ODINT ← Albania Tour
← Back to Cyber Tours
🇦🇱 Albania • Iranian Cyberattacks • MITRE ATT&CK C0038

HomeLand Justice

Iranian state-sponsored attacks on Albanian government infrastructure 2022–2024: ROADSWEEP ransomware, ZeroCleare wiper, 100+ TB exfiltrated, SHISH intelligence employee list leaked, Telegram channels still active.

IRAN MOIS ATTRIBUTED MITRE C0038 ROADSWEEP ZEROCLEAR TELEGRAM ACTIVE

Attribution Summary

AttributeDetail
Campaign nameHomeLand Justice
MITRE ATT&CK IDC0038
AttributionIranian Ministry of Intelligence and Security (MOIS)
Associated groupHEXANE (G1001) — conducted reconnaissance
Confirming agenciesFBI, CISA (AA22-264A), Mandiant, Microsoft, NATO, UK NCSC
MotivationRetaliation for Albania hosting the MEK (Mujahedeen-e-Khalq)
Initial access vectorCVE-2019-0604 (Microsoft SharePoint Remote Code Execution)
Period of operationMay 2021 (initial access) — January 2024+ (ongoing leaks)

Motivation

The Mujahedeen-e-Khalq (People’s Mojahedin Organization of Iran, MEK) is an Iranian opposition group that maintains a refugee camp in Durrës, Albania. Iran considers MEK a terrorist organization and views Albania’s hosting of MEK as a hostile act. The HomeLand Justice attacks were explicitly framed as retaliation: Albania was targeted for harboring people Iran wants dead or imprisoned.

Albania severed diplomatic relations with Iran on September 7, 2022 — the first nation in history to sever diplomatic ties over a cyberattack. The United States Treasury Department sanctioned Iran’s Ministry of Intelligence and the Intelligence Minister personally in response.

Attack Timeline

DateEvent
May 2021Initial access established via CVE-2019-0604 (SharePoint RCE) — 14 months before destructive attack
May 2021–July 2022Silent persistence: CHIMNEYSWEEP infostealer exfiltrating data during 14-month dwell time
July 18, 2022Destructive attack launched — Albania forces temporary shutdown of government services
July 21, 2022HomeLand Justice claims responsibility, begins leaking data via Telegram
September 7, 2022Albania severs diplomatic ties with Iran — first nation to do so over a cyberattack
September 19, 2022Police chief’s personal data and border crossing records leaked
October 3, 2022300 criminal suspect identities leaked (1.7 GB file, ~100,000 records total)
December 2023Parliament and One Albania telecom attacked
December 24, 2023#DestroyDurresMilitaryCamp campaign launched
January 2024INSTAT (statistics institute) breached — 100+ TB claimed exfiltrated

Malware Arsenal

MalwareTypePurpose
ROADSWEEPRansomwareFile encryption across government systems
ZeroCleareWiperDisk destruction (used with RawDisk driver)
CHIMNEYSWEEPInfostealer / BackdoorLong-term data exfiltration during dwell time
No-JusticeWiperUsed in 2024 attacks

Initial Access & Persistence

Exploitation Vector

Initial access was achieved by exploiting CVE-2019-0604 — a remote code execution vulnerability in Microsoft SharePoint. The vulnerability was patched in 2019, meaning Albanian government SharePoint installations had gone unpatched for at least two years before exploitation.

Persistence Mechanisms

Post-Exploitation Tools

Data Exfiltration Method

During the dwell period, data was exfiltrated via:

Data Leaked

Police Suspect Database (October 2022)

~100,000 records, 1.7 GB. Contents per record:

Source system: MEMEX — the Albanian state police suspect database.

Government Officials (September 2022)

State Information Service (SHISH) Employees

The most sensitive leak: employee data from SHISH (Shërbimi Informativ Shtetëror), Albania’s civilian intelligence agency. The leak included:

This constitutes a complete identification package for Albania’s intelligence officers.

Citizen Phone Numbers & IDs

A mass leak of Albanian citizens’ personal data containing name, surname, birthplace, phone number, and ID card number. Volume not independently verified.

INSTAT Census Data (January 2024)

HomeLand Justice claimed to have exfiltrated 100+ terabytes from INSTAT, Albania’s national statistics institute. Claimed data includes GIS records and census data. The 100 TB figure has not been independently verified, but the INSTAT breach was confirmed by AKCESK.

Active Leak Infrastructure (As of January 2026)

ChannelStatusMembers/Traffic
t.me/justice_homelandACTIVE13,600+ members
t.me/JusticeHomeland1ACTIVEUnknown
homelandjustice.ruACTIVERussian domain — ongoing
justicehomeland.orgACTIVEOngoing

The HomeLand Justice Telegram channel and websites remain operational. The channel continues to distribute Albanian government data and makes claims about ongoing access to Albanian systems. Contact for the operation uses Yandex (Russian tech provider) infrastructure, and the primary website uses a Russian .ru domain.

Targets: Government and Private Sector

Government Targets

Private Sector Targets

Implications for Diella

The AKSHI system compromise has direct implications for Diella’s integrity:

  1. Training data provenance: If CHIMNEYSWEEP was active in AKSHI systems from May 2021, the data used to train and configure Diella (deployed January 2025) may have been from systems under adversary control during development.
  2. GOVnet access: AKSHI’s GOVnet connects 220 Albanian government institutions. A 14-month dwell time in AKSHI means Iranian intelligence had potential visibility into the entire Albanian government network for over a year.
  3. Remediation confidence: Diella operates on AKSHI infrastructure. Has the post-2022 breach remediation been sufficient? Albania’s track record — unpatched SharePoint for 2+ years, four subsequent attack phases — does not support high confidence.

Sources

Note: This report is based on publicly available technical analysis, government advisories, and investigative journalism. ODINT did not independently access HomeLand Justice infrastructure, Telegram channels, or any materials distributed by the threat actor. All attribution statements are derived from official government advisories (FBI/CISA, NATO, UK NCSC) and published threat intelligence (Mandiant/Google, Microsoft).

Documented: January 2026 — ODINT Albania Investigation