diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index f101a85..19d1f46 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -17015,6 +17015,18 @@ }, "uuid": "4e26b4ac-5530-428b-8694-3dd6d24ee286", "value": "Asnarök" + }, + { + "description": "Shahid Hemmat is an IRGC-CEC affiliated hacking group linked to cyberattacks targeting U.S. critical infrastructure, including the defense industry and international transportation sectors. The group has been implicated in the hack of a booster station at the Municipal Water Authority in Aliquippa, Pennsylvania, which disrupted drinking water supply. Key figures within Shahid Hemmat include Manouchehr Akbari, Amir Hossein Hoseini, Mohammad Hossein Moradi, and Mohammad Reza Rafatnejad. The U.S. government is offering a $10 million reward for information on these individuals.", + "meta": { + "country": "IR", + "refs": [ + "https://securityonline.info/shahid-hemmat-hackers-10m-reward-offered-by-us/", + "https://www.bitdefender.com/en-us/blog/hotforsecurity/us-offers-10-million-bounty-for-members-of-iranian-hacking-gang/" + ] + }, + "uuid": "ae17fcf4-1335-4dec-9976-e26d2e5f7290", + "value": "Shahid Hemmat" } ], "version": 318