By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Cyberessentials Technology MagazineCyberessentials Technology MagazineCyberessentials Technology Magazine
  • Tech news
  • PC & Hardware
  • Mobile
  • Software
  • Gadget
  • Security
  • AI
  • Gaming
  • Marketing
  • WWW
Search
  • Contact
  • Blog
  • Complaint
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: Iranian hacker faces 30 years for holding american cities digital hostage
Share
Sign In
Notification Show More
Font ResizerAa
Cyberessentials Technology MagazineCyberessentials Technology Magazine
Font ResizerAa
  • Gadget
  • Technology
  • Mobile
Search
  • Tech news
  • PC & Hardware
  • Mobile
  • Software
  • Gadget
  • Security
  • AI
  • Gaming
  • Marketing
  • WWW
Have an existing account? Sign In
Follow US
  • Contact
  • Blog
  • Complaint
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Security

Iranian hacker faces 30 years for holding american cities digital hostage

admin
Last updated: May 30, 2025 3:09 am
admin
Share
red white and green flag - iran flag
SHARE

Imagine waking up to find your city’s computers locked – no water bills paid, parking tickets stuck, property taxes frozen. That’s exactly what happened to Baltimore residents for months after hackers hit the city with ransomware. Now, the mastermind behind this cyber chaos has admitted guilt in a U.S. court.

Contents
From Tehran to Raleigh – hacker’s downfallHow the digital shakedown workedWhy this guilty plea mattersWhat’s next for digital extortionists?

From Tehran to Raleigh – hacker’s downfall

Sina Gholinejad, a 37-year-old Iranian national, pleaded guilty this week to launching ransomware attacks that paralyzed multiple American cities. His weapon of choice? “Robbinhood” ransomware – though there’s nothing heroic about holding public services hostage for bitcoin payments.

The U.S. Department of Justice revealed Gholinejad’s cyber gang caused $19 million in damages to Baltimore alone. “Our online services turned into digital ghost towns,” recalls Maria Sanchez, a small business owner who couldn’t process property taxes for 12 weeks. “It felt like our city got kidnapped.”

How the digital shakedown worked

The hackers’ playbook was ruthless but effective:

1. Break into city computers using stolen passwords
2. Encrypt critical files with unbreakable locks
3. Demand bitcoin payments (Baltimore’s price tag: $76,000)
4. Threaten to leak sensitive data if cities didn’t pay

Greenville, Yonkers and Gresham fell victim to similar attacks. Hackers even targeted hospitals and charities – turning life-saving systems into bargaining chips.

Why this guilty plea matters

Gholinejad’s arrest at a North Carolina airport in January exposed a global operation. The FBI tracked his gang’s digital fingerprints through:

– Bitcoin ransom payments
– Hacked servers in Europe
– Virtual private networks masking their location

“This isn’t just about money – it’s about protecting our way of life,” says cybersecurity expert David Krawczyk. “When hospitals and water systems get hit, real people suffer.”

What’s next for digital extortionists?

With sentencing scheduled for August, Gholinejad faces up to 30 years in federal prison. But the real victory? “We’re sending a message to hackers worldwide,” declares U.S. Attorney Matthew Galeotti. “Cybercrime has real-world consequences.”

As cities slowly recover, Baltimore’s IT department now runs weekly ransomware drills. “We treat every email attachment like a potential time bomb,” admits city tech supervisor Jamal Porter. For everyday citizens, the lesson is clear – in our connected world, digital defense is everyone’s business.

Coinbase data breach: How bribed insiders leaked 70k user profiles
The Celebgate scandal: How hackers stole intimate photos of Hollywood’s biggest stars
Cisco Cybersecurity Certifications: Your Complete Guide to a Booming Career in 2025
10 Most Popular Cybersecurity Certifications That Will Boost Your Career in 2025
New PumaBot botnet attacks Linux IoT devices with stealthy SSH brute-force tactics

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article macbook pro on brown wooden table Secure Your Online Activities with a VPN: Tips and Tricks
Next Article a laptop on a table Coinbase data breach: How bribed insiders leaked 70k user profiles
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

Free Cybersecurity Courses & Certificates [2025]: Your Complete Guide to Starting a Career in Cybersecurity
Security
Google Cybersecurity Certificate
Google Cybersecurity Certification – All You Need To Know About
Security
Vpn software logo
What is a VPN? VPN meaning
Guides Security Software
woman in black dress illustration
US Government Takes Down Massive Dark Web Credit Card Marketplace
Security
vpn logo on laptop
Top 6 VPN Software in 2025: Expert Reviews & Comparison
Security Software
closeup photo of turned-on blue and white laptop computer
10 Steps for Protecting Your Organization from Cyber Threats
Security
person holding black iphone 5
Cyber security tool for anonymous browsing ABBR. For crossword use
Security
macbook pro on brown wooden table
Secure Your Online Activities with a VPN: Tips and Tricks
Security
banner banner
Cyberessentials.org
Discover the latest in technology: expert PC & hardware guides, mobile innovations, AI breakthroughs, and security best practices. Join our community of tech enthusiasts today!
//

Discover the latest in technology: expert PC & hardware guides, mobile innovations, AI breakthroughs, and security best practices. Join our community of tech enthusiasts today!

Support

  • PRIVACY NOTICE
  • YOUR PRIVACY RIGHTS
  • INTEREST-BASE ADSNew
  • TERMS OF USE
  • OUR SITE MAP

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

[mc4wp_form id=”1616″]

Cyberessentials Technology MagazineCyberessentials Technology Magazine
Follow US
© 2025 Cyberessentials.org. All Rights Reserved.
Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..
[mc4wp_form]
Zero spam, Unsubscribe at any time.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?