Sayyed Kamal Musavi

Sayyed Kamal Musavi - Top Alert – Entity designated / sanctioned for terror, WMD and human rights violation - Served as a facilitator and operational ...
[+] read full file

Nader Saedi

Wrote computer scripts used to locate and exploit vulnerable servers to help build the Mersad Co. botnet used in the attacks - Top Alert - ...
[+] read full file

Omid Ghaffarinia

Developed malware and computer scripts, which they installed on the compromised computers and computer servers that constituted the Mersad Co. botnet, which allowed for remote ...
[+] read full file

Sina Keissar

Placed malicious computer scripts on compromised computers and computer servers within the Mersad Co. botnet that performed several functions during those DDoS attacks against the ...
[+] read full file

Sadegh Ahmadzadegan

Responsible for managing the Mersad Co. botnet, which was used to target 24 corporations in the U.S. financial sector during DDoS attacks in 2012 and ...
[+] read full file

Hamid Firoozi

Network manager at ITSec Team, procured computer servers for the botnet that ITSec Team used in its DDoS activities targeting the U.S. financial sector - ...
[+] read full file

Amin Shokohi

Wanted for his alleged involvement in a conspiracy to conduct a coordinated campaign of distributed denial of service ("DDoS") attacks against the United States financial ...
[+] read full file

Ahmad Fathi

Ahmad Fathi was responsible for supervising and coordinating ITSec Team’s DDoS attacks against the U.S. financial sector - Top Alert - Designated / Sanctioned / ...
[+] read full file

Alireza Hemmati

Alireza Hemmati - Top Alert – Entity designated / sanctioned for terror, WMD and human rights violation - Hemmati is an IRGC-QF chief for Afghanistan-focused ...
[+] read full file

Seyed Jaber Safdari

Head of the Department of Advanced Technologies at the Atomic Energy Organization of Iran (AEOI) - Top Alert – Entity designated / sanctioned for terror, ...
[+] read full file

Mohammed Reza Rezakhah

Conspiring with others to hack into the network and computers of a United States cleared defense contractor in Vermont in order to steal valuable company ...
[+] read full file