Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Atomic Energy Agency: Experts’ Email Addresses Stolen from Old Server

The International Atomic Energy Agency (IAEA) reportedly is taking steps to secure its information after data was stolen from one of its former servers and posted online.

According to the IAEA, the stolen data includes email addresses for some experts working with the agency. The data was posted online by a group going by the name Parastoo, which in Farsi translates to “swallow.”

The International Atomic Energy Agency (IAEA) reportedly is taking steps to secure its information after data was stolen from one of its former servers and posted online.

According to the IAEA, the stolen data includes email addresses for some experts working with the agency. The data was posted online by a group going by the name Parastoo, which in Farsi translates to “swallow.”

In a statement posted by the group on Pastebin, the hackers call for an investigation into nuclear activities by Israel, which historically has refused to confirm or deny whether or not it has nuclear weapons. The group also stated that it has evidence showing there are “beyond-harmful operations taking place” at Israel’s Negev Nuclear Research Center, located outside Dimona, and that the people whose email addresses the group published could be considered partners in crime if an accident should happen there.

IAEA spokeswoman Gill Tudor told Reuters that the agency “deeply regrets this publication of information stolen from an old server that was shut down some time ago” and that measures had been taken to address a possible vulnerability on the affected server.

“The IAEA’s technical and security teams are continuing to analyze the situation and do everything possible to help ensure that no further information is vulnerable,” Tudor said.

Advertisement. Scroll to continue reading.

Currently, the IAEA is heading up an investigation into Iran’s nuclear enrichment program. According to Reuters, a Western diplomat said the stolen information does not include any information related to that investigation.

Israel and the United States have accused Iran of trying to develop a nuclear weapon, and have been linked in news reports to efforts to destabilize those activities. Among those efforts was an intelligence operation code-named ‘Olympic Games’, which many believe led to the creation and deployment of the Stuxnet malware detected in Iran’s nuclear facility in Bushehr in 2010.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Coro, a provider of cybersecurity solutions for SMBs, has appointed Joe Sykora as CEO.

SonicWall has hired Rajnish Mishra as Senior Vice President and Chief Development Officer.

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.