• Home
  • About Us
  • Anti Spam Policy
  • Contact
  • Cookie Policy
  • DMCA
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Digital Marketing
    • E-Commerce
    • IT Blog
  • Networking
  • Latest Technology
    • Cell Phone
    • Data Security
    • Laptop
    • Software
  • Auto Mobile
No Result
View All Result
  • Home
  • Digital Marketing
    • E-Commerce
    • IT Blog
  • Networking
  • Latest Technology
    • Cell Phone
    • Data Security
    • Laptop
    • Software
  • Auto Mobile
No Result
View All Result
My Blog Wire
No Result
View All Result

Hacker destroys Iranian cyber-espionage information

George Duncan by George Duncan
February 11, 2024
Home Data Security

On Wednesday, ZDNet mentioned that a hacker with the net called Lab Dookhtegan leaked a fix of hacking tools belonging to Iran’s espionage agencies, often diagnosed because of the APT34, Oilrig, or HelixKitten, on Telegram. The leaks began someplace inside the mid-March and blanketed touchy records, mostly such as usernames and passwords. ZDNet was made aware of this hack while a Twitter consumer DMed them several identical files leaked on Telegram. Though this Twitter person claimed to have labored on the institution’s espionage marketing campaign, ZDNet believes that it’s also viable that he is a member of a foreign intelligence business enterprise seeking to cover their actual identity. ZDNet’s assumption is that the Twitter user may be the Telegram Lab Dookhtegan character.

The hacker leaked the supply code of six hacking tools: Glimpse, PoisonFrog, HyperShell, HighShell, Fox Panel, and Web mask. Many cyber-protection specialists, along with Chronicle, Alphabet’s cyber-protection department, showed the authenticity of this equipment. Along with this equipment, the hacker also leaked the content from numerous active backend panels, where sufferer information had been collected.

Chronicle, Alphabet’s cyber-protection department, showed to ZDNet that the hacker had leaked data of 66 sufferers, particularly from countries within the Middle East. These statistics become accrued from each authorities companies and private businesses. The hacker leaked facts from APT34’s beyond operations, sharing the IP addresses and domain names where the group hosted web shells and other operational facts.

Hacker

The hacker admitted at the Telegram channel that he had destroyed the manipulate panels of APT34’s hacking equipment and wiped their servers smooth. Besides leaking the facts and supply code of the hacking tools, the hacker additionally made public personal data of the Iranian Ministry of Intelligence officials who had been involved with APT34 operations such as phone numbers, pics, and names. dSo, now the Iranian espionage institution has no desire other than to start over.

Going by the leaked documents, it seems that Dookhtegan additionally had some grudge in opposition to the Iranian Ministry of Intelligence, which he knew as “merciless,” “ruthless,” and “criminal”. Now, numerous cyber-protection companies are reading the leaked records. In an email to ZDNet, Brandon Levene, Head of Applied Intelligence at Chronicle, stated, “It’s in all likelihood this organization will regulate their toolset that allows you to preserve operational fame. There may be a few copycat activities derived from the leaked gear. However, it’s miles unlikely to look full-size use.”

George Duncan

George Duncan

I have over 10 years of experience writing about tech and gadgets. I write articles about Android, iPad, iPhone, Windows, Mac, and other tech products. My focus is on writing product reviews and features for tech news websites and newspapers.

Next Post
Cyber safety, big facts amongst Singapore’s maximum in-call for tech jobs for 2019

Cyber safety, big facts amongst Singapore's maximum in-call for tech jobs for 2019

No Result
View All Result

Latest Updates

Understanding Raw Disk Mapping in VMware

Understanding Raw Disk Mapping in VMware

March 26, 2025
US Treasury Hit by Cyber Hack

US Treasury Hit by Cyber Hack

March 20, 2025
The Power of Telecom Solutions: Increasing Connectivity

The Power of Telecom Solutions: Increasing Connectivity

March 19, 2025
Understanding Optoisolators: How They Safely Transmit Signals

Understanding Optoisolators: How They Safely Transmit Signals

March 16, 2025
Unlocking the Power of Ampere/m: A Guide to Understanding Electrical Current

Unlocking the Power of Ampere/m: A Guide to Understanding Electrical Current

March 12, 2025

Popular Today

  • Free Download Latest Version of Windows 7 Pro OA ISO

    Free Download Latest Version of Windows 7 Pro OA ISO

    0 shares
    Share 0 Tweet 0
  • Airtel Xstream Box Gets Software Update, UI Changes and More

    0 shares
    Share 0 Tweet 0
  • Was this winter as bloodless because it seemed?

    0 shares
    Share 0 Tweet 0
  • How Online Poker Leverages Social Media for Success

    0 shares
    Share 0 Tweet 0
  • No cut-off date for automobile groups to adopt electric motors: Nitin Gadkari

    0 shares
    Share 0 Tweet 0
  • Home
  • About Us
  • Anti Spam Policy
  • Contact
  • Cookie Policy
  • DMCA
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions

© 2025 MYBLOGWIRE - All Rights Reserved to Us!

No Result
View All Result
  • Home
  • Digital Marketing
    • E-Commerce
    • IT Blog
  • Networking
  • Latest Technology
    • Cell Phone
    • Data Security
    • Laptop
    • Software
  • Auto Mobile

© 2025 MYBLOGWIRE - All Rights Reserved to Us!