Monday, June 30, 2025
banner


Nobitex, the largest Iranian exchange of cryptourcture, suffered the Great Hack 18. June. Elliptic has so far identified over $ 90 million sent from Nobetex wallet on address hackers.

Comes after pro-Israeli hacker groups Gonnjeshke Daranda (“Grabovac Vrabaljka”) issued a warning He claims that with Nobitex, I have implemented Cyberattacks and commit to publish his original code 18. June. The Nobitex Web site remains inaccessible at the time of writing.

The Group associated with Israel also claimed responsibility for the LHAKE targeting, in the state Iranian bank, a day before.

WARNING Published with predatory reversing on X.

Although there is still no confirmation that funds are moved by predatory reverse, Hack seems to be motivated by the recent escalation of tension between Israel and Iran. Most addresses currently held hacked funds are vanities, contain some variations of the term “F * ckirgctrorists” within its public key.

The Elliptical Researcher below shows the funds sent to these vanities in a series of blockchch and assets.

Nobitex Hack

“IRGC” refers to the Islamic revolutionary corpus, a separate military entity Iranian army. It was sanctioned and appointed as a terrorist group with various jurisdictions, including the United States, Canada, Great Britain and the European Union.

Hack appears to not be financially motivated. Asphalt vanities that use hackers are generated through the “rough force” method – including the creation of a large number of cryptographic key pairs until one contains the desired text. But by creating vasitive addresses with text wires as long as those used in this haku account are calculated inomless.

This means that predatory sparrow would not have private keys for the writing addresses that have sent financial funds and effectively burn funds* To send a nobitex political message.

The Nobitex website, which was inaccessible after Hack.

IRGC and Nobitex

Being an Iran primary crypton exchange with a request for over 7 million users, Nobitex is in the past associated with Irang and Iranian government data in the past. Open Code investigations They identified the relatives of the Supreme Leader but Khamenei and business partners associated with IRGC as connected to NOBITEX.

Elliptic has also identified the use of NOBITEX sanctioned IRGC operators accused of Ransomware Operations and critical infrastructure targeting. The researcher below depicts the writing addresses associated with two such operatives, Ahmad Khatibi Aghada and Amir Hossein Niakeen Ravari, sending Bitcoins to Nobetex accounts.

The American Office for Control of Foreign Assets (OFAC) sanctioned individuals in September 2022. years. They are accused of distributing BitLocker Ransomware and are content in a cyber threat that facilitates the company AFKAR Yazd, of which Khatibi was the director in which Khatibi was the director.

“The [sanctioned] Employees associated with IRGC […] They are responsible for or condolences, directly or indirectly, global targeting of different networks, including critical infrastructure, exploiting well-known vulnerabilities to obtain an initial approach for malignant activities, including purchase operations. “

An edition for the public of the American Treasury that accompanies sanctions, 14. September 2022. years.

Answers only to the Supreme Leader of Iran, not president, IRGC, includes the country’s various sectors, including oil trafficking, which enables it to avoid sanctions and financing the transoxy group in other jurisdictions.

The Elliptical Researcher below shows the not comprehensive choice of interactions on the chain between NOBITEX and the wallets associated with Hamas, Palestinian Islamic jihad and Hutus.

Invisigator_18-Jun-2025 18_11_22_18_jun_2025_18_40

Sanctions observance of the elliptic

The Elliptical Team for Research and Investigations ensured that our tools provide a comprehensive coverage of NOBITEX and other Iranian exchange to ensure virtual funds with sanctions targeting the Iran government.

We continue to monitor the development of events regarding the situation in the Middle East so that every new or banded sanctions or the risks of terrorist financing reflect quickly in our tool.

Although the activity is up, we are unlikely, we also marked addresses involved in this hack in our solutions.

You can find out more about sanctions using ElliPtic’s BlockChain analytical solutions through our A practical guide in five steps.

Contact us or make a demo To learn more.

* In case of stolen USD-supported stabilities, the basic USD that supports tokens is not destroyed, but still keeps its publisher.

Found this interesting? Share in your network.



banner
crypto & nft lover

Johnathan DoeCoin

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar.

Follow Me

Top Selling Multipurpose WP Theme

Newsletter

banner

Leave a Comment

crypto & nft lover

John DoeCoin

Learn all about cryptocurrency and NFT, we publish news and interesting fauths from the world of crypto.

@2022 u2013 All Right Reserved. Designed and Developed by Evegal.com