An official website of the United States Government

IRGC Hackers

Near East (North Africa and the Middle East)

Reward

Up to $10 Million

Do your part

About

Rewards for Justice is offering a reward of up to $10 million for information leading to the identification or location of any foreign person, including a foreign entity, who knowingly engaged or is engaging in interference in U.S. elections, as well as information leading to the prevention, frustration, or favorable resolution of an act of foreign election interference.

Malign influence actors associated with Iran’s Islamic Revolutionary Guard Corps (IRGC) have conducted influence operations targeting the American public and cyber operations targeting Presidential campaigns. These operations are aimed at fueling distrust in the U.S. democratic system, exploiting and increasing social divisions among the U.S. public, and ultimately interfering with the U.S. elections.

From late May to early August 2024, IRGC-linked hackers Masoud Jalili, Seyyed Ali Aghamiri, Yaser Balaghi, and other associates began targeting individuals affiliated with multiple U.S. presidential election campaigns with the goal of influencing the 2024 U.S. presidential election. Jalili’s team was assisted by Iranian telecommunications and internet service providers Farabord Dadeh Haye Iranian Company (FDI) and Respina Networks and Beyond. The two technology firms provided Jalili and his accomplices with static Internet Protocol addresses, high bandwidth, and high-speed internet access for his malicious cyber operation.

These malicious cyber actors gained unauthorized access to e-mail accounts of persons associated with a U.S. presidential campaign and stole confidential campaign documents through ongoing, persistent access to communications of high-ranking campaign officials. The hackers, using multiple fake persona accounts, then attempted to weaponize the stolen data by leaking it to members of the media and other persons for the purpose of influencing the 2024 U.S. presidential election.

Prior to the targeting of the U.S. presidential campaign, Jalili and his associates were also involved in other attempted computer intrusion activities, including hacking against Iranian government officials.

Anyone with information on Masoud Jalili, the IRGC’s interference in U.S. elections, or associated individuals and entities should contact Rewards for Justice via the Tor-based tips-reporting channel at: he5dybnt7sr6cm32xt77pazmtm65flqy6irivtflruqfc5ep7eiodiad.onion (Tor browser required).

Masoud Jalili
(مسعود جلیلی)
Yaser Balaghi
(یاسر بلاغی)
Seyyed Ali Aghamiri
(سید علی آقامیری)

Posters:

Associated Location(s):

Iran

Known Locales:

Number 102 Maleklou Steet, Heidarkhan Street, West Farjam Street, District 4, Tehran

Associated Organizations:

Farabord Dadeh Haye Iranian Company; FDI; IRGC; Islamic Revolutionary Guard Corps; Respina Networks and Beyond

SUBMIT A TIP

Do Your Part. Secure a Safer World.

There are many ways to submit information to Rewards for Justice.

You may choose from multiple platforms and contact us in numerous languages. To process your information efficiently, we ask you to state your information as succinctly as possible, provide your name, location, and preferred language, and upload all relevant files such as photographs, videos, and documents to support your information. An RFJ representative will soon contact you. Please be patient, as RFJ reads every tip we receive.

Please visit our Tor-based tips-reporting channel at: he5dybnt7sr6cm32xt77pazmtm65flqy6irivtflruqfc5ep7eiodiad.onion

Skip to content