{"id":36088,"date":"2020-07-15T14:29:25","date_gmt":"2020-07-15T14:29:25","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31399\/Report-CIA-Behind-APT34-FSB-Hacks-And-Data-Dumps.html"},"modified":"2020-07-15T14:29:25","modified_gmt":"2020-07-15T14:29:25","slug":"report-cia-behind-apt34-fsb-hacks-and-data-dumps","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/","title":{"rendered":"Report: CIA Behind APT34, FSB Hacks, And Data Dumps"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2017\/03\/20\/d61bc963-6c9f-44af-99f3-cd6716384396\/wiki-thumb.jpg\" class alt=\"wiki-thumb.jpg\"><\/span><figcaption readability=\"1.5\"><span class=\"caption\" readability=\"3\"><\/p>\n<p>CIA headquarters in Langley, VA. (Image: file photo)<\/p>\n<p><\/span><span class=\"credit\"> BRENDAN SMIALOWSKI\/AFP\/Getty Images <\/span><\/figcaption><\/figure>\n<div class=\"relatedContent alignRight\" readability=\"8.0321285140562\">\n<h3 class=\"heading\"> <span class=\"int\">Special feature<\/span> <\/h3>\n<div class=\"thumb\"> <a href=\"https:\/\/www.zdnet.com\/topic\/cyberwar-and-the-future-of-cybersecurity\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\"> <span class=\"img \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2016\/09\/01\/fa215859-76c8-4ab7-8b55-56a42e0d8950\/resize\/220x165\/cf651a47272fd8abf79b87f4b45ba3c4\/09-2016-special-feature-cover-art.jpg\" class alt=\"Cyberwar and the Future of Cybersecurity\" height=\"165\" width=\"220\"><\/span> <\/a> <\/div>\n<p class=\"title\"> <a href=\"https:\/\/www.zdnet.com\/topic\/cyberwar-and-the-future-of-cybersecurity\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\"> Cyberwar and the Future of Cybersecurity <\/a> <\/p>\n<p class=\"dek\">Today&#8217;s security threats have expanded in scope and seriousness. There can now be millions &#8212; or even billions &#8212; of dollars at risk when information security isn&#8217;t handled properly.<\/p>\n<p class=\"read-more\"> <a href=\"https:\/\/www.zdnet.com\/topic\/cyberwar-and-the-future-of-cybersecurity\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\">Read More<\/a> <\/p>\n<\/p><\/div>\n<p>US President Donald Trump gave broad powers to the Central Intelligence Agency (CIA) in 2018 to carry out offensive cyber operations across the globe.<\/p>\n<p>In an exclusive today, <a href=\"https:\/\/news.yahoo.com\/secret-trump-order-gives-cia-more-powers-to-launch-cyberattacks-090015219.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Yahoo News reported<\/a> that the agency used its newly acquired powers to orchestrate &#8220;at least a dozen operations&#8221; across the world.<\/p>\n<p>The CIA was already authorized to conduct silent surveillance and data collection, but the new powers allow it to go even further.<\/p>\n<p>&#8220;This has been a combination of destructive things &#8211; stuff is on fire and exploding &#8211; and also public dissemination of data: leaking or things that look like leaking,&#8221; a former US government official told Yahoo News.<\/p>\n<p>While the former official didn&#8217;t go into the specifics of each operation, Yahoo News reporters believe the CIA&#8217;s new powers and modus operandi link it to a series of hack-and-dump incidents that took place primarily in 2019, such as:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/source-code-of-iranian-cyber-espionage-tools-leaked-on-telegram\/\" target=\"_blank\" rel=\"noopener noreferrer\">Publishing hacking tools (malware) from APT34<\/a>, an Iranian government hacking unit, on Telegram.<\/li>\n<li>Doxing Islamic Revolutionary Guard Corps (IRGC) intelligence agents on Telegram by revealing their full names, home addresses, phone numbers, and social media profiles.<\/li>\n<li><a href=\"https:\/\/www.telegraph.co.uk\/technology\/2016\/08\/03\/iranian-hackers-attack-telegram-to-find-15-million-accounts\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Dumping details about 15 million payment cards<\/a> from three Iranian banks linked to Iran&#8217;s IRGC.<\/li>\n<li>Hacking <a href=\"https:\/\/www.zdnet.com\/article\/hackers-breach-fsb-contractor-expose-tor-deanonymization-project\/\" target=\"_blank\" rel=\"noopener noreferrer\">two<\/a> <a href=\"https:\/\/www.zdnet.com\/article\/hackers-breach-fsb-contractor-and-leak-details-about-iot-hacking-project\/\" target=\"_blank\" rel=\"noopener noreferrer\">contractors<\/a> that provide cyber-weapons and surveillance solutions for Russia&#8217;s FSB intelligence agency and sharing the data online via a hacktivist group called Digital Revolution.<\/li>\n<\/ul>\n<p>Citing former US officials, Yahoo News claims that such operations would have never been approved in the previous administrations, who have always been very cautious when attacking foreign adversaries, fearing blowback.<\/p>\n<p>However, in 2018, President Trump departed from the White House&#8217;s classic stance on the matter and signed a document called a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Presidential_finding\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">presidential finding<\/a>, granting the CIA the ability to plan and execute covert offensive cyber operations under its judgment, rather than under the oversight of the National Security Council.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>The document effectively took the decision making and approval process from the White House and the National Security Council and placed it with CIA leadership in an attempt to expedite foreign hacking operations.<\/p>\n<p>Yahoo News reports that President Trump&#8217;s decision split top US intelligence officials.<\/p>\n<p>Some officials feared repercussions from foreign adversaries, while some feared the lack of NSC oversight. NSC oversight previously kept US intelligence agencies like the CIA in check when it came to orchestrating and approving cyber operations on foreign ground, making sure agencies like the NSA and CIA went through a due process that would sometime take years from the planning to the execution phase.<\/p>\n<p>However, Yahoo News sources said that some intelligence officials were ecstatic at Trump&#8217;s decision, calling it &#8220;a needed reform&#8221; in order to make the CIA more agile and speed up response times to foreign attacks.<\/p>\n<p>The locations of these foreign CIA cyber operations are currently classified, along with operational details, but former US officials who have seen the presidential finding said the document listed Russia, China, Iran, and North Korea as targets, but also left the door open for the CIA to carry out operations in other countries at its discretion.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31399\/Report-CIA-Behind-APT34-FSB-Hacks-And-Data-Dumps.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36089,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8799],"class_list":["post-36088","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentusarussiadata-losscyberwarspywareirancia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Report: CIA Behind APT34, FSB Hacks, And Data Dumps 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Report: CIA Behind APT34, FSB Hacks, And Data Dumps 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-15T14:29:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/report-cia-behind-apt34-fsb-hacks-and-data-dumps.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Report: CIA Behind APT34, FSB Hacks, And Data Dumps\",\"datePublished\":\"2020-07-15T14:29:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\\\/\"},\"wordCount\":573,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps.jpg\",\"keywords\":[\"headline,hacker,government,usa,russia,data loss,cyberwar,spyware,iran,cia\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\\\/\",\"name\":\"Report: CIA Behind APT34, FSB Hacks, And Data Dumps 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps.jpg\",\"datePublished\":\"2020-07-15T14:29:25+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps.jpg\",\"width\":770,\"height\":535},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa,russia,data loss,cyberwar,spyware,iran,cia\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentusarussiadata-losscyberwarspywareirancia\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Report: CIA Behind APT34, FSB Hacks, And Data Dumps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Report: CIA Behind APT34, FSB Hacks, And Data Dumps 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/","og_locale":"en_US","og_type":"article","og_title":"Report: CIA Behind APT34, FSB Hacks, And Data Dumps 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-07-15T14:29:25+00:00","og_image":[{"width":770,"height":535,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/report-cia-behind-apt34-fsb-hacks-and-data-dumps.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Report: CIA Behind APT34, FSB Hacks, And Data Dumps","datePublished":"2020-07-15T14:29:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/"},"wordCount":573,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/report-cia-behind-apt34-fsb-hacks-and-data-dumps.jpg","keywords":["headline,hacker,government,usa,russia,data loss,cyberwar,spyware,iran,cia"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/","url":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/","name":"Report: CIA Behind APT34, FSB Hacks, And Data Dumps 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/report-cia-behind-apt34-fsb-hacks-and-data-dumps.jpg","datePublished":"2020-07-15T14:29:25+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/report-cia-behind-apt34-fsb-hacks-and-data-dumps.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/report-cia-behind-apt34-fsb-hacks-and-data-dumps.jpg","width":770,"height":535},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/report-cia-behind-apt34-fsb-hacks-and-data-dumps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa,russia,data loss,cyberwar,spyware,iran,cia","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusarussiadata-losscyberwarspywareirancia\/"},{"@type":"ListItem","position":3,"name":"Report: CIA Behind APT34, FSB Hacks, And Data Dumps"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36088"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36088\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36089"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}