Cyberwarfare / Nation-State Attacks,
Fraud Management & Cybercrime
Ravin Academy’s Data Breach Exposes Identities of Over 1,000 Participants

Recent revelations from a cyber training facility affiliated with Iranian intelligence have exposed sensitive personal information of over 1,000 individuals enrolled in its programs. The breach highlights vulnerabilities within organizations reportedly aimed at enhancing Iran’s cyber capabilities.
Ravin Academy, established in 2019 to cultivate talent for Iran’s Ministry of Intelligence and Security, was designated by the U.S. Department of Treasury as a sanctioned entity in 2022 for its support of the nation’s intelligence efforts. The academy offers courses that cover both defensive and offensive cyber operations, including red teaming, malware reverse engineering, and vulnerability analysis.
The organization acknowledged the breach in a post on its Telegram channel on October 22. They claimed that the leaked data, consisting of usernames and phone numbers, was part of an effort to damage its reputation and disrupt Iran’s cybersecurity initiatives. The complete dataset was provided to activist Nariman Gharib, who subsequently released parts of it on his website.
The breach occurred against a backdrop of escalating Iranian cyber activities, particularly in light of ongoing conflicts with Israel and the U.S. Fears of increased ransomware attacks on healthcare sectors have prompted warnings from federal agencies regarding elevated threats from Iranian actors.
In June, amid rumors of Israeli cyber offensives, Iran imposed nationwide internet blackouts, with officials characterizing these disruptions as “temporary, targeted, and controlled.” Associated claims suggest that students implicated in the breach come from diverse educational and professional backgrounds, including affiliations with Western institutions; this dimension raises implications for international cybersecurity standards and cooperation.
The leaked database encompasses records related to current and former students of Ravin Academy, with experts suggesting that the co-founders were specifically directed by Iranian intelligence to establish this training ground for recruitment. Notably, the breach unfolded shortly before Ravin Academy’s annual Tech Olympics event, casting doubt on the organization’s operational security.
According to Gharib, this incident represents a significant failure of security that not only compromises the credibility of the academy but also places at risk the privacy of individuals who believed they were participating in legitimate development programs. Potential tactics that might have been employed in this incident could include initial access techniques through phishing or exploitation of vulnerable systems, followed by persistence and data exfiltration methods outlined in the MITRE ATT&CK framework.