The person at the center of this case
United States companies and federal agencies
Justice for United States companies and federal agencies โ the trail went cold in 2026, but the truth hasn't.
Start here
What is Kazemifar's current location and identity documentation?
Which specific U.S. companies and federal agencies were targeted, and what data was compromised?
Did Kazemifar have direct contacts or handlers within the Iranian Revolutionary Guard Corps?
Reza Kazemifar is wanted by the FBI for his alleged involvement in sophisticated cyber attacks against U.S. companies and federal agencies between May 2017 and October 2021, using spearphishing and social engineering tactics. At the time of the attacks, Kazemifar was employed by both a Tehran-based software company and Iran's Revolutionary Guard Corps Cyber Organization, suggesting state-sponsored cyber espionage. His current whereabouts remain unknown, and authorities seek information to locate and apprehend him for charges including conspiracy to commit computer fraud and wire fraud.
Try asking
A one-time $10 claim transfers this imported case workspace to your account. You get 10 uploads for this case, 25 daily AI questions for this case, and public tips with files route to you.
This does not start a subscription. When the included limits are reached, the Personal plan unlocks more workspace capacity.
Beyond the top three above โ each detail below could be the thread that pulls this case open.
What technical infrastructure or digital signatures link Kazemifar to the identified cyber campaigns?
Even the smallest detail could be the key to solving this case.
Official wording
Conspiracy to Commit Computer Fraud; Wire Fraud; Conspiracy to Commit Wire Fraud Caution: Reza Kazemifar is wanted for his alleged involvement in malicious cyber activity against United States companies and individuals from May of 2017 to October of 2021. Kazemifar allegedly supported and engaged in cyber campaigns against United States companies and federal agencies utilizing spearphishing emails and online social engineering.
At the time of their activity, Kazemifar was known to have been employed by both Mahak Rayan Afraz, a Tehran-based software company, and the Iranian Revolutionary Guard Corps Electronic Warfare and Cyber Defense Organization. A federal arrest warrant was issued for Kazemifar in the United States District Court, Southern District of New York, after he was charged with Conspiracy to Commit Computer Fraud; Wire Fraud; and Conspiracy to Commit Wire Fraud.
Malicious cyber activity against U.S. targets begins in May 2017
Alleged cyber operations conclude in October 2021
Warrant issued in U.S. District Court, Southern District of New York for conspiracy to commit computer fraud, wire fraud, and conspiracy to commit wire fraud
For information leading to the resolution of this case
For information leading to the resolution of this case