Cyberwarfare / Nation-State Attacks,
Fraud Management & Cybercrime
While Exceptions Apply, Such Efforts Often Only Amount to Psychological Operations

The ongoing missile exchanges between Israel and Iran have marked their eighth day, leaving behind a trail of devastation. Amidst this conflict, hacktivist groups have seized the moment to intensify their activities, although the actual impact of these actions appears largely psychosocial rather than physically disruptive.
Security analysts have reported a substantial surge in cyberattacks correlated with the escalating violence, beginning shortly after Israeli strikes on Iranian military and nuclear installations on June 13. Hacktivist factions assert involvement in website defacements, distributed denial-of-service (DDoS) assaults, and leaking sensitive data, with reports also indicating the emergence of wiper and banking malware.
Tracking over 70 active hacktivist entities in the region, experts show a striking tendency towards pro-Iran sentiments among these groups, with 90% reportedly aligning with narratives supportive of pro-Palestinian and anti-Western objectives, as noted by threat intelligence firm Cyble. Various sectors in Israel, encompassing government, defense, media, finance, and emergency services, have become prime targets.
Interestingly, this upsurge in attacks occurs concurrent with Iran’s efforts to restrict domestic internet access, ostensibly as part of measures to limit covert Israeli operations within its territory.
Notable hacktivist organizations targeting Israel include Anonymous Guys, GhostSec, LulzSec Black, Dark Storm Team, and Cyber Islamic Resistance. The pro-Palestinian collective Handala has notably escalated its attacks, listing numerous Israeli corporations on its data-leak platform, including major energy firms.
Countering these actions, several groups have redirected their cyber offensives towards Iranian targets, including Anonymous Syria Hackers and the Islamic Hacker Army, the latter of which may enjoy state sponsorship.
The conflict’s ramifications appear to extend beyond the primary actors, with a marked increase in hacktivist activities aimed at other Middle Eastern nations, as identified by Cyble. Countries such as Egypt, Jordan, Pakistan, Saudi Arabia, and the United Arab Emirates have reported escalating cyber hostilities by various hacktivist groups.
Recently, researchers identified a malicious wiper malware variant, dubbed Anon-g Fox, which manifests distinctive triggers contingent on system settings reflecting Israeli locale. Such coding decisions further underscore the geopolitical underpinnings of these cyber operations.
Historically, hacktivism has demonstrated that tangible repercussions are often minimal, especially in the wake of events like the Russia-Ukraine conflict and other regional tensions. However, exceptions do occur, such as with the pro-Israel entity Gonjeshke Darande, which has been linked to significant disruptions in infrastructure, including claims related to Iran’s Bank Sepah.
As Iran continues to navigate the precarious landscape of international cyber engagements, one pivotal consideration is whether state-backed hackers will escalate their tactics as a form of retaliation. While some experts deem such a move improbable, caution against underestimating the disruptive potential of Iran’s cyber capabilities remains prudent.
In conclusion, business owners and cybersecurity professionals should remain vigilant in light of these developments. The likelihood of malicious cyber actors employing adversarial tactics, as categorized by the MITRE ATT&CK framework—ranging from initial access to persistence and data exfiltration—is significantly heightened amid ongoing regional conflicts.