Iran-linked hackers breach FBI Director Kash Patel’s personal email, publish documents online

Iran-linked hackers breach FBI Director Kash Patel’s personal email, publish documents online

The hacker community, Handala Hack Team, launched on their web space that Patel “will now get his identify among the many checklist of efficiently hacked victims.”

Iran-linked hackers beget claimed responsibility for breaching the non-public inbox of FBI Director Kash Patel, posting photos of the director and utterly different sensitive paperwork on the web, in step with a Reuters document.

The hacker community, Handala Hack Team, launched on their web space that Patel “will now get his identify among the many checklist of efficiently hacked victims.”

A Justice Division legitimate confirmed that Patel’s electronic mail had indeed been compromised and said the topic topic published on-line regarded legitimate.

STORY CONTINUES BELOW THIS AD

Handala, which describes itself as a legitimate-Palestinian vigilante hacking community, is believed by Western researchers to be one of loads of on-line personas stale by Iranian govt cyberintelligence objects.

More from World

Three weeks in, Iran war slips beyond Trump’s control as escalation outpaces exit strategy

West Asia peace plan: From US to Iran, who wants what?

The community currently claimed responsibility for breaching Michigan-primarily based mostly medical devices and companies and products provider Stryker on March 11, striking forward that it had deleted a immense quantity of firm data.

Whereas Reuters could well no longer independently verify the authenticity of the emails from  Patel, the Gmail address Handala said it accessed suits one linked with Patel in prior data breaches documented by dark web intelligence company District 4 Labs.

A evaluate of the topic topic posted by the hackers reveals a combination of non-public and legitimate correspondence, courting from 2010 to 2019.

With inputs from agencies

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top