Codebreakers Attack On Bank Sepah
   HOME





Codebreakers Attack On Bank Sepah
The Codebreakers attack on Iranian Bank Sepah was a major cyber intrusion publicly disclosed in March 2025. A hacker collective known as "Codebreakers" claimed responsibility for breaching Sepah Bank, one of Iran's oldest and most strategically significant financial institutions. The group alleged it had accessed over 42 million customer records, including sensitive financial data. The incident followed the IRLeaks attack in 2024, and the cyber attack on the Melli Bank in 2021, and as a result the vulnerabilities of Iran's financial infrastructure were exposed, causing widespread criticism against the bank and its affluent customers from the military and government sectors. The bank initially responded with a complete denial of the breach, while simultaneously issuing warnings to local media against publishing the leaked data and threatening with legal prosecution. The hacker group responded with partial exposure of the leaked information, including the financial data of senio ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cyberattack
A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and interconnected computer systems in most domains of life is the main factor that causes vulnerability to cyberattacks, since virtually all computer systems have bugs that can be exploited by attackers. Although it is impossible or impractical to create a perfectly secure system, there are many defense mechanisms that can make a system more difficult to attack, making information security a field of rapidly increasing importance in the world today. Perpetrators of a cyberattack can be criminals, hacktivists, or states. They attempt to find weaknesses in a system, exploit them and create malware to carry out their goals, and deliver it to the targeted system. Once installed, the malware can have a variety of effects depending on its purpose. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  



MORE