NewsCrypto

Gonjeshke Darande Hackers Burn $90M in Iran Crypto Heist

Gonjeshke Darande Hackers Burn $90M in Iran Crypto Heist
Gonjeshke Darande Hackers Burn $90M in Iran Crypto Heist

Key Points

  • Gonjeshke Darande hacked Nobitex, Iran’s top crypto exchange
  • Nearly $90 million in crypto was stolen and burned
  • The group is allegedly linked to Israeli intelligence
  • Previous attacks include Iran’s banks, steel plants, and railways

Gonjeshke Darande, also known as Predatory Sparrow, is no ordinary hacker group. Allegedly tied to Israel, this shadowy cyber unit has pulled off Iran’s largest crypto heist to date, stealing nearly $90 million from Nobitex, the country’s biggest crypto exchange.

But here’s what makes the attack even more explosive—they didn’t keep the money.

Instead, the hackers burned all the stolen crypto, sending it to “vanity wallets” that can’t be accessed, with wallet names embedded with anti-government messages. This was no money grab—it was a political statement.

For years, Iran has been using crypto to bypass sanctions. This attack, Gonjeshke Darande claimed, was a direct hit on that system.

While Israeli authorities have remained silent, most cybersecurity analysts believe this operation—and others like it—are backed by Israeli intelligence.

This breach adds to the growing list of recent crypto incidents, including the LastPass crypto hack fallout, where attackers leveraged compromised data to steal over $200K in assets.


5 Years of High-Impact Attacks Across Iran

A History of Cyber Sabotage

Gonjeshke Darande has quietly operated for over five years, and Nobitex wasn’t their first target. Their past hits suggest a broader mission: disrupting Iran’s economy and exposing government operations.

  • May 2025 – Bank Sepah Breach
    Just weeks before the Nobitex heist, Gonjeshke Darande targeted Bank Sepah, a state-owned bank. They leaked sensitive financial documents and temporarily shut down services. The attack aimed to highlight how Iran’s state banks may be involved in money laundering and sanctions evasion.

  • October 2022 – Steel Plant Attacks
    They hit Khuzestan, Mobarakeh, and Hormozgan Steel Companies, causing fires and physical damage. The group posted videos online showing the destruction—another public embarrassment for Iranian authorities.

  • July 2021 – Train System Hack
    They paralyzed Iran’s railway systems, delaying trains and posting mock messages on public displays. It was a bold move that proved they could breach even civilian infrastructure at a national scale.

This style of disruptive cyber activity echoes cases like the WhiteRock scam, where alleged founders vanished with millions in investor funds, undermining trust in platforms that appear state-linked or manipulated.

Digital Clues and Political Messaging

What sets Gonjeshke Darande apart is their clear messaging strategy. They don’t just hack—they make a statement.

  • Vanity Wallets with Messages: Wallet addresses used in attacks often spell out anti-regime slogans

  • Polished Videos: Their operations are documented and edited into professional-grade footage

  • Anonymous Channels: They release leaks and updates via Telegram and anonymous websites

These tactics suggest a well-funded, highly organized operation, far beyond the abilities of casual hackers.

Much like the ZKJ Token crash, where token trust collapsed due to questionable governance, Gonjeshke Darande’s work undermines institutional credibility through transparency—albeit by force.

Links to Israeli Intelligence?

While Israel has never confirmed ties, analysts from SentinelOne and Check Point Research believe Gonjeshke Darande has direct support from a nation-state, likely Israel.

Iran, on its part, blames Mossad—Israel’s intelligence agency—for sponsoring the group. So far, there’s no concrete proof, but the targets, tools, and timing of the attacks strongly point toward Israeli interests.

The name “Gonjeshke Darande,” meaning “Predatory Sparrow” in Farsi, reflects the group’s strategy—small, agile, but capable of devastating attacks. It’s a symbolic choice, perhaps designed to mock Iran’s cybersecurity defenses.

The geopolitical cyber fight increasingly echoes the Pi Network backlash, where users accused the platform of manipulating public opinion through domain hype rather than substance.

What Comes Next?

With geopolitical tensions rising, analysts believe Gonjeshke Darande’s activity is far from over.

Iran’s state-owned banks, government agencies, and crypto systems remain at risk. These attacks demonstrate how cyber warfare is now deeply intertwined with cryptocurrency infrastructure, and in many ways, it’s becoming a new front in modern conflict.

If Gonjeshke Darande continues on its current path, more disruptive and symbolic attacks are expected—especially if Iran relies more on crypto to weather sanctions.

The world’s eyes are now on how Iran and its adversaries navigate this high-stakes digital battlefield—with incidents like the SPK Token price drop serving as reminders of just how volatile and politically charged the crypto space has become.

What's your reaction?

Excited
0
Happy
0
In Love
0
Not Sure
0
Silly
0
Abhijeet
Abhijeet is a Web3 and crypto writer who brings blockchain concepts to life with simple, engaging, and SEO-driven content. From DeFi and NFTs to emerging blockchain trends, he crafts stories that resonate with readers and build authority for Web3 brands.

    You may also like

    More in:News

    Leave a reply

    Your email address will not be published. Required fields are marked *