• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Microsoft uncovers macOS flaw allowing bypass TCC protections and exposing sensitive data

 | 

U.S. CISA adds Cisco ISE and PaperCut NG/MF flaws to its Known Exploited Vulnerabilities catalog

 | 

Critical WordPress Post SMTP plugin flaw exposes 200K+ sites to full takeover

 | 

Scattered Spider targets VMware ESXi in using social engineering

 | 

China-linked group Fire Ant exploits VMware and F5 flaws since early 2025

 | 

Allianz Life data breach exposed the data of most of its 1.4M customers

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

 | 

Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

 | 

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

 | 

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

 | 

Stealth backdoor found in WordPress mu-Plugins folder

 | 

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

 | 

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Hacking
  • Security
  • Hackers hit International Atomic Energy Agency (IAEA) agency

Hackers hit International Atomic Energy Agency (IAEA) agency

Pierluigi Paganini November 29, 2012

Another victim of cyber attacks, the UN nuclear agency International Atomic Energy Agency (IAEA) has confirmed that one of its servers was compromised by a group of hackers who claims to be anti-Israeli.

The group of hackers who named itself Parastoo Farsi have exposed contacts for more than 100 nuclear experts and scientists, the word Parastoo is Farsi and referes a bird species like the  swallow and an Iranian girl’s name.

The agency reported that data breach is related to “some contact details related to experts working” with the agency”, fortunately data doesn’t include information related to confidential work carried out by the IAEA.

An agency spokesman Gill Tudor declared that the agency is working to find and fix the vulnerability exploited during the attack.

“The IAEA deeply regrets this publication of information stolen from an old server that was shut down some time ago,” “deeply regrets this publication of information stolen from an old server”.”The IAEA’s technical and security teams are continuing to analyze the situation and do everything possible to help ensure that no further information is vulnerable,”

Why the hackers have hit the agency?

The main subject of the dispute between the U.S., Israel and Western countries with Iran is developing of the atomic program by the government in Tehran. Israel and the United States accused Iran to develop a nuclear weapons capability, due this reason they consider Iran a serious threat for worldwide peace. Tehran always denied any accusation and is continuing development of the program for uranium enrichment declaring civil purposes, and excluding military operations.

The IAEA agency is the organism that is investigating on Iran’s nuclear program and according the group of hackers its analysis isn’t impartial, Israel is widely believed to have nuclear arsenal but no government has conducted further investigations on its nuclear armament. Recently the IAEA published a report that states that Iran was ready to double the output at its underground uranium enrichment facility at Fordo, and the agency was unable to conclude that all nuclear material in was for civil use.

“While the Agency continues to verify the non-diversion of declared nuclear material at the nuclear facilities and LOFs declared by Iran under its Safeguards Agreement, as Iran is not providing the necessary cooperation, including by not implementing its Additional Protocol, the Agency is unable to provide credible assurance about the absence of undeclared nuclear material and activities in Iran, and therefore to conclude that all nuclear material in Iran is in peaceful activities.”

The finality to expose the names of the researchers is to sensitize them to sign a petition calling for an IAEA investigation also on Israeli nuclear weapons program. The hackers invited the agency to investigate on activities done in the nuclear facility located in the city of Dimona that is assumed to be a nuclear weapons manufacturing plant. Following a piece extrapolated from the claim of the group:

2.FLYING OVER DIMONA

ISRAEL OWNS A PRACTICAL NUCLEAR ARSENAL , TIED TO A GROWING MILITARY BODY AND IT IS NOT A MEMBER OF INTERNATIONALLY RESPECTED NUCLEAR , BIOCHEMICAL AND CHEMICAL AGREEMENTS . WITH A HISTORY OF ATTACKING U.S PROPERTIES , ARAB COUNTRIES AND ASSASSINATION EPISODES OF ALL STRIPS ( PLUS SUPPOSEDLY-FAKE PASSPORTS THAT APPARENTLY WORK BETTER THAN THE REAL ONES ) , PARASTOO DECIDED TO ASK ITS VERY FIRST QUESTION FROM A NICE 161.5.7.253 AT VIENNA . FOLLOWING PERSONAS WERE FOUND IN REACH :

……………………………………………………………..

WE ASK THESE INDIVIDUALS TO SIGN A PETITION DEMANDING AN OPEN IAEA INVESTIGATION INTO ACTIVITIES AT DIMONA . WE WOULD LIKE TO ASSERT THAT WE HAVE EVIDENCES SHOWING THERE ARE BEYOND-HARMFUL OPERATIONS TAKING PLACE AT THIS SITE AND THE ABOVE LIST WHO TECHNICALLY HELP IAEA COULD BE CONSIDERED A PARTNER IN CRIME SHOULD AN ACCIDENT HAPPEN THERE . IN SUCH CASE , MANY PEOPLE WOULD LIKE TO AT LEAST ASK SOME QUESTIONS AND PARASTOO WILL PUBLISH WHEREABOUTS OF EVERY SINGLE ONE OF THESE INDIVIDUALS ALONGSIDE WITH BITS OF HELPFUL PERSONAL AND PROFESSIONAL DETAILS .

The incident comes few days after the decision of the European Commission to supports research on cyber security, event like this, despite hasn’t had serious consequences, could can cause dangerous damage. Data breach could reveal sensible information and stolen data that could be used for further attacks against critical infrastructures.

The cyber security is a primary goal for European cyber strategy and it is fundamental the political and economic support to research and operative operations to predict, detect and mitigate cyber threats coming from the cyberspace.

Pierluigi Paganini


facebook linkedin twitter

data breach European Commission Hackers Hacking IAEA Iran Iranian nuclear program Israel US

you might also like

Pierluigi Paganini July 29, 2025
Microsoft uncovers macOS flaw allowing bypass TCC protections and exposing sensitive data
Read more
Pierluigi Paganini July 28, 2025
U.S. CISA adds Cisco ISE and PaperCut NG/MF flaws to its Known Exploited Vulnerabilities catalog
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Microsoft uncovers macOS flaw allowing bypass TCC protections and exposing sensitive data

    Hacking / July 29, 2025

    U.S. CISA adds Cisco ISE and PaperCut NG/MF flaws to its Known Exploited Vulnerabilities catalog

    Security / July 28, 2025

    Critical WordPress Post SMTP plugin flaw exposes 200K+ sites to full takeover

    Security / July 28, 2025

    Scattered Spider targets VMware ESXi in using social engineering

    Cyber Crime / July 28, 2025

    China-linked group Fire Ant exploits VMware and F5 flaws since early 2025

    Hacking / July 28, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT