
How Israel-aligned hackers hobbled Iran's financial system
While Israel and the U.S. were bombing Iran's nuclear sites, another battlefield emerged behind the scenes: the financial infrastructure that keeps Tehran connected to the world.
Israeli authorities, and a pro-Israeli hacking group called Predatory Sparrow, targeted financial organizations that Iranians use to move money and sidestep the U.S.-led economic blockade, according to Israeli officials and other people familiar with the efforts. U.S. sanctions, imposed off-and-on for decades due to Tehran's nuclear program and support for Islamist groups, have aimed to cut Iran off from the international financial system.
Predatory Sparrow, which operates anonymously and posts updates of its activities on X, said this past week that it crippled Iran's state-owned Bank Sepah, which services Iran's armed forces and helps them pay suppliers abroad, knocking out its online banking services and cash machines. Iranian state media acknowledged the damage.
The group also breached Nobitex, Iran's largest cryptocurrency exchange, popular with locals for transferring money overseas. The hackers extracted about $100 million in funds and forced the platform to shut down, according to the exchange.
Iran's government pulled the plug on much of the country's online activities to prevent further attacks and keep a lid on dissent. Non-Iranian websites were blocked. Citizens were warned against using foreign phones or messaging platforms that it claimed could collect audio and location data for Israeli spies. Government officials were banned from using laptops and smartwatches.
Predatory Sparrow said the two hacks were directed against the 'financial lifelines" of the Islamic Revolutionary Guard Corps, the most powerful faction of Iran's military that also controls swaths of the economy. 'Noble people of Iran! Withdraw your funds before it is too late," it tweeted.
Both targeted companies remain hobbled. Nobitex said it faced serious challenges in restoring services and was aiming to relaunch trading this coming week. Some Bank Sepah users say online they still aren't receiving deposits.
The group didn't say if it was acting on behalf of Israeli authorities. 'The group's sophistication, target selection and geopolitical messaging fit the profile of an Israel-aligned, state-sponsored cyber actor," said Deddy Lavid, chief executive of Cyvers, a Tel Aviv-based cybersecurity firm.
Predatory Sparrow didn't respond to requests for comment sent to the administrator of its Telegram group.
The cyberattacks hit an economy already battered by U.S. sanctions that bar the purchase of Iran's oil or interactions with its banks. Iran's economy is highly dependent on a select few trading partners, notably China. Annual inflation runs above 40%, according to the World Bank. A constant flight of skilled workers has also throttled Iran's economic growth.
Israel confirmed a cease-fire with Iran on Tuesday. But cybersecurity experts and Israeli officials expect the cyberwarfare to continue. 'Israel will likely keep launching precision cyberstrikes against the regime's power centers," said Lavid.
Officials at Israel's National Bureau for Counter-Terror Financing said they didn't have information on links between Predatory Sparrow and Israeli authorities. They said Israel was broadly targeting the economic infrastructure that allowed Iran to finance its military and proxies, imposing sanctions earlier this month on its central bank and other banks used by the IRGC.
The NBCTF, which is overseen by the defense ministry, plans to issue orders to exchanges outside Iran to help it seize more of Nobitex's crypto holdings. It has identified a further $150 million in funds held by Nobitex, the officials said.
Pro-Iran cyber groups have hit back, targeting Israeli government websites with denial-of-service attacks, in which hackers aim to overwhelm computers that route internet traffic with a flood of requests, and sending phishing messages to Israelis in a bid to compromise their phones. The Israel National Cyber Directorate said Iran's cyberattacks hadn't caused damage in recent weeks.
Paranoia swept through the Iranian population as the attacks, both physical and cyber, mounted. 'It's better to cut [the internet] off. Israel can see everything," said Mohammad Ghorbaniyan, a Tehran-based money changer whom the U.S. sanctioned several years ago for allegedly aiding Iranian hackers, an accusation he denies.
The Bank Sepah hack last Tuesday halted payments, including salaries owed to military retirees, according to Fars News Agency, which is controlled by the IRGC. Many of its cash machines stopped working. The U.S. Treasury Department said last year that Bank Sepah, which has branches on Iranian military bases, helps Iran's defense ministry pay foreign suppliers via a sprawling shadow-banking network.
Nobitex went offline the next day. The Tehran-based crypto exchange has processed transactions in excess of about $22 billion for users since its 2017 launch, according to blockchain research firms and the officials from Israel's NBCTF.
'This attack had political motives to create emotional distress and damage the Iranian people's property," Nobitex's chief executive, Amir Rad, said in a video posted on its Telegram channel.
As in Russia and other countries cut off from international finance, cryptocurrencies, in particular dollar-pegged stablecoins such as tether, have emerged as a vital workaround in Iran, providing a medium through which users can shift money between local and foreign banks.
Nobitex's 11 million customers use the platform to swap Iranian rials for tether, which they can convert into other traditional currencies abroad. Rad has said on his LinkedIn account that Nobitex's goal is to allow Iranians to trade crypto despite 'the shadow of sanctions."
'Nobitex has been the main option for the Iranians to skip the sanctions," said Amit Levin, a former Israeli prosecutor and ex-investigator at the Binance crypto exchange who now advises companies on financial-crime compliance.
The Islamic Revolutionary Guard Corps had also turned to Nobitex for international payments, according to the Israeli officials and blockchain researchers. Crypto analytics firm Elliptic has found that two IRGC operatives, whom the U.S. accused of conducting ransomware attacks on American companies, used Nobitex to make transfers.
Rad said he didn't believe that the IRGC was moving money through Nobitex because he operated a transparent platform that was closely monitored.
Predatory Sparrow has been wreaking havoc on Iran since at least 2021. In earlier hacks, the group disabled gas-station payment systems across the country and triggered a fire at an Iranian steel plant.
For their operation against Nobitex, the hackers managed to obtain the keys for the exchange's cryptocurrency wallets, which were held by key personnel within the company, said Rad.
Predatory Sparrow then 'burned" the stolen $100 million by sending the tokens to other digital wallets the group itself couldn't access. These wallets' addresses, which are made up of long strings of numbers and letters, contained profane phrases like 'F—IRGCterrorists."
Nobitex's initial investigation into the breach indicated that Israel's government had likely supported it, Rad said, though he declined to provide proof of his claim. He said Nobitex was a private, independent company with no affiliation to the Iranian state, including the IRGC.
Write to Angus Berwick at angus.berwick@wsj.com
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

Time of India
27 minutes ago
- Time of India
'Enemy Of God': Top Iran Cleric Issues CHILLING Fatwa Against Trump, Netanyahu I Khamenei
/ Jun 30, 2025, 01:23AM IST Iranian cleric Grand Ayatollah Makarem Shirazi issued a fatwa against US President Donald Trump and Israeli Prime Minister Benjamin Netanyahu, according to Mehr News Agency. Shirazi declared that anyone who threatens the Leader and Shia Marja to be the Enemy of God. This after Trump and Netanyahu threatened to eliminate Iran's supreme leader, Ayatollah Ali Khamenei. Watch this video to know more.
&w=3840&q=100)

First Post
an hour ago
- First Post
Intercepted communications reveal Iran sought to downplay damage from US strikes: Report
President Donald Trump has stated that the strikes 'completely and totally obliterated' Iran's nuclear capabilities. However, US officials have noted that a full evaluation of the damage will require additional time read more A satellite image shows damage to the tunnel entrances of the Isfahan Nuclear Technology Research Center, following U.S. airstrikes amid the Iran-Israel conflict, in Isfahan, Iran, June 22, 2025. File image/ Reuters Intercepted Iranian communications sought to minimise the level of damage caused by recent US raids on Iran's nuclear facilities, according to The Washington Post, citing four sources familiar with sensitive material shared inside the US government. A separate source, speaking to Reuters on condition of anonymity, confirmed the report but expressed scepticism about the credibility of the intercepted communications, describing them as unreliable indicators of the true extent of the damage. The Post report adds to ongoing uncertainty over the impact of the strikes. A leaked preliminary assessment from the Defense Intelligence Agency suggested that the attacks may have only delayed Iran's nuclear program by a few months. STORY CONTINUES BELOW THIS AD President Donald Trump has stated that the strikes 'completely and totally obliterated' Iran's nuclear capabilities. However, US officials have noted that a full evaluation of the damage will require additional time. The White House rejected the Post report. 'The notion that unnamed Iranian officials know what happened under hundreds of feet of rubble is nonsense. Their nuclear weapons program is over,' White House press secretary Karoline Leavitt told the Post. In a Fox News interview broadcast on Sunday, Trump reiterated his position that the strikes were highly effective. 'It was obliterated like nobody's ever seen before. And that meant the end to their nuclear ambitions, at least for a period of time,' he said during the Sunday Morning Futures with Maria Bartiromo program.


India.com
an hour ago
- India.com
Israel wanted to kill Iran's supreme leader: How did Khamenei survive? How did Mossad fail to find him, and where did he hide?
Israel wanted to kill Iran's supreme leader: How did Khamenei survive? How did Mossad fail to find him, and where did he hide? Tel Aviv: The 12-day-long deadly conflict between Iran and Israel ended after United States President Donald Trump announced a ceasefire on June 24, hours after Tehran launched missile attacks on the US base in Qatar. A new shocking revelation has come to light: Tel Aviv wanted to eliminate Iran's Supreme Leader, Ayatollah Ali Khamenei, during the war. Israel's Defence Minister Israel Katz, on June 26, recently acknowledged that his country would have neutralised Khamenei if it had been possible during the war. 'I estimate that if Khamenei had been in our sights, we would have taken him out.' But Khamenei understood this, went underground to very great depths, and broke off contacts with the commanders who replaced those commanders who were eliminated, so it wasn't realistic in the end.' But 'it wasn't realistic in the end,' Katz said during an interview with Israel's Kan public television. The Israeli Defence Minister added that his country actively searched for Iran's supreme leader throughout the 12-day war. Israel wanted to destabilise Iran's leadership by killing.. Katz stated that Israel wanted to kill Khamenei but not for the regime change but to destabilise the leadership of the Middle East country. He explained, by doing this, Tel Aviv wanted to apply pressure mid-conflict. Responding to a question about whether Israel had sought US approval to kill Khamenei, the Minister said that his government doesn't need permission for 'these things'. 'We don't need permission for these things,' he told Channel 13 as per the TOI. Trump Had Also Threatened Khamenei's Life President Trump had also threatened Iran's supreme leader during the 12-day war. On June 17, the US President wrote on Truth Social that, 'We know exactly where the so-called 'Supreme Leader' is hiding… We are not going to take him out (kill!), at least not for now.' However, after few days, Trump stated that a change of regime in Iran was not advisable but demanded 'unconditional surrender.' Khamenei Slammed Trump Ayatollah Ali Khamenei denounced Donald Trump's demand for Iran's surrender, dismissing it as an unacceptable statement. How Did Khamenei Survive, And Where Did He Hide? As per a report by Reuters, citing five sources with direct details of succession planning, Iran's supreme leader and his family went into hiding. They were protected by the elite Vali-ye Amr unit of the Revolutionary Guards. According to several media reports, Khamenei was hiding in a secure and safe underground bunker. To go completely incognito, he was avoiding all electronic communication to prevent assassination attempts by the Israel Defence Forces. Top Iranian Commanders Killed During the conflict, Israel targeted and eliminated several high-ranking Iranian military and nuclear program officials. During the war, both Israeli Prime Minister Benjamin Netanyahu and US President Donald Trump alluded to the potential threat to Iranian Supreme Leader Ayatollah Khamenei, suggesting regime change as a possible outcome.