Pro-Israel Hackers Burn $90M in Crypto in Bold Attack on Iran’s Nobitex Exchange

Listen to this Post

Featured Image

A Cyberattack with Political Firepower

On June 18, 2025, the Iranian crypto world was rocked by a devastating cyberattack on Nobitex, the country’s largest cryptocurrency exchange. Claimed by the pro-Israel hacktivist group Predatory Sparrow, the operation didn’t just empty Nobitex’s hot wallets of over \$90 million in digital assets — it burned those funds forever, sending them to cryptographically unreachable “vanity addresses” embedded with anti-IRGC messages. This wasn’t about profit. It was a calculated move designed to damage what the group claims is a key financial engine behind Iran’s sanctioned military and terror operations.

Nobitex acknowledged the breach publicly just hours later, confirming unauthorized access to its reporting systems and wallets. Swiftly, Predatory Sparrow posted their claim of responsibility on X, declaring a 24-hour ultimatum before releasing stolen source code and sensitive internal data. Their motive? To dismantle what they allege is a laundering system operated by and for the Islamic Revolutionary Guard Corps (IRGC) and powerful Iranian elites.

Crypto forensics firm Elliptic verified the scale of the attack, confirming the mass transfer of funds and the peculiar use of vanity addresses that are mathematically infeasible to access. These addresses bore inflammatory slogans targeting the IRGC — clear proof the attack was intended to destroy, not enrich.

The group’s tactics echo their previous campaign just one day earlier, when they hit Iran’s Bank Sepah, another institution reportedly linked to the regime. Rather than draining wealth for financial gain, these attacks are a digital scorched-earth campaign. Investigators believe the hackers deployed brute-force cryptographic methods to generate the symbolic wallet names, effectively making the crypto assets disappear permanently. The political messaging, the careful strategy, and the financial impact make this one of the most sophisticated cyber sabotage operations against an Iranian financial institution in recent history.

Adding fuel to the fire, researchers have previously connected Nobitex to elite circles within the Iranian regime, including relatives of Supreme Leader Ali Khamenei and individuals blacklisted under international sanctions. The exchange has allegedly facilitated the movement of ransomware earnings, including from DiskCryptor and BitLocker operations.

This attack signals a deeper, ongoing cyber conflict between state-aligned and ideologically motivated hacking groups. It also raises crucial questions about the vulnerabilities of crypto exchanges operating in authoritarian environments, and how politically-charged cyberwarfare is evolving into a zero-sum game with global economic implications.

What Undercode Say:

Political Sabotage Over Profit

The Predatory Sparrow operation showcases a striking example of modern cyberwarfare where political motivations take precedence over financial incentives. By sending over \$90 million worth of cryptocurrency to custom-made “vanity addresses” that are virtually impossible to retrieve, the attackers made a bold statement: this was about damaging Iran’s financial infrastructure, not personal enrichment. The group’s calculated burn of digital assets serves as both a technological and ideological weapon — erasing financial leverage while broadcasting symbolic defiance against Iran’s ruling elite.

Crypto Infrastructure as a Target

Nobitex wasn’t just any exchange. According to Elliptic and multiple open-source intelligence efforts, it was allegedly a key node in the Iranian regime’s underground financial network. Its ties to the IRGC, sanctioned individuals, and even relatives of Iran’s Supreme Leader, made it an ideal target for a group aiming to disrupt not just data but systems of power. By choosing such a high-profile and symbolically potent institution, the hackers struck at the economic arteries of the regime’s covert operations.

The Symbolism Behind Vanity Addresses

Technically, generating usable vanity addresses with lengthy embedded phrases like “F

References:

Reported By: www.bleepingcomputer.com
Extra Source Hub:
https://www.linkedin.com
Wikipedia
OpenAi & Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram