The State Department has allocated millions to catch cyber saboteurs.
The U.S. State Department has announced a reward of up to $10 million for information about hackers involved in cyberattacks against U.S. critical infrastructure at the behest of foreign governments. The initiative was presented as part of the Rewards for Justice program, a division of the State Department that is engaged in the search for persons who pose a threat to US national security.
The focus is on the Shahid Hemmat group, which, according to the department, operates under the control of the Islamic Revolutionary Guard Corps (IRGC). Four Iranian hackers — Manouchehr Akbari, Amir Hossein Hosseini, Mohammad Hossein Moradi and Mohammad Reza Rafatinejad — are named as key figures in the group.
According to the State Department, the attackers organized large-scale cyberattacks on the US defense sector and international transport networks. The hackers' actions are classified as a violation of the U.S. Computer Fraud and Abuse Act.
It has also been established that the Shahid Hemmat group interacts with other individuals and organizations associated with the IRGC, including Mohammad Bagher Shirinkar, Mehdi Lashgharian and Alireza Shafiye Nasab. Among the shell companies involved are Emennet Pasargad, Dadeh Afzar Arman (DAA) and Mehrsam Andisheh Saz Nik (MASN).
Source
The U.S. State Department has announced a reward of up to $10 million for information about hackers involved in cyberattacks against U.S. critical infrastructure at the behest of foreign governments. The initiative was presented as part of the Rewards for Justice program, a division of the State Department that is engaged in the search for persons who pose a threat to US national security.
The focus is on the Shahid Hemmat group, which, according to the department, operates under the control of the Islamic Revolutionary Guard Corps (IRGC). Four Iranian hackers — Manouchehr Akbari, Amir Hossein Hosseini, Mohammad Hossein Moradi and Mohammad Reza Rafatinejad — are named as key figures in the group.

According to the State Department, the attackers organized large-scale cyberattacks on the US defense sector and international transport networks. The hackers' actions are classified as a violation of the U.S. Computer Fraud and Abuse Act.
It has also been established that the Shahid Hemmat group interacts with other individuals and organizations associated with the IRGC, including Mohammad Bagher Shirinkar, Mehdi Lashgharian and Alireza Shafiye Nasab. Among the shell companies involved are Emennet Pasargad, Dadeh Afzar Arman (DAA) and Mehrsam Andisheh Saz Nik (MASN).
Source