds of websites were...

Female Cybersecurity Leaders to Watch in New Jersey

New Jersey’s cybersecurity leadership bench reflects the state’s unusual...

Share

What happened

The FBI seized four domains used by Iran’s Ministry of Intelligence and Security to publish stolen data and support cyber operations under personas like “Handala.” The sites hosted information taken from victims including the government of Albania, Iranian dissidents, Israeli officials, and U.S. companies. Authorities said the infrastructure had been used since at least 2022 to conduct cyberattacks, leak stolen data, and carry out influence and intimidation campaigns. The takedown followed a court-approved seizure warrant and comes after the same group claimed responsibility for recent attacks, including the disruption of medical technology company Stryker. 

Who is affected

Victims include government entities, private organizations, and individuals whose data was stolen and published on the seized websites, as well as broader targets of Iran-linked cyber operations. 

Why CISOs should care

The operation highlights how nation-state actors use public leak sites as part of cyber campaigns—combining data theft, psychological operations, and public exposure to amplify impact beyond the initial breach. 

3 practical actions

  1. Monitor for data exposure on leak sites. Track whether organizational data appears in public dumps or threat actor platforms. 
  2. Assess nation-state threat exposure. Evaluate risk from groups using both cyber intrusion and information operations. 
  3. Prepare for secondary impacts. Account for reputational, legal, and operational risks tied to public data leaks. 

For more coverage of major incidents and threat activity, explore our reporting on Cyberattacks.