Pakistan says ‘terrorists’ operating from Iran kill four soldiers
Share this Story: Pakistan says ‘terrorists’ operating from Iran kill four soldiers Copy Link Email Facebook Twitter Reddit LinkedIn Tumblr Breadcrumb Trail Links PMN Politics PMN News PMN Crime Pakistan says ‘terrorists’ operating from Iran kill four soldiers Author of the article: Reuters Gul Yousafzai Published Apr 01, 2023 • 1 minute read Join the
Share this Story: Pakistan says ‘terrorists’ operating from Iran kill four soldiers
Copy Link
Email
Facebook
Twitter
Reddit
LinkedIn
Tumblr
Pakistan says ‘terrorists’ operating from Iran kill four soldiers
Author of the article:
Reuters
Gul Yousafzai
Published Apr 01, 2023 • 1 minute read
Join the conversation
Article content
QUETTA — Pakistan’s army said on Saturday that four of its border patrol soldiers had been killed by a group operating from Iran, in an attack which was condemned by Prime Minister Shehbaz Sharif.
We apologize, but this video has failed to load.
Try refreshing your browser, or tap here to see other videos from our team.
Pakistan says ‘terrorists’ operating from Iran kill four soldiersBack to video
A separatist group, Baluch Liberation Army (BLA), which has previously been involved in attacks on Pakistani security forces and Chinese interests in the region, claimed responsibility in an emailed statement.
Insurgent ethnic Baluch nationalist groups, which operate on both sides of the border, have been fighting for decades for a greater share of regional resources.
Advertisement 2
Story continues below
This advertisement has not loaded yet, but your article continues below.
THIS CONTENT IS RESERVED FOR SUBSCRIBERS
Enjoy the latest local, national and international news.
Exclusive articles by Conrad Black, Barbara Kay, Rex Murphy and others. Plus, special edition NP Platformed and First Reading newsletters and virtual events.
Unlimited online access to National Post and 15 news sites with one account.
National Post ePaper, an electronic replica of the print edition to view on any device, share and comment on.
Daily puzzles including the New York Times Crossword.
Support local journalism.
SUBSCRIBE FOR MORE ARTICLES
Enjoy the latest local, national and international news.
Exclusive articles by Conrad Black, Barbara Kay, Rex Murphy and others. Plus, special edition NP Platformed and First Reading newsletters and virtual events
Unlimited online access to National Post and 15 news sites with one account.
National Post ePaper, an electronic replica of the print edition to view on any device, share and comment on.
Daily puzzles including the New York Times Crossword.
Support local journalism.
REGISTER FOR MORE ARTICLES
Create an account or sign in to continue with your reading experience.
Access articles from across Canada with one account.
Share your thoughts and join the conversation in the comments.
Enjoy additional articles per month.
Get email updates from your favourite authors.
Don’t have an account? Create Account
or
View more offers
Article content
The incident took place in the Kech district in southwestern Baluchistan province, which shares a long lawless border with Afghanistan and Iran.
“A group of terrorists operating from Iranian side attacked a routine border patrol of Pakistani security forces operating along Pakistan-Iran Border,” the army said in a statement.
The Baluchistan province is rich in natural gas and minerals and also has the deep-water Gawadar port, which is being developed with Chinese money as part of Beijing’s $65 billion “Belt and Road” investment in Pakistan.
The army said Pakistani authorities were making contact with Iran to seek ways of preventing such incidents in future.
Iranian officials were not immediately available to comment on Saturday, an annual holiday in Iran.
Iranian state media said Iran’s embassy in Islamabad “condemned the terrorist attack in Baluchistan state and said terrorism is a common affliction of the two friendly and neighboring countries.” (Reporting by Gul Yousafzai; Additional Reporting Saud Mehsud in Dera Ismail Khan, Pakistan and Dubai newsroom; Writing by Asif Shahzad, Editing by William Maclean, Giles Elgood and Alexander Smith)
Share this article in your social network
Share this Story: Pakistan says ‘terrorists’ operating from Iran kill four soldiers
Copy Link
Email
Facebook
Twitter
Reddit
LinkedIn
Tumblr
Comments
Postmedia is committed to maintaining a lively but civil forum for discussion and encourage all readers to share their views on our articles. Comments may take up to an hour for moderation before appearing on the site. We ask you to keep your comments relevant and respectful. We have enabled email notifications—you will now receive an email if you receive a reply to your comment, there is an update to a comment thread you follow or if a user you follow comments. Visit our Community Guidelines for more information and details on how to adjust your email settings.
Join the Conversation
Trending
Man killed after reacting to Facebook photo with laugh emoji
Largest PSAC-affiliated union calls on members to vote against new tentative agreement
John Ivison: Liberals’ passport redesign latest attempt to reshape Canada’s symbols
Terry Glavin: Why we may have finally reached a tipping point on Chinese interference
Sabrina Maddeaux: Trudeau Foundation so arrogant, it thought it was influencing China
Shopping essentials
Planning a trip to Vegas: How to book, what to pack and where to stay
Plus what to eat, drink and experience while you’re there
47 minutes ago Shopping Essentials
30 best online deals in the Canadian retail space right now
Best Buy, Our Place and Brooklinen, to name a few
3 hours ago Shopping Essentials
Advertisement 1
Story continues below
This advertisement has not loaded yet, but your article continues below.
Beauty Bar: Carol’s Daughter Coco Crème Curl Quenching Shampoo and Conditioner
A hair care product duo from the Brooklyn-based brand Carol’s Daughter that specifically targets the needs of those with curly hair.
3 hours ago Fashion & Beauty
LAST CHANCE: Get lifetime access to Microsoft Office 2021 for $54.99
Don’t miss this deal on Microsoft Office’s full suite of applications and tools
5 hours ago Business Essentials
Hair care and styling tools that are worth the hype
Options for different preferences, hair types and budgets
7 hours ago Shopping Essentials
This Week in Flyers
Article content
QUETTA — Pakistan’s army said on Saturday that four of its border patrol soldiers had been killed by a group operating from Iran, in an attack which was condemned by Prime Minister Shehbaz Sharif.
We apologize, but this video has failed to load.
Try refreshing your browser, or tap here to see other videos from our team.
Pakistan says ‘terrorists’ operating from Iran kill four soldiersBack to video
A separatist group, Baluch Liberation Army (BLA), which has previously been involved in attacks on Pakistani security forces and Chinese interests in the region, claimed responsibility in an emailed statement.
Insurgent ethnic Baluch nationalist groups, which operate on both sides of the border, have been fighting for decades for a greater share of regional resources.
Advertisement 2
Story continues below
This advertisement has not loaded yet, but your article continues below.
THIS CONTENT IS RESERVED FOR SUBSCRIBERS
Enjoy the latest local, national and international news.
Exclusive articles by Conrad Black, Barbara Kay, Rex Murphy and others. Plus, special edition NP Platformed and First Reading newsletters and virtual events.
Unlimited online access to National Post and 15 news sites with one account.
National Post ePaper, an electronic replica of the print edition to view on any device, share and comment on.
Daily puzzles including the New York Times Crossword.
Support local journalism.
SUBSCRIBE FOR MORE ARTICLES
Enjoy the latest local, national and international news.
Exclusive articles by Conrad Black, Barbara Kay, Rex Murphy and others. Plus, special edition NP Platformed and First Reading newsletters and virtual events
Unlimited online access to National Post and 15 news sites with one account.
National Post ePaper, an electronic replica of the print edition to view on any device, share and comment on.
Daily puzzles including the New York Times Crossword.
Support local journalism.
REGISTER FOR MORE ARTICLES
Create an account or sign in to continue with your reading experience.
Access articles from across Canada with one account.
Share your thoughts and join the conversation in the comments.
Enjoy additional articles per month.
Get email updates from your favourite authors.
Don’t have an account? Create Account
or
View more offers
Article content
The incident took place in the Kech district in southwestern Baluchistan province, which shares a long lawless border with Afghanistan and Iran.
“A group of terrorists operating from Iranian side attacked a routine border patrol of Pakistani security forces operating along Pakistan-Iran Border,” the army said in a statement.
The Baluchistan province is rich in natural gas and minerals and also has the deep-water Gawadar port, which is being developed with Chinese money as part of Beijing’s $65 billion “Belt and Road” investment in Pakistan.
The army said Pakistani authorities were making contact with Iran to seek ways of preventing such incidents in future.
Iranian officials were not immediately available to comment on Saturday, an annual holiday in Iran.
Iranian state media said Iran’s embassy in Islamabad “condemned the terrorist attack in Baluchistan state and said terrorism is a common affliction of the two friendly and neighboring countries.” (Reporting by Gul Yousafzai; Additional Reporting Saud Mehsud in Dera Ismail Khan, Pakistan and Dubai newsroom; Writing by Asif Shahzad, Editing by William Maclean, Giles Elgood and Alexander Smith)
Share this article in your social network
Share this Story: Pakistan says ‘terrorists’ operating from Iran kill four soldiers
Copy Link
Email
Facebook
Twitter
Reddit
LinkedIn
Tumblr
Comments
Postmedia is committed to maintaining a lively but civil forum for discussion and encourage all readers to share their views on our articles. Comments may take up to an hour for moderation before appearing on the site. We ask you to keep your comments relevant and respectful. We have enabled email notifications—you will now receive an email if you receive a reply to your comment, there is an update to a comment thread you follow or if a user you follow comments. Visit our Community Guidelines for more information and details on how to adjust your email settings.
Join the Conversation
Trending
Man killed after reacting to Facebook photo with laugh emoji
Largest PSAC-affiliated union calls on members to vote against new tentative agreement
John Ivison: Liberals’ passport redesign latest attempt to reshape Canada’s symbols
Terry Glavin: Why we may have finally reached a tipping point on Chinese interference
Sabrina Maddeaux: Trudeau Foundation so arrogant, it thought it was influencing China
Shopping essentials
Planning a trip to Vegas: How to book, what to pack and where to stay
Plus what to eat, drink and experience while you’re there
47 minutes ago Shopping Essentials
30 best online deals in the Canadian retail space right now
Best Buy, Our Place and Brooklinen, to name a few
3 hours ago Shopping Essentials
Advertisement 1
Story continues below
This advertisement has not loaded yet, but your article continues below.
Beauty Bar: Carol’s Daughter Coco Crème Curl Quenching Shampoo and Conditioner
A hair care product duo from the Brooklyn-based brand Carol’s Daughter that specifically targets the needs of those with curly hair.
3 hours ago Fashion & Beauty
LAST CHANCE: Get lifetime access to Microsoft Office 2021 for $54.99
Don’t miss this deal on Microsoft Office’s full suite of applications and tools
5 hours ago Business Essentials
Hair care and styling tools that are worth the hype
Options for different preferences, hair types and budgets
Social media users circulated images and NASA FIRMS satellite data suggesting three ships were on fire in the Gulf of Oman near the Strait of Hormuz. British firm Ambrey confirmed awareness of an incident off Khor Fakkan but stated it was not security-related…
Published
2 weeks ago
in
By
Social media users circulated images and NASA FIRMS satellite data suggesting three ships were on fire in the Gulf of Oman near the Strait of Hormuz. British firm Ambrey confirmed awareness of an incident off Khor Fakkan but stated it was not security-related… Read More
Regulators in the UK have taken a step closer to formal crypto oversight. The Financial Conduct Authority (FCA) has opened consultations on new rules governing stablecoins and the custody of digital assets. The proposals are part of an effort to establish a safer, more transparent environment for crypto services…
Published
1 month ago
in
By
Regulators in the UK have taken a step closer to
formal crypto oversight. The Financial Conduct Authority (FCA) has opened consultations on new rules governing stablecoins and the custody of
digital assets. The proposals are part of an effort to establish a
safer, more transparent environment for crypto services… Read More
close Video Deepfake technology ‘is getting so easy now’: Cybersecurity expert Cybersecurity expert Morgan Wright breaks down the dangers of deepfake video technology on ‘Unfiltered.’ NEWYou can now listen to Fox News articles! Imagine your phone rings and the voice on the other end sounds just like your boss, a close friend, or even a
Published
1 month ago
in
By
close
Video
Deepfake technology ‘is getting so easy now’: Cybersecurity expert
Cybersecurity expert Morgan Wright breaks down the dangers of deepfake video technology on ‘Unfiltered.’
NEWYou can now listen to Fox News articles!
Imagine your phone rings and the voice on the other end sounds just like your boss, a close friend, or even a government official. They urgently ask for sensitive information, except it’s not really them. It’s a deepfake, powered by AI, and you’re the target of a sophisticated scam. These kinds of attacks are happening right now, and they’re getting more convincing every day.
That’s the warning sounded by the 2025 AI Security Report, unveiled at the RSA Conference (RSAC), one of the world’s biggest gatherings for cybersecurity experts, companies, and law enforcement. The report details how criminals are harnessing artificial intelligence to impersonate people, automate scams, and attack security systems on a massive scale.
From hijacked AI accounts and manipulated models to live video scams and data poisoning, the report paints a picture of a rapidly evolving threat landscape, one that’s touching more lives than ever before.
Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts, and exclusive deals – plus instant access to my free Ultimate Scam Survival Guide when you sign up!
Illustration of cybersecurity risks.(Kurt “CyberGuy” Knutsson)
AI tools are leaking sensitive data
One of the biggest risks of using AI tools is what users accidentally share with them. A recent analysis by cybersecurity firm Check Point found that 1 in every 80 AI prompts includes high-risk data, and about 1 in 13 contains sensitive information that could expose users or organizations to security or compliance risks.
This data can include passwords, internal business plans, client information, or proprietary code. When shared with AI tools that are not secured, this information can be logged, intercepted, or even leaked later.
Deepfake scams are now real-time and multilingual
AI-powered impersonation is getting more advanced every month. Criminals can now fake voices and faces convincingly in real time. In early 2024, a British engineering firm lost 20 million pounds after scammers used live deepfake video to impersonate company executives during a Zoom call. The attackers looked and sounded like trusted leaders and convinced an employee to transfer funds.
Real-time video manipulation tools are now being sold on criminal forums. These tools can swap faces and mimic speech during video calls in multiple languages, making it easier for attackers to run scams across borders.
Illustration of a person video conferencing on their laptop.(Kurt “CyberGuy” Knutsson)
AI is running phishing and scam operations at scale
Social engineering has always been a part of cybercrime. Now, AI is automating it. Attackers no longer need to speak a victim’s language, stay online constantly, or manually write convincing messages.
Tools like GoMailPro use ChatGPT to create phishing and spam emails with perfect grammar and native-sounding tone. These messages are far more convincing than the sloppy scams of the past. GoMailPro can generate thousands of unique emails, each slightly different in language and urgency, which helps them slip past spam filters. It is actively marketed on underground forums for around $500 per month, making it widely accessible to bad actors.
Another tool, the X137 Telegram Console, leverages Gemini AI to monitor and respond to chat messages automatically. It can impersonate customer support agents or known contacts, carrying out real-time conversations with multiple targets at once. The replies are uncensored, fast, and customized based on the victim’s responses, giving the illusion of a human behind the screen.
AI is also powering large-scale sextortion scams. These are emails that falsely claim to have compromising videos or photos and demand payment to prevent them from being shared. Instead of using the same message repeatedly, scammers now rely on AI to rewrite the threat in dozens of ways. For example, a basic line like “Time is running out” might be reworded as “The hourglass is nearly empty for you,” making the message feel more personal and urgent while also avoiding detection.
By removing the need for language fluency and manual effort, these AI tools allow attackers to scale their phishing operations dramatically. Even inexperienced scammers can now run large, personalized campaigns with almost no effort.
Stolen AI accounts are sold on the dark web
With AI tools becoming more popular, criminals are now targeting the accounts that use them. Hackers are stealing ChatGPT logins, OpenAI API keys, and other platform credentials to bypass usage limits and hide their identity. These accounts are often stolen through malware, phishing, or credential stuffing attacks. The stolen credentials are then sold in bulk on Telegram channels and underground forums. Some attackers are even using tools that can bypass multi-factor authentication and session-based security protections. These stolen accounts allow criminals to access powerful AI tools and use them for phishing, malware generation, and scam automation.
WHAT TO DO IF YOUR PERSONAL INFORMATION IS ON THE DARK WEB
Illustration of a person signing into their laptop.(Kurt “CyberGuy” Knutsson)
MALWARE STEALS BANK CARDS AND PASSWORDS FROM MILLIONS OF DEVICES
Jailbreaking AI is now a common tactic
Criminals are finding ways to bypass the safety rules built into AI models. On the dark web, attackers share techniques for jailbreaking AI so it will respond to requests that would normally be blocked. Common methods include:
Telling the AI to pretend it is a fictional character that has no rules or limitations
Phrasing dangerous questions as academic or research-related scenarios
Asking for technical instructions using less obvious wording so the request doesn’t get flagged
Some AI models can even be tricked into jailbreaking themselves. Attackers prompt the model to create input that causes it to override its own restrictions. This shows how AI systems can be manipulated in unexpected and dangerous ways.
AI-generated malware is entering the mainstream
AI is now being used to build malware, phishing kits, ransomware scripts, and more. Recently, a group called FunkSac was identified as the leading ransomware gang using AI. Its leader admitted that at least 20% of their attacks are powered by AI. FunkSec has also used AI to help launch attacks that flood websites or services with fake traffic, making them crash or go offline. These are known as denial-of-service attacks. The group even created its own AI-powered chatbot to promote its activities and communicate with victims on its public website..
Some cybercriminals are even using AI to help with marketing and data analysis after an attack. One tool called Rhadamanthys Stealer 0.7 claimed to use AI for “text recognition” to sound more advanced, but researchers later found it was using older technology instead. This shows how attackers use AI buzzwords to make their tools seem more advanced or trustworthy to buyers.
Other tools are more advanced. One example is DarkGPT, a chatbot built specifically to sort through huge databases of stolen information. After a successful attack, scammers often end up with logs full of usernames, passwords, and other private details. Instead of sifting through this data manually, they use AI to quickly find valuable accounts they can break into, sell, or use for more targeted attacks like ransomware.
Get a free scan to find out if your personal information is already out on the web
Poisoned AI models are spreading misinformation
Sometimes, attackers do not need to hack an AI system. Instead, they trick it by feeding it false or misleading information. This tactic is called AI poisoning, and it can cause the AI to give biased, harmful, or completely inaccurate answers. There are two main ways this happens:
Training poisoning: Attackers sneak false or harmful data into the model during development
Retrieval poisoning: Misleading content online gets planted, which the AI later picks up when generating answers
In 2024, attackers uploaded 100 tampered AI models to the open-source platform Hugging Face. These poisoned models looked like helpful tools, but when people used them, they could spread false information or output malicious code.
A large-scale example came from a Russian propaganda group called Pravda, which published more than 3.6 million fake articles online. These articles were designed to trick AI chatbots into repeating their messages. In tests, researchers found that major AI systems echoed these false claims about 33% of the time.
Illustration of a hacker at work(Kurt “CyberGuy” Knutsson)
HOW SCAMMERS USE AI TOOLS TO FILE PERFECT-LOOKING TAX RETURNS IN YOUR NAME
How to protect yourself from AI-driven cyber threats
AI-powered cybercrime blends realism, speed, and scale. These scams are not just harder to detect. They are also easier to launch. Here’s how to stay protected:
1) Avoid entering sensitive data into public AI tools: Never share passwords, personal details, or confidential business information in any AI chat, even if it seems private. These inputs can sometimes be logged or misused.
2) Use strong antivirus software: AI-generated phishing emails and malware can slip past outdated security tools. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices.
3) Turn on two-factor authentication (2FA):2FA adds an extra layer of protection to your accounts, including AI platforms. It makes it much harder for attackers to break in using stolen passwords.
4) Be extra cautious with unexpected video calls or voice messages: If something feels off, even if the person seems familiar, verify before taking action. Deepfake audio and video can sound and look very real.
5) Use a personal data removal service: With AI-powered scams and deepfake attacks on the rise, criminals are increasingly relying on publicly available personal information to craft convincing impersonations or target victims with personalized phishing. By using a reputable personal data removal service, you can reduce your digital footprint on data broker sites and public databases. This makes it much harder for scammers to gather the details they need to convincingly mimic your identity or launch targeted AI-driven attacks.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap – and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.
6) Consider identity theft protection: If your data is leaked through a scam, early detection is key. Identity protection services can monitor your information and alert you to suspicious activity. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.
7) Regularly monitor your financial accounts: AI-generated phishing, malware, and account takeover attacks are now more sophisticated and widespread than ever, as highlighted in the 2025 AI Security Report. By frequently reviewing your bank and credit card statements for suspicious activity, you can catch unauthorized transactions early, often before major damage is done. Quick detection is crucial, especially since stolen credentials a
Speaking at a side event during the Bitcoin 2025 conference in Las Vegas, Saylor called the transparency trend “a bad idea.” He warned that proof of reserves could endanger investors and institutions alike. “Publishing wallet addresses is like handing over a treasure map,” Saylor said. “It dilutes the security of the issuer…
Published
1 month ago
in
By
Speaking at a side event during the Bitcoin 2025 conference in Las Vegas, Saylor called the transparency trend “a bad idea.” He warned that proof of reserves could endanger investors and institutions alike. “Publishing wallet addresses is like handing over a treasure map,” Saylor said. “It dilutes the security of the issuer… Read More