The U.S. Department of Justice announced a breakthrough, unsealing an indictment that charges three Iranian nationals—Masoud Jalili, Seyyed Ali Aghamiri, and Yaser Balaghi—who are linked to the Islamic Revolutionary Guard Corps (IRGC) with hacking attempts aimed at undermining the U.S. election process.
According to the indictment, these individuals, referred to as “the Conspirators,” orchestrated a widespread hacking campaign targeting U.S. government officials, members of the media, NGOs, and people connected to U.S. political campaigns. The attacks were part of Iran’s long-running efforts to sow distrust in the U.S. electoral system and gather sensitive information for the IRGC.
The indictment outlines how the conspirators specifically aimed at individuals involved with a U.S. presidential campaign (referred to as U.S. Presidential Campaign 1) earlier this year. They allegedly stole internal campaign documents and emails, broadening their operation in June to launch a “hack-and-leak” attack. Their goal was to disseminate the stolen information, targeting the media and another U.S. presidential campaign (U.S. Presidential Campaign 2) in an attempt to weaken their opposition ahead of the 2024 election.
Attorney General Merrick B. Garland emphasized the seriousness of the allegations, stating, “The Justice Department is working relentlessly to uncover and counter Iran’s cyberattacks aimed at stoking discord, undermining confidence in our democratic institutions, and influencing our elections.” Garland was adamant that foreign powers like Iran will not decide the outcome of American elections.
The FBI, which led the investigation, highlighted the audacity of these actions. FBI Director Christopher Wray warned, “Iran’s brazen behavior won’t go unchecked. The FBI will continue to work tirelessly to protect our democratic processes and send a clear message to foreign adversaries: you can’t hide behind a keyboard.”
The indictment details the use of spearphishing, fake login pages, and social engineering tactics to steal credentials and gain unauthorized access to victims’ accounts. The group also utilized sophisticated techniques, such as spoofed email addresses and virtual private networks (VPNs), to cover their tracks. While some of their efforts were successful, many others were not.
Assistant Attorney General Matthew G. Olsen stressed the importance of defending the integrity of the democratic process. “Iranian government actors have long used cyber-enabled means to harm U.S. interests. This case is proof of our commitment to exposing any foreign interference in our free and open society,” Olsen said.
This effort to interfere with the upcoming 2024 election isn’t Iran’s first attempt. The IRGC has a history of targeting U.S. officials and campaigns as part of broader efforts to influence U.S. foreign policy and sow domestic discord. The group has also targeted individuals responsible for U.S. policies in the Middle East, including those tied to the death of Qasem Soleimani, the former commander of the IRGC’s Qods Force.
The three accused—Jalili, Aghamiri, and Balaghi—are facing multiple charges, including identity theft, wire fraud, and providing material support to a foreign terrorist organization. Each of these charges could result in decades of prison time if they are convicted. Alongside the charges, the U.S. Department of State announced a reward of up to $10 million for any information leading to the capture of the accused individuals.
This case sends a strong message: the Justice Department and the FBI are determined to hold foreign actors accountable for attempts to compromise U.S. elections. Through collaboration with private companies like Google, Microsoft, Yahoo, and Meta, the U.S. government is making it clear that foreign interference will be met with swift action and accountability.
The investigation is ongoing, and the Justice Department has reaffirmed its commitment to protect the U.S. from any future cyberattacks aimed at undermining its democratic institutions.
Bijay Pokharel
Related posts
Subscribe
Cybersecurity Newsletter
You have Successfully Subscribed!
Sign up for cybersecurity newsletter and get latest news updates delivered straight to your inbox. You are also consenting to our Privacy Policy and Terms of Use.