Iran to Cold Test Redesigned Arak Nuclear Reactor

Above, the nuclear water reactor of Arak in this handout released by Iran’s Atomic Energy Organization on December 23, 2019. (Atomic Energy Organization of Iran/AFP)
Above, the nuclear water reactor of Arak in this handout released by Iran’s Atomic Energy Organization on December 23, 2019. (Atomic Energy Organization of Iran/AFP)
TT
20

Iran to Cold Test Redesigned Arak Nuclear Reactor

Above, the nuclear water reactor of Arak in this handout released by Iran’s Atomic Energy Organization on December 23, 2019. (Atomic Energy Organization of Iran/AFP)
Above, the nuclear water reactor of Arak in this handout released by Iran’s Atomic Energy Organization on December 23, 2019. (Atomic Energy Organization of Iran/AFP)

Iran will cold test its redesigned Arak nuclear reactor as prelude to fully commissioning it later in the year, Iran’s Atomic Energy Organization said on Friday.

Spokesman Behrouz Kamalvandi was quoted by local media as saying the cold testing, which usually include the initial startup of fluid systems and support systems, will take place early in the Iranian new year that begins this Sunday, Reuters reported.

“In other words, we have advanced work in the field of fuel, storage, etc,” Kamalvandi said.

Iran has recently accelerated its breaches of the 2015 international nuclear deal in an apparent bid to pressure US President Joe Biden to reverse his predecessor’s abandonment of the agreement. Both sides are locked in a standoff over who should move first to save the deal.

Iran agreed to shut down the reactor at Arak – about 250 kilometers southwest of Tehran – under the 2015 deal. It was allowed to produce a limited amount of heavy water and Tehran has been working on redesigning the reactor. It says it plans to make isotopes for medical and agricultural use.

The International Atomic Energy Agency said in a report to member states earlier this week that Iran has started enriching uranium at its underground Natanz plant with a second type of advanced centrifuge, the IR-4, in a further breach of the deal.

Last year Iran started moving three cascades, or clusters, of different advanced models of centrifuge from an above-ground plant at Natanz to its below-ground Fuel Enrichment Plant (FEP). It is already enriching underground with IR-2m centrifuges. The deal only lets it enrich there with first-generation IR-1 machines.

Iran is enriching up to 20 percent purity at another plant, Fordow.



Suspected Israeli Hackers Claim to Destroy Data at Iran’s Bank Sepah

People watch as smoke rises following an Israeli attack on the IRIB building, the country's state broadcaster, in Tehran, Iran, June 16, 2025. Majid Asgaripour/WANA (West Asia News Agency) via Reuters
People watch as smoke rises following an Israeli attack on the IRIB building, the country's state broadcaster, in Tehran, Iran, June 16, 2025. Majid Asgaripour/WANA (West Asia News Agency) via Reuters
TT
20

Suspected Israeli Hackers Claim to Destroy Data at Iran’s Bank Sepah

People watch as smoke rises following an Israeli attack on the IRIB building, the country's state broadcaster, in Tehran, Iran, June 16, 2025. Majid Asgaripour/WANA (West Asia News Agency) via Reuters
People watch as smoke rises following an Israeli attack on the IRIB building, the country's state broadcaster, in Tehran, Iran, June 16, 2025. Majid Asgaripour/WANA (West Asia News Agency) via Reuters

An anti-Iranian government hacking group with potential ties to Israel and a track record of destructive cyberattacks on Iran claimed in social media posts on Tuesday that it had destroyed data at Iran’s state-owned Bank Sepah.

The group, known as Gonjeshke Darande, or “Predatory Sparrow”, hacked the bank because they accused it of helping fund Iran's military, according to one of the messages posted online.

The hack comes amid increasing hostilities between Israel and Iran, after Israel attacked multiple military and nuclear targets in Iran last week. Both sides have launched multiple missile attacks against each other in the days since.

Reuters could not immediately verify the attack on Bank Sepah. The bank's website was offline on Tuesday and its London-based subsidiary, Bank Sepah International plc, did not immediately respond to an emailed request for comment.

Customers were having problems accessing their accounts, according to Israeli media.

Gonjeshke Darande did not respond to multiple messages sent via social media.

“Disrupting the availability of this bank’s funds, or triggering a broader collapse of trust in Iranian banks, could have major impacts there,” Rob Joyce, the former top cybersecurity official at the NSA, said in a post on X.

In 2022, Gonjeshke Darande claimed responsibility for a cyberattack against an Iranian steel production facility. The sophisticated attack caused a large fire at the facility, resulting in tangible, offline damage.

Such attacks are usually beyond the capabilities of activist hackers, security experts say, and would be more in line with the capabilities of a nation state.

The group has also been publicly linked by cybersecurity researchers to a 2021 cyberattack that caused widespread outages at gas stations across Iran.

Israel has never formally acknowledged that it is behind the group, although Israeli media has widely reported Gonjeshke Darande as “Israel-linked”.