: Kheshtak Security Team
Kheshtak Security Team

Kheshtak Security Team - Story Continues

: Kheshtak Security Team
Kheshtak Security Team

More than ever in the 21st century, knowledge is power and information is the force that controls markets and drives the global economies. Fortunes are made with technology and ideas spread like wild fire in minutes in an interconnected world. Ideas help group people together with shared goals, borders do not exist. We are Iranian, we love each other and our country. We do everything we can to help our fellow Iranians become more than we were. When I need to learn something, hundreds of fellow Iranians are always on call to lend a helping hand.
I am glad to see that my fellow Iranians have received the proper credit for their hard work. I firmly believe that you should be proud of your accomplishments, especially when you have achieved such greatness. Everyday brings new challenges and my brothers are constantly working hard to meet them.

Mehdi Mahdavi

Iranian-based hackers' capability seems to be catching up to their ambitions. Personally, the end goal is what matters to me, elegance is nice but not necessary. A perfect example is the work of Mehdi Mahdavi and rocket kitten. Before I start, I need to say that there is a lot of varying opinions of how sophisticated his work is....what matters to me is that it worked and achieved his end result.

 

Mehdi Mahdavi

Mehdi Mahdavi

Mehdi Mahdavi was born on August 2, 1987 and currently lives in Tehran, Iran. He studied at the Islamic Azad University. Mehdi Mahdavi is apart of Rocket Kitten and he has been closely affiliated with Yaser Balaghi. Rocket Kitten has conducted two campaigns. One of them, involved spear-phishing emails designed to distribute a piece of malware called GHOLE. The threat, which is a modified version of a legitimate penetration testing tool from Core Security, gives attackers remote access to the infected machine and the target’s corporate network. The second campaign is far more sophisticated. The operation, dubbed “Woolen-GoldFish,” is most likely a state-sponsored campaign per Trend Micro.

They seems to be particularly interested in the defense industry, government entities, the IT sector, and academic organizations. Based on the contents of the files attached to the spear-phishing emails, researchers believe the attackers have targeted civilian and academic organizations in Israel, German-speaking government organizations, and public and private organizations in Europe.

There is a good detailed video from the 31st Chaos Communication Congress of the Chaos Computer Club. Based on his registered domains his contact emails are [email protected] and [email protected].

Medhi Bito

Mehdi Bito

Mehdi Bito

Net Hunter whose real name is Medhi Bito was born on 8/15/1981, he currently goes by the hacker moniker NET.HUN73R. He is active on numerous Iranian hacking forums but is a moderator and team member of the Black Hat Group. On the Black Hat Group, he has made 347 posts making up 2% of all posts made by 9,530 people. The only person that posts more than he does is the admin and leader of the team Net.Edit0r. He does actively defaces sites under the Underground Security Team and is regulatory thanked or acknowledged on IEDB hacks and defacement. Based on his vCard, his email is [email protected]. It is difficult to say how many hacks he has due to his involvement with so many teams and forums but he is very accomplished and that is very evident due to digital signature. Ashiyane -BHG- Iran CyberIran Security TeamFatehgarCrypter -IEDBIDCTarfandestan. The list easy goes on, he is young and loves what he does.

Moslem Haghighian

Moslem Aloned/Moslem Haghighian

Moslem Aloned/Moslem Haghighian

Moslem Aloned whose real name is Moslem Haghighian was born on November 23, 1989, he goes by the hacking moniker L4tr0d3ctism and currently lives in Sanandaj, Iran. He has authered numerous papers and they are all very detailed and worth a read. Most people consume content, he creates it for his fellow Iranians. His Persiangig digtal locker is filled with tools, documents, tutorials, maleware, and viruses for testing. He is mostly affilited with Iedb.ir but has accounts with Ashiyane and the Black Hat Group. In regards to IEDB, there doesnt seem to be an exploit that doesnt thank or acknowledge him. According to his Linkedin profile he has been hacking since he was born so saying hacking is in his blood is an understatement. His emails are [email protected], [email protected] and [email protected].

Sasan Ahmadi

Sasan Ahmadi

Sasan Ahmadi

Sasan Ahmadi was born on March 25th, 1990, he lives in Tehran, Iran and goes by the hacking monikers wanted2011 and pariskocholo. He is very active on Ashiyane with 833 posts. His emails are [email protected] and [email protected]. He has a lot of hacked and defaced sites but he does not take credit for the majority of them instead his team takes credit. His other forum affiations include the IDC-Team, and the Black Hat Group.

Ghader Ahmadi

Ghadar Ahmadi Didehban

Ghadar Ahmadi Didehban

Ghader Ahmadi full name Ghader Ahmadi Didehban goes by the hacking moniker gh4d3r. He originally studied civil engineering but found his true calling in information security, networking, programming. His current concetrations are forensics, ICS-SCADA, protocol securing and reverse engineering. He has a very impressive knowledge set that has clearly taken a lot of time and passion to accomplish. He is constantly posting books and tutorials on many sites including facebook. His email is [email protected] and also uses the forum moniker of amdi68. I think his cover photo explains him perfectly, he has a Steve Job qoute that states "The only way to do great work is to love what you do"....and he clearly does.

Mostafa Jafari

Mostafa Jafari

Mostafa Jafari

Mostafa Jafari was born on May 2nd, 1993, he currently lives in Rasht, Iran and goes by the hacking monikers Sha2w and Sha2walker. He is an active member of the Ashiyane regularly posting and working with fellow members. His passion seem to be eqaully devided between hacking and martial arts. He is a Hydrolic Engineeri, Programmer and Sensei with Hyo Masayushi. His email is [email protected].

According to Senator Dianne Feinstein while discussing our Iranian brothers she stated that the “Financial losses from cyber attacks are approaching $1 trillion a year....". Iranian hackers are getting smarter, and we are using sophisticated hacking schemes and methods to accomplish our goals. We have infiltrated computer networks of some of the world's top organizations including airlines, defense contractors, universities, military installations, hospitals, airports, telecommunications firms, government agencies, and energy and gas companies. We have created custom software to hack critical infrastructure and highly sensitive, confidential information from our victims.

Iranian hacking group have collected a lot of information so far, massive databases of user credentials and passwords, diagrams, and screenshots from organizations, companies and governments. We are just getting started, our history and culture span millenia. Our blood runs thick and our memories are forever. We are working together to accomplish our shared goals.

See also our first article on the Kheshtak Security Team here where we talked about the following Kheshtak team members: Hesam Bazvand, Meqdad Mohamadi, Amir Moosavi, Mohammad Reza Espargham, Dariush Nasipour and Mohamad Jorjandi.

Article rating:

vote(s).

0 Comments

Write a Comment

:
Hosein)root Discovers XSS Vulnerability on Google Earth

On 25 November Hosein)root who asked ICNA publish his true name as Amir Hossein Sharbati on CX...


0 Comments | Read more +
:
35/000 Characters Tweet Shocks German Hackers!

Thinking that a person could send a tweet with more than 280 characters is more or less like a...


0 Comments | Read more +
:
4TT4CK3R Identifies Flaw in University of Tehran Website

Vulnerability researcher 4TT4CK3R discovered on 23 August a cross-ste scripting vulnerability ...


0 Comments | Read more +
: 4tt4ck3r Find Vuln In United Kingdom Government
4tt4ck3r Finds Flaw in UK Government Websites

Iranian hacker 4tt4ck3r has previously found Reflected XSS -Cross Site Script...


0 Comments | Read more +
: TYRANT Ransomware
Iranian TYRANT Ransomware

A new type of ransomware have been discovered on October 16 2017 which appear...


0 Comments | Read more +
: IoT Security Research Expertise
Iranian Expertise in IoT Security Research

Iranian academic security researchers at the ITRC (Information Technology Research Cen...


0 Comments | Read more +
: Mohammad Rezania -LinX64-
Android Security and Forensic Science by LinX64

A good article by Iranian academic is important step forward for people to understand security...


0 Comments | Read more +
: http://offsec.ir/writeups
OFFSEC Team Ice CTF Results

Offsec Research CTF Team: "Thinking out of t...


0 Comments | Read more +
:
Defacement of Hafez Institute of Higher Education by UnSec Team

ICNA was contacted yesterday, 19 October, by UnSec Team member Mostafa Asadi concerning the ha...


0 Comments | Read more +
:
Manoto Defaced by Cluwix

We can see in the picture that website of Manoto TV show "Stage" was hacked by Black Hat Hacke...


0 Comments | Read more +
: Eagle Security Team
Eagle Security Team Deface Shahrood University of Technology

MR 7KH4T of Iranian hacking group Eagle Security Team is mak...


0 Comments | Read more +
: MR.IMAN
Iranian Black Hat Hackers Mass Deface Iran Sites

Hackers of the team Iranian Black Hat Hackers has make deface of many Iranian...


0 Comments | Read more +
: Iranian Cyber News Agency
New Website

Welcome to Iranian Cyber News Agency website.

New sections now include Vulnerability N...


0 Comments | Read more +
خبرگزاری سایبر ایران

در ب...


0 Comments | Read more +
:
SMS Virus Developed by Iranian Hacker Claims 100/000 Victims in Iran

In recent weeks a story that has attracted attention of many people has been the development a...


0 Comments | Read more +
: Atash Security Group
Atash Security Group Attack Irancell

The hacker and administrator Omid Killer of the Iranian hacker group ...


0 Comments | Read more +
: Eagle Security Team
Eagle Security Team Hack Saudi Sites

Latest Iranian cyber news from the Eagle Security Team shows that hackers hav...


0 Comments | Read more +
: Lord Hacking Team
Lord Hacking Team Attack Google Telegram & Acunetix

Iranian hackers of Lord Hacking Team is claim attack against:

  • ...

0 Comments | Read more +
Twitter: Twitter Message
Hackers Take Down Mahan Air Website

It can be seen from Twitter posts that website of Mahan Air was hacked by Iranian group XileRe...


0 Comments | Read more +
U.S-INDICTED MABNA GROUP DIRECTED BY MINISTRY OF INTELLIGENCE

Previous, ICNA has reported on U.S. indictments and accusations of Iranian hackers and other c...


0 Comments | Read more +
A Vaccination Called Filtering

We took this text from the Telegram Channel of Iran Security Team Official Channel (


0 Comments | Read more +
:
Iranian Hackers Accused of Attack on U.K. Parliament

In the last day we have seen that UK government has accused Iranian hackers of attacking the e...


0 Comments | Read more +
:
IEDB Holds Gatherings Nationwide

In recent weeks and months users and friends of the hardworking IEDB team which has very activ...


0 Comments | Read more +
: Eagle Security Team
Eagle Team

The Iranian Eagle Security Team security researchers is make exposed many SQL...


0 Comments | Read more +
: Kheshtak Security Team
Kheshtak Security Team - Story Continues

More than ever in the 21st century, knowledge is power and information is the force that contr...


0 Comments | Read more +
:
Termint Security Team Have New Website

Although they have history going back a few momnths the Termint Security Team...


0 Comments | Read more +