An Iranian-linked cyber group that successfully breached the email account of Donald Trump's nominee for FBI director has escalated its campaign against Western leaders by issuing a $50 million "bounty" threat targeting the U.S. President and Israeli Prime Minister Benjamin Netanyahu.
The threat, which emerged Friday morning according to cybersecurity researchers, represents a dangerous convergence of digital warfare and physical threats against sitting heads of state. The group, which intelligence agencies have linked to Iran's Islamic Revolutionary Guard Corps (IRGC), previously claimed responsibility for hacking Kash Patel's email account earlier this month.
To understand today's headlines, we must look at yesterday's decisions. This incident marks the latest escalation in what Western intelligence services describe as Iran's "multi-domain" retaliation strategy following recent Israeli strikes on Iranian diplomatic facilities and military targets.
According to threat intelligence analysts, the bounty announcement—disseminated through encrypted channels and dark web forums—follows a pattern of Iranian cyber operations that blur the line between state-sponsored hacking and incitement to violence. While experts caution that such online "bounties" rarely translate into credible assassination plots, the threat represents a significant escalation in rhetoric.
"We're witnessing cyber warfare evolving into something far more dangerous," said a senior European intelligence official speaking on condition of anonymity. "When state-backed hackers begin making explicit threats against world leaders, it creates a dangerous precedent."
The breach of Patel's email account, confirmed by U.S. authorities last week, exposed sensitive communications regarding Trump administration national security planning. Cybersecurity firms tracking the group say it has demonstrated sophisticated capabilities, including spear-phishing campaigns and exploitation of zero-day vulnerabilities.
The U.S. Secret Service and Israeli security service Shin Bet have both been briefed on the threats, according to sources familiar with the matter. Neither agency has commented publicly on specific protective measures being implemented.


/file/attachments/2991/P1Estellehantaviruscover_411095.jpg)
