Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Multi-Stage “BadPaw” Malware Campaign Targets Ukraine

March 5, 2026

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

March 5, 2026

Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers

March 5, 2026
Facebook X (Twitter) Instagram
Thursday, March 5
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion
Cyber Security

Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

Team-CWDBy Team-CWDMarch 4, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A newly obtained database from Iranian cryptocurrency exchange Ariomex suggests the platform may have played a role in sanctions evasion and large-scale capital transfers linked to actors inside the country.

The findings, published by Resecurity on Monday, are based on an analysis of internal records covering 2022 to 2025.

The data leak comes amid increased scrutiny of Iran’s financial system and its growing reliance on digital assets. In January 2026, the Central Bank of Iran reportedly acquired about $507m worth of Tether’s USDT, a move analysts believe was aimed at stabilising the national currency.

Earlier measures by the US Treasury Department targeted two crypto exchanges accused of facilitating transactions for the Islamic Revolutionary Guard Corps (IRGC).

Database Analysis Reveals High-Risk Activity

Resecurity said it reviewed 11,826 verified user records, identifying 27 potential matches against sanctions lists, though it noted that incomplete national ID data prevented definitive confirmation. Approximately 7,710 records originated from Iran, while others were linked to users in the US, Germany, France, the Netherlands and the UK.

Read more on cryptocurrency-based attacks: Crypto Hack Losses in First Half of 2025 Exceed 2024 Total

According to the report, 70% of traded assets on Ariomex were Tether and Tron. The majority of transactions were small, reflecting attempts by individuals to shield savings from currency devaluation. However, investigators also flagged larger requests, including daily transfers between $50,000 and $100,000.

Among the mechanisms identified were:

Large Transfers And VIP Profiles

Resecurity documented several cases involving multimillion-dollar transactions. In one example, a user sought to exchange $19m in cryptocurrency. Others reportedly attempted to move between $1m and $5m into or out of Iran, amounts that analysts described as inconsistent with average monthly salaries of $400 to $500 in the country.

The report also pointed to similarities with the June 2025 cyberattack on Nobitex, Iran’s largest crypto exchange, which was attributed to the group Predatory Sparrow and resulted in a $90m loss.

Resecurity said Ariomex imposed withdrawal limits of roughly $30,000 per month and $1,000 per day for most users, while verified customers could access up to $50,000 monthly. Some high-value accounts, however, allegedly operated with incomplete verification data yet handled substantial balances.

The company said it will continue assisting government agencies and regulators in identifying crypto-based sanctions evasion networks linked to Iran.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAI and Deepfakes Supercharge Sophisticated Cyber-Attacks: Cloudflare
Next Article APT28 Targeted European Entities Using Webhook-Based Macro Malware
Team-CWD
  • Website

Related Posts

Cyber Security

Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers

March 5, 2026
Cyber Security

‘Project Compass’ Cracks Down on ‘The Com’: 30 Members of Notorious Cybercrime Gang Arrested

February 27, 2026
Cyber Security

Exploitable Vulnerabilities Present in 87% of Organizations

February 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

How cybercriminals are targeting content creators

November 26, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.