Security

Cyber-crime

Feds charge 3 Iranians with 'hack-and-leak' of Trump 2024 campaign

Snoops allegedly camped out in inboxes well into September


The US Department of Justice has charged three Iranians for their involvement in a "wide-ranging hacking campaign" during which they allegedly stole massive amounts of materials from Donald Trump's 2024 presidential campaign and then leaked the information to media organizations.

The 18-count indictment [PDF], unsealed on Friday, accuses Masoud Jalili, Seyyed Ali Aghamiri, and Yasar Balaghi with multiple crimes, including wire fraud, identity theft, conspiracy to provide material support to a terrorist organization, and conspiracy to compromise computer systems.

All three are allegedly members of Iran's Islamic Revolutionary Guard Corps (IRGC), and have been accused of using "spear phishing and social engineering techniques to target and compromise the accounts of current and former US government officials, members of the media, non-governmental organizations, and individuals associated with US political campaigns," according to the court documents.

'Kremlin agents' hacked, leaked Hillary's emails

FLASHBACK

In May, after "several years" of compromising US government officials' email accounts, the Tehran-backed trio gained access to the personal inboxes of people working for a "US presidential campaign," the indictment alleges.

They then used this unauthorized access to steal "non-public campaign documents and emails," and by June began leaking these purloined papers to members of the media and the Biden campaign, it is claimed. Politico, The New York Times, and The Washington Post were offered pilfered documents to publish, and declined to do so.

While the court documents don't name any of the campaign-related victims of this alleged "hack-and-leak operation," it's clear from earlier reporting and the FBI's previous advisory that "US Presidential Campaign 1" is Team Trump. The campaign-related victims whose personal email accounts were compromised, according to the indictment, are:

As recently as this month, the Iranians seemingly still had a presence in these compromised inboxes, according to the court documents. There is also separate evidence that intruders were still within the Trump campaign's email accounts this month.

According to the Feds, the stolen campaign documents included "debate preparation materials, materials regarding US Presidential Campaign 1's potential vice-presidential candidates, and email communications with US Victim 14," which is the former State Department official. This also seems to indicate the recently leaked JD Vance dossier was included in the stolen goods offered to various journos.

That dossier is a 271-page opposition research file on Vance, which was published by an independent journalist on his website after obtaining the document.

Incidentally, Elon Musk's X (formerly Twitter) has blocked links to that leak and suspended the account of the journo. We note that after social networks halted the spread of the New York Post's story in 2020 about the contents of Hunter Biden's laptop, Musk in 2022 tweeted: "Suspending the Twitter account of a major news organization for publishing a truthful story was obviously incredibly inappropriate."

Back on track, in a call with reporters today, the FBI declined to comment when your vulture asked agents to confirm that the JD Vance papers were among those stolen and leaked by the Iranians.

And when asked how sure the US government is that the Iranians are off the networks and out of email inboxes of US political candidates, a senior FBI official told us: "You can never be fully confident that you have eradicated them from an environment, and so we remain fully engaged with the victims in this case, which include presidential campaigns as well as individuals associated with those campaigns."

'Brazen behavior'

"Today's charges," FBI Director Christopher Wray said separately in a video statement, "represent the culmination of a thorough and long-running FBI investigation that has resulted in the indictment of three Iranian nationals for their roles in a wide-ranging hacking campaign sponsored by the government of Iran.

"The conduct laid out in the indictment is just the latest example of Iran's brazen behavior. So today the FBI would like to send a message to the government of Iran – you and your hackers can't hide behind your keyboards."

In addition to the criminal charges, the State Department has offered a $10 million reward for information about the three Iranian men, and the Treasury Department released new sanctions targeting seven individuals linked to the hacking effort. ®

Send us news
12 Comments

Brazen crims selling stolen credit cards on Meta's Threads

The platform 'continues to take action' against illegal posts, we're told

Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

Attacks on unprotected servers reach 'critical level'

Gang gobbles 15K credentials from cloud and email providers' garbage Git configs

Emeraldwhale looked sharp – until it made a common S3 bucket mistake

Uncle Sam outs a Russian accused of developing Redline infostealing malware

Or: why using the same iCloud account for malware development and gaming is a bad idea

Feds investigate China's Salt Typhoon amid campaign phone hacks

'They're taunting us,' investigator says and it looks like it's working

JPMorgan Chase sues scammers following viral 'infinite money glitch'

ATMs paid customers thousands ... and now the bank wants its money back

Ransomware's ripple effect felt across ERs as patient care suffers

389 US healthcare orgs infected this year alone

Would banning ransomware insurance stop the scourge?

White House official makes case for ending extortion reimbursements

Wanted. Top infosec pros willing to defend Britain on shabby salaries

GCHQ job ads seek top talent with bottom-end pay packets

Biz hired, and fired, a fake North Korean IT worker – then the ransom demands began

'My webcam isn't working today' is the new 'The dog ate my network'

Critical hardcoded SolarWinds credential now exploited in the wild

Another blow for IT software house and its customers

Just how private is Apple's Private Cloud Compute? You can test it to find out

Also updates bug bounty program with $1M payout