• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 

Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant

 | 

U.S. CISA adds MRLG, PHPMailer, Rails Ruby on Rails, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

 | 

IT Worker arrested for selling access in $100M PIX cyber heist

 | 

New Batavia spyware targets Russian industrial enterprises

 | 

Taiwan flags security risks in popular Chinese apps after official probe

 | 

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

 | 

Hunters International ransomware gang shuts down and offers free decryption keys to all victims

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

 | 

Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates

 | 

Critical Sudo bugs expose major Linux distros to local Root exploits

 | 

Google fined $314M for misusing idle Android users' data

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Hacking
  • Security
  • Hackers hit International Atomic Energy Agency (IAEA) agency

Hackers hit International Atomic Energy Agency (IAEA) agency

Pierluigi Paganini November 29, 2012

Another victim of cyber attacks, the UN nuclear agency International Atomic Energy Agency (IAEA) has confirmed that one of its servers was compromised by a group of hackers who claims to be anti-Israeli.

The group of hackers who named itself Parastoo Farsi have exposed contacts for more than 100 nuclear experts and scientists, the word Parastoo is Farsi and referes a bird species like the  swallow and an Iranian girl’s name.

The agency reported that data breach is related to “some contact details related to experts working” with the agency”, fortunately data doesn’t include information related to confidential work carried out by the IAEA.

An agency spokesman Gill Tudor declared that the agency is working to find and fix the vulnerability exploited during the attack.

“The IAEA deeply regrets this publication of information stolen from an old server that was shut down some time ago,” “deeply regrets this publication of information stolen from an old server”.”The IAEA’s technical and security teams are continuing to analyze the situation and do everything possible to help ensure that no further information is vulnerable,”

Why the hackers have hit the agency?

The main subject of the dispute between the U.S., Israel and Western countries with Iran is developing of the atomic program by the government in Tehran. Israel and the United States accused Iran to develop a nuclear weapons capability, due this reason they consider Iran a serious threat for worldwide peace. Tehran always denied any accusation and is continuing development of the program for uranium enrichment declaring civil purposes, and excluding military operations.

The IAEA agency is the organism that is investigating on Iran’s nuclear program and according the group of hackers its analysis isn’t impartial, Israel is widely believed to have nuclear arsenal but no government has conducted further investigations on its nuclear armament. Recently the IAEA published a report that states that Iran was ready to double the output at its underground uranium enrichment facility at Fordo, and the agency was unable to conclude that all nuclear material in was for civil use.

“While the Agency continues to verify the non-diversion of declared nuclear material at the nuclear facilities and LOFs declared by Iran under its Safeguards Agreement, as Iran is not providing the necessary cooperation, including by not implementing its Additional Protocol, the Agency is unable to provide credible assurance about the absence of undeclared nuclear material and activities in Iran, and therefore to conclude that all nuclear material in Iran is in peaceful activities.”

The finality to expose the names of the researchers is to sensitize them to sign a petition calling for an IAEA investigation also on Israeli nuclear weapons program. The hackers invited the agency to investigate on activities done in the nuclear facility located in the city of Dimona that is assumed to be a nuclear weapons manufacturing plant. Following a piece extrapolated from the claim of the group:

2.FLYING OVER DIMONA

ISRAEL OWNS A PRACTICAL NUCLEAR ARSENAL , TIED TO A GROWING MILITARY BODY AND IT IS NOT A MEMBER OF INTERNATIONALLY RESPECTED NUCLEAR , BIOCHEMICAL AND CHEMICAL AGREEMENTS . WITH A HISTORY OF ATTACKING U.S PROPERTIES , ARAB COUNTRIES AND ASSASSINATION EPISODES OF ALL STRIPS ( PLUS SUPPOSEDLY-FAKE PASSPORTS THAT APPARENTLY WORK BETTER THAN THE REAL ONES ) , PARASTOO DECIDED TO ASK ITS VERY FIRST QUESTION FROM A NICE 161.5.7.253 AT VIENNA . FOLLOWING PERSONAS WERE FOUND IN REACH :

……………………………………………………………..

WE ASK THESE INDIVIDUALS TO SIGN A PETITION DEMANDING AN OPEN IAEA INVESTIGATION INTO ACTIVITIES AT DIMONA . WE WOULD LIKE TO ASSERT THAT WE HAVE EVIDENCES SHOWING THERE ARE BEYOND-HARMFUL OPERATIONS TAKING PLACE AT THIS SITE AND THE ABOVE LIST WHO TECHNICALLY HELP IAEA COULD BE CONSIDERED A PARTNER IN CRIME SHOULD AN ACCIDENT HAPPEN THERE . IN SUCH CASE , MANY PEOPLE WOULD LIKE TO AT LEAST ASK SOME QUESTIONS AND PARASTOO WILL PUBLISH WHEREABOUTS OF EVERY SINGLE ONE OF THESE INDIVIDUALS ALONGSIDE WITH BITS OF HELPFUL PERSONAL AND PROFESSIONAL DETAILS .

The incident comes few days after the decision of the European Commission to supports research on cyber security, event like this, despite hasn’t had serious consequences, could can cause dangerous damage. Data breach could reveal sensible information and stolen data that could be used for further attacks against critical infrastructures.

The cyber security is a primary goal for European cyber strategy and it is fundamental the political and economic support to research and operative operations to predict, detect and mitigate cyber threats coming from the cyberspace.

Pierluigi Paganini


facebook linkedin twitter

data breach European Commission Hackers Hacking IAEA Iran Iranian nuclear program Israel US

you might also like

Pierluigi Paganini July 10, 2025
PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda
Read more
Pierluigi Paganini July 09, 2025
Nippon Steel Solutions suffered a data breach following a zero-day attack
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    UK NCA arrested four people over M&S, Co-op cyberattacks

    Cyber Crime / July 10, 2025

    PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

    Hacking / July 10, 2025

    Qantas data breach impacted 5.7 million individuals

    Data Breach / July 10, 2025

    DoNot APT is expanding scope targeting European foreign ministries

    APT / July 10, 2025

    Nippon Steel Solutions suffered a data breach following a zero-day attack

    Data Breach / July 09, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT