From 2b94de3f18329f89708a55c3e13816e234d474c0 Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Fri, 1 Nov 2024 10:43:26 -0700 Subject: [PATCH] [threat-actors] Add Shahid Hemmat --- clusters/threat-actor.json | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index f101a85..19d1f46 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -17015,6 +17015,18 @@ }, "uuid": "4e26b4ac-5530-428b-8694-3dd6d24ee286", "value": "Asnarök" + }, + { + "description": "Shahid Hemmat is an IRGC-CEC affiliated hacking group linked to cyberattacks targeting U.S. critical infrastructure, including the defense industry and international transportation sectors. The group has been implicated in the hack of a booster station at the Municipal Water Authority in Aliquippa, Pennsylvania, which disrupted drinking water supply. Key figures within Shahid Hemmat include Manouchehr Akbari, Amir Hossein Hoseini, Mohammad Hossein Moradi, and Mohammad Reza Rafatnejad. The U.S. government is offering a $10 million reward for information on these individuals.", + "meta": { + "country": "IR", + "refs": [ + "https://securityonline.info/shahid-hemmat-hackers-10m-reward-offered-by-us/", + "https://www.bitdefender.com/en-us/blog/hotforsecurity/us-offers-10-million-bounty-for-members-of-iranian-hacking-gang/" + ] + }, + "uuid": "ae17fcf4-1335-4dec-9976-e26d2e5f7290", + "value": "Shahid Hemmat" } ], "version": 318