Iranian Hackers Say They Have 100GB Of Trump Emails

Hackers claiming ties to Iran say they possess 100GB of emails from President Donald Trump’s inner circle and may soon leak or sell the trove, after previously distributing a batch to the media before the 2024 U.S. election.

In online conversations with Reuters on Sunday and Monday, the hackers—who use the pseudonym “Robert”—claimed to possess about 100 gigabytes of emails from the accounts of “White House Chief of Staff Susie Wiles, Trump lawyer Lindsey Halligan, Trump adviser Roger Stone and porn star-turned-Trump antagonist Stormy Daniels.”

Robert mentioned the potential of selling the material but did not provide further details about their plans or the content of the emails.

U.S. Attorney General Pam Bondi described the breach as “an unconscionable cyber-attack.”

The White House and FBI responded with a statement from FBI Director Kash Patel, who said:

“Anyone associated with any kind of breach of national security will be fully investigated and prosecuted to the fullest extent of the law.”

The Cybersecurity and Infrastructure Security Agency (CISA) posted on X that “This so-called cyber ‘attack’ is nothing more than digital propaganda, and the targets are no coincidence. This is a calculated smear campaign meant to damage President Trump and discredit honorable public servants who serve our country with distinction”

Keep reading

FBI Warns That Hacking Group is Expanding Cyberattacks to Target Airlines

The FBI has issued a warning that the hacker group Scattered Spider is expanding its cyberattacks to target airlines.

The alert was released on Friday, with federal officials emphasizing the group’s growing focus on the airline industry.

Scattered Spider is known for its use of social engineering tactics, often impersonating employees or contractors to trick IT help desks.

These tactics frequently include methods to bypass multi-factor authentication (MFA), such as persuading help desk personnel to add unauthorized MFA devices to compromised accounts.

The FBI stated the group targets large corporations and their third-party IT providers, putting the entire airline ecosystem—including vendors and contractors—at risk.

Keep reading

FBI Compromised by Cartel Hacker Who Gained Control of Cameras, Multiple Left Dead in Fallout

Unidentified computer hackers associated with the Sinaloa drug cartel were able to garner phone records from the FBI, then used Mexico City surveillance cameras to compromise key informants and witnesses so they could murder them back in 2018, a new report showed.

This information was disclosed to the Justice Department in an Inspector General audit of the FBI’s efforts to “Mitigate the Effects of Ubiquitous Technical Surveillance,” according to Fox News.

The report cited the case against Joaquin “El Chapo” Guzman, who used to lead the cartel, but who was extradited to the United States back in 2017. While federal authorities were working the case, they were alerted to the hiring of a hacker “who offered a menu of services related to exploiting mobile phones and other electronic devices.”

The hacker “had observed people going in and out of the United States Embassy in Mexico City and identified ‘people of interest’ for the cartel, including the FBI Assistant Legal Attache (ALA T), and then was able to use the ALA T’s mobile phone number to obtain calls made and received, as well as geolocation data, associated with the ALAT’s phone,” the audit read.

“According to the FBI, the hacker also used Mexico City’s camera system to follow the ALAT through the city and identify people the ALAT met with,” the report continued. “According to the case agent, the cartel used that information to intimidate and, in some instances, kill potential sources or cooperating witnesses.”

The audit also highlighted how modern technology has “made it easier than ever for less-sophisticated nations and criminal enterprises to identify and exploit vulnerabilities created by” data from everyday items like smartphones and personal computers.

Some within the U.S. intel community, including CIA officials, described the threat as being “existential.”

This should send a message to the U.S. that computers have become the new battlefield. And we are still vulnerable in this area.

Even if the federal government expanded funding and continued using all the technology at its disposal, drug cartels can still gain the upper hand.

Keep reading

DHS Alerts US Public On Iran Retaliation Threat: Just Some ‘Low-Level’ Cyberattacks?

The latest Department of Homeland (DHS) alerts are telling the American public to expect some form of Iranian retaliation in response to this weekend’s major US bombing raids targeting three key Iranian nuclear energy and uranium enrichment sites.

And the Pentagon is preparing for potential attack on US bases in the Middle East, whether in Iraq or Syria where reduced troop presences still remain, or in the Gulf Arab countries – home to major naval and air bases.

But the latest DHS warnings speak of a not-so-new threat (which gets repeated just about every year) of stepped-up Iranian cyber threat activity.

A fresh terrorism advisory bulletin from DHS warns that Iran’s response could include violent actions on US soil as well as increased cyber operations.

The supposed heightened threat environment predicts likely low-level cyberattacks from pro-Iranian hacktivists, but also more serious threats from state-backed Iranian hackers:

“The ongoing Iran conflict is causing a heightened threat environment in the United States,” the DHS said. “Low-level cyber attacks against US networks by pro-Iranian hacktivists are likely, and cyber actors affiliated with the Iranian government may conduct attacks against US networks.”

But behind the headlines, the reality is that the fear-mongering from US officials will front-run the actual threats and ‘attacks’ – and likely grow louder, according to the all too familiar playbook of the Bush-Cheney era…

Keep reading

Report: Hackers Breach Several Iranian TV Channels, Call on Citizens to Take to the Streets

Hackers continue to wreak havoc on the Iranian regime.

Clash Report posted video of an Iranian TV channel that was breached and is airing footage calling for the citizens to take to the streets.

Civilization is quickly breaking down in Iran since Israel started its military attacks on Friday night.

Food vendors are closed in many places, ATMs are without cash, the internet is down (except for Starlink!) and now the TV channels are hacked!

From the tweet above (translated):

“An hour ago, the regime’s infamous propaganda and lies agency, the regime’s infamous Iranian Broadcasting Corporation, was hacked.

After the regime’s normal programs were interrupted, a message was issued to the Iranian nation, calling on Iranians to rise up to overthrow the regime.”

Keep reading

Suspected Israeli hackers claim to destroy data at Iran’s Bank Sepah

An anti-Iranian government hacking group with potential ties to Israel and a track record of destructive cyberattacks on Iran claimed in social media posts on Tuesday that it had destroyed data at Iran’s state-owned Bank Sepah.

The group — known as Gonjeshke Darande, or “Predatory Sparrow” — hacked the bank because they accused it of helping fund Iran’s military, according to one of the messages posted online.

The hack comes amid increasing hostilities between Israel and Iran, after Israel attacked multiple military and nuclear targets in Iran last week. Both sides have launched multiple missile attacks against each other in the days since.

Reuters could not immediately verify the attack on Bank Sepah. The bank’s website was offline on Tuesday and its London-based subsidiary, Bank Sepah International plc, did not immediately respond to an emailed request for comment.

Customers were having problems accessing their accounts, according to Israeli media.

Gonjeshke Darande did not respond to multiple messages sent via social media.

“Disrupting the availability of this bank’s funds, or triggering a broader collapse of trust in Iranian banks, could have major impacts there,” Rob Joyce, the former top cybersecurity official at the NSA, said in a post on X.

In 2022, Gonjeshke Darande claimed responsibility for a cyberattack against an Iranian steel production facility. The sophisticated attack caused a large fire at the facility, resulting in tangible, offline damage. Such attacks are usually beyond the capabilities of activist hackers, security experts say, and would be more in line with the capabilities of a nation state.

Keep reading

FBI investigating impersonator who hacked phone of Chief of Staff Susie Wiles

A federal investigation is underway after elected officials and other prominent figures were contacted by an imposter pretending to be White House Chief of Staff Susie Wiles.

“They breached the phone; they tried to impersonate her,” President Trump told reporters. “Nobody can impersonate her. There’s only one Susie.”

The president added that Wiles, one of Trump’s closest advisers, is an “amazing woman” and “can handle” the situation.

A White House official confirmed the probe on Friday, a day after the Wall Street Journal reported that business leaders and politicians — including governors, senators and members of congress — started receiving text messages and calls from a person who apparently hacked into Wiles’ phone, giving them access to her personal contact list.

The official further noted it was Wiles’ personal phone, not her government phone that was affected.

Keep reading

Trump’s chief of staff is caught in sinister impersonation plot exposing America’s most powerful players… until fatal slip reveals truth

Donald Trump‘s top advisor has fallen victim to a sinister scheme by hackers who infiltrated her phone and used artificial intelligence to impersonate her voice.

The nefarious plot involved stolen data from the personal cellphone of White House chief of staff Susie Wiles that was then used to call some of American’s most powerful people. 

Over the course of several weeks, high profile senators, governors and American business executives have received voicemails or messages from an unknown number claiming to be Wiles, Wall Street Journal reported. 

The hackers came undone when they made the fatal mistake of asking questions that the president’s closest aide would already know the answer to. 

Wiles – who has been nicknamed ‘Ice Maiden’ – has been contacting associates urging them to disregard any unusual messages or calls from unknown numbers purporting to be her.

In a terrifying twist, some of the phone calls used a voice that mimicked Wiles. Authorities suspect the impersonator used artificial intelligence to replicate it.

The FBI is now investigating the unusual situation, but do not believe that a foreign nation is behind it, sources told the publication.

‘The FBI takes all threats against the president, his staff, and our cybersecurity with the utmost seriousness,’ FBI Director Kash Patel said in a statement. 

‘Safeguarding our administration officials’ ability to securely communicate to accomplish the president’s mission is a top priority.’ 

Authorities are reportedly scrambling to figure out what the goal of the plot is.

In at least one case the impersonator asked for a cash transfer, while in another they asked a lawmaker for a list of people who the president could consider pardoning.

But many of the texts which came through appeared to be legitimate and fooled some of Wiles’ contacts. There are allegedly no suggestions that any sensitive information was handed over.

Some of her associates became suspicious when the impersonator began asking questions – sometimes about Trump – that Wiles as his closest advisor would have known the answers to.

Others said some messages were sent with poor grammar, and in a more formal manner than Wiles generally communicates. 

These messages were not sent from Wiles’ phone number.

Her personal cellphone contacts list was reportedly hacked, giving the impersonator access to a long list of numbers she has amassed over the years as one of Washington’s most formidable political players.

The breach comes after a series of embarrassing data leaks during Trump’s second term.

In one instance, the editor-in-chief of The Atlantic, Jeffrey Goldberg, was accidentally included in a Signal group chat where Secretary of Defense Pete Hegseth discussed planned military strikes in Yemen. 

Trump’s former national security adviser, Mike Waltz, took responsibility for the error and was reassigned to a different role. 

Keep reading

Coinbase Customers’ Personal Data Stolen in Hack, Stock Drops

The cryptocurrency exchange Coinbase was recently targeted in a hacking incident that led to the personal data of thousands of customers being stolen, the company said in a May 15 statement.

According to a March 31 filing with the Securities and Exchange Commission (SEC), Coinbase had 9.7 million monthly transaction users (MTU) by the end of that month.

Since the company claims that less than 1 percent of MTUs have been impacted by the hack, the number of affected individuals could be around 97,000.

Hackers got access to names, addresses, phone numbers, emails, last four digits of Social Security numbers, masked bank account numbers and identifiers, government ID images such as driver’s licenses and passports, and account data such as balance snapshots and transaction history.

Hackers did not get access to login credentials or 2FA codes, private keys, customer funds and the ability to move these funds, Coinbase Prime accounts, Coinbase or Coinbase customer hot or cold wallets.

Following the revelation, Coinbase shares crashed by 7.2 percent on Thursday.

Keep reading

Data of thousands of Israel soldiers leaked

A security breach on an external Israeli ticketing website led to sensitive data belonging to soldiers in the Israeli occupation army, including Chief of Staff Eyal Zamir and high-ranking officers, being made available online, Haaretz reported yesterday.

According to the report, the breach allowed access to personal information, including their full names, ID numbers and phone numbers, through the TickChak website, which is used by army units to offer recreational benefits to their employees.

The breach, coupled with the weak security of the website, allows anyone to access soldiers’ data simply by entering their ID number, without going through any additional verification. This allowed for the extraction and collection of personal information belonging to tens of thousands of soldiers.

The breach occurred using simple software tools created by an anonymous user identifying themselves as the “Persian Prince”. The user was able to run a programme that tested potential ID numbers and extracted the details of their owners.

Keep reading