Nader Saedi

Wrote computer scripts used to locate and exploit vulnerable servers to help build the Mersad Co. botnet used in the attacks

Status:Top Alert – Entity designated / sanctioned for terror, WMD and human rights violation

Risk Level:99%

May harm your business future. Persons or entities that engage in transactions with this entity will be exposed to sanctions or subject to an enforcement action.

Working with this entity means supporting Iranian Regime, Regime Terrorist Activities & development of WMD

Info:
Nader Saedi is wanted for his alleged involvement in a conspiracy to conduct a coordinated campaign of distributed denial of service (“DDoS”) attacks against the United States financial sector and other United States companies from 2012 through 2013. Saedi was an employee of Mersad, a private computer security company that performed work on behalf of the Iranian Government, and a former member of the Iran-based computer hacking group Sun Army. He is a self-proclaimed expert in DDoS attacks who allegedly wrote the computer scripts that Mersad used to identify and compromise vulnerable web servers. These servers were later used as bots in the Kamikaze botnet attack;

On January 21, 2016, a grand jury in the United States District Court, Southern District of New York, indicted Saedi for his alleged involvement in the scheme and a federal warrant was issued for his arrest after he was charged with conspiracy to commit, and aid and abet, computer intrusion;

Also Known As:
ahersaedi;
turk_server;
turkserver

Country:
Iran

Born:
22 Feb 1990

Reason for the color:
» Wanted by the FBI;
» Added to the Specially Designated Nationals (SDN) list maintained by the Treasury Department’s Office of Foreign Assets Control (OFAC), freezing his assets under U.S. jurisdiction and prohibiting transactions with U.S. parties, pursuant to Executive Order 13694, for causing a significant disruption to the availability of a computer or network of computers;