threatintel
actor tracker
All actors

Predatory Sparrow

predatory-sparrow · primary source: Other · first observed 2021
IL · IsraelHacktivistLow confidencelast cited Jun 16, 2025 · 11mo ago

Pro-Israel hacktivist persona widely assessed by researchers and Israeli media as linked to Israeli military intelligence, though no government has publicly confirmed the relationship. Has claimed responsibility for a series of physically-consequential cyber-physical attacks against Iranian infrastructure: the July 2021 Iranian-railway disruption, the October 2021 nationwide gas-station outage, the 27 June 2022 fire at the Khouzestan steel mill (caught on internal CCTV the group released), the December 2023 second gas-station outage, and the June 2025 attacks on Bank Sepah and the Nobitex cryptocurrency exchange.

Aliases

Gonjeshke DarandeOther

Motivations

disruptioninformation operations

Target sectors

energytransportationfinancialicsmanufacturing

Target countries

IR

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • Predatory Sparrow
  • Israel
  • disruption
  • information operations
Capability
Infrastructure
Victim
  • energy
  • transportation
  • financial
  • IR

MITRE ATT&CK techniques

Timeline

2 events

Indicators of compromise

2 indicators
csv
TypeValueFirst seenSource
SHA-256
68e95a3ccde3ea22b8eb8adcf0ad53c7993b2ea5316948e31d9eadd11b5151d7
family · Meteor
'Meteor' wiper sample documented in Check Point Research's August 2021 analysis of the 9-10 July 2021 cyberattack on Iranian Railways and the Ministry of Roads and Urban Development. The payload 'msapp.exe' writes 'Meteor has started.' to its encrypted log file, locks the host and wipes contents. Check Point ties the campaign to a self-identified 'Indra' persona that the wider community tracks as Predatory Sparrow / Gonjeshke Darande.
Jul 8, 2021Check Point Research
SHA-256
6709d332fbd5cde1d8e5b0373b6ff70c85fee73bd911ab3f1232bb5db9242dd4
family · Stardust
'Stardust' wiper variant documented by Check Point Research from earlier Indra/Predatory Sparrow operations against Syrian targets (Katerji Group, Arfada Petroleum, Cham Wings) in 2019-2020. Listed alongside Meteor and Comet in the August 2021 attribution of the Iran Railways attack.
Dec 31, 2019Check Point Research

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). Predatory Sparrow — actor profile. Retrieved from https://threatintel.local/actors/predatory-sparrow

latest cited activity · 2025-06-17 · 2 cataloged indicators