Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Upwork Freelancers vs Dedicated React.js Teams: What’s Better for Your Project in 2025?

      August 1, 2025

      Is Agile dead in the age of AI?

      August 1, 2025

      Top 15 Enterprise Use Cases That Justify Hiring Node.js Developers in 2025

      July 31, 2025

      The Core Model: Start FROM The Answer, Not WITH The Solution

      July 31, 2025

      Anthropic beats OpenAI as the top LLM provider for business – and it’s not even close

      August 2, 2025

      I bought Samsung’s Galaxy Watch Ultra 2025 – here’s why I have buyer’s remorse

      August 2, 2025

      I can admit when I’m wrong — this 75% wireless gaming keyboard is way better than I thought it would be

      August 2, 2025

      This is Microsoft’s canceled Windows-based Surface Duo — the dual-screen Windows Phone from 2018 that we never got

      August 2, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      August 2, 2025
      Recent

      The details of TC39’s last meeting

      August 2, 2025

      Enhancing Laravel Queries with Reusable Scope Patterns

      August 1, 2025

      Everything We Know About Livewire 4

      August 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      I can admit when I’m wrong — this 75% wireless gaming keyboard is way better than I thought it would be

      August 2, 2025
      Recent

      I can admit when I’m wrong — this 75% wireless gaming keyboard is way better than I thought it would be

      August 2, 2025

      This is Microsoft’s canceled Windows-based Surface Duo — the dual-screen Windows Phone from 2018 that we never got

      August 2, 2025

      Looking for an Ubuntu Manual? Try This Book

      August 2, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Israel-Iran Conflict Sparks Wider Cyber Conflict, New Malware

    Israel-Iran Conflict Sparks Wider Cyber Conflict, New Malware

    June 18, 2025

    Israel-Iran conflict hacktivism

    The Israel-Iran conflict that began with Israeli attacks on Iranian nuclear and military targets on June 13 has sparked a wider cyber conflict in the region, including the launch of new malware campaigns.

    Cyble threat intelligence researchers documented cyberattacks by 74 hacktivist groups in the Middle East region between June 13 and 17. The vast majority of the hacktivist groups – more than 90% – are considered pro-Iran. Most of the cyberattacks have targeted Israeli organizations. Iran has been a target in several of the cyberattacks, and the regional cyber conflict has also spilled over into Egypt, Jordan, the UAE, Pakistan and Saudi Arabia.

    Cyberattacks launched by hacktivist groups in the region have included DDoS attacks, website defacements, unauthorized access, and data breaches – and the launch of ransomware/wiper and banking malware campaigns. In the midst of the increased cyber activity, Iran has apparently begun restricting internet access in an attempt to limit Israeli cyber operations.

    Middle East Hacktivism Includes Information Operations

    After the outbreak of hostilities on June 13, Cyble detected a significant escalation in hacktivist activity targeting Israel and several regional states. The operations were driven by a broad coalition of ideologically motivated actors, many of whom identify with pro-Palestinian, pro-Iranian, or anti-Western narratives, Cyble said in an advisory to threat intelligence clients this week.

    Israel was the principal target, with dozens of cyberattacks affecting government, defense, media, telecom, finance, education, and emergency services. The majority of incidents involved distributed denial-of-service (DDoS) attacks, but there were also cases of unauthorized access, defacement, data breaches, and ransomware deployment.

    Hashtags used in the cyber campaigns have included:

    • #SalomZionist
    • #OpIsrael
    • #OneUmmah
    • #FreePalestine
    • #SupportIran
    • #HackForHumanity
    • #OpJordan

    The full list of hacktivist groups detected by Cyble is detailed in the graphic below:

    Hacktivism groups active in Israel-Iran conflict
    Hacktivism groups active in Israel-Iran conflict (Cyble)

    In addition to publicizing their own DDoS attacks and defacement operations, hacktivist groups have been systematically using their Telegram channels to amplify the broader cyber and geopolitical narrative. This includes reposting claims of attacks by affiliated or ideologically aligned collectives, thus reinforcing “a sense of decentralized coordination,” Cyble said.

    The groups’ content streams frequently include pro-Iranian and pro-Palestinian narratives, often framed in “emotive and polarizing terms,” the researchers said. A notable trend is the circulation of video footage depicting missile strikes and drone operations, alongside graphic images of casualties from the Iranian side.

    “These materials serve both as mobilization tools and as psychological warfare, blurring the line between cyber activity and information operations,” the Cyble advisory said. “The groups appear to position themselves not only as digital combatants but also as part of a broader resistance media ecosystem.”

    Hacktivist Attacks: DDoS, Breaches, Malware Campaigns

    Among the cyberattack claims documented by Cyble were five ransomware/extortion attacks claimed by Handala Group against Israeli organizations, including media, telecom, construction, education, and chemical/energy targets. The group provided data samples in two of the five claimed attacks.

    Other notable hacktivist attack claims documented by Cyble in recent days included 34 DDoS attacks, five defacements, two data breaches, two cases of unauthorized access, a claim of a ransomware attack against an Israeli government target, and four incidents involving data or credential leaks.

    Among the hacktivist groups active in recent days and their targets were:

    Hacktivist groupTarget
    Anonymous GuysIsrael
    Arabian GhostsJordan
    Handala HackIsrael
    Server KillersIsrael
    RipperSecIsrael
    DienetIsrael
    LulzSec BlackIsrael
    Cyber Ghost TeamIsrael
    Keymous+Egypt
    GhostSecIsrael
    Dark Storm TeamIsrael
    Yemen Cyber ArmySaudi Arabia
    Anonymous Syria HackersIran
    Red EaglePakistan
    Mysterios TeamEgypt
    Tunisian MaskersEgypt
    Unit NineEgypt
    Islamic Hacker ArmyIran
    Cyber Islamic ResistanceIsrael
    Nation of SaviorsIsrael
    Unknown Cybers TeamUAE
    Mr HamzaIsrael
    EvilByteIsrael
    Digital GhostIsrael
    Cyber Fattah TeamIsrael
    Predatory SparrowIran

    On June 16, a ransomware or wiper executable identified as “encryption.exe” was observed in the wild and attributed to a previously unreported threat actor known as Anon-g Fox. Notably, the malware checks the system’s time zone as Israel Standard Time (IST) and language as Hebrew before further executing. If those conditions are not present, it prevents execution with the error statement ‘This program can only run in Isreal’, thus suggesting a geopolitical motive, potentially linked to the ongoing Iran-Israel cyber conflict.

    Cyble Research and Intelligence Labs researchers also uncovered a campaign involving the IRATA Android malware targeting banking applications in Iran. The malware has been observed impersonating government entities, including the Judicial System of the Islamic Republic of Iran and the Ministry of Economic Affairs and Finance. It targets over 50 banking and cryptocurrency applications, abusing the Accessibility service to identify the targeted bank, steal bank account numbers and balances, and harvest card data.

    The malware is capable of remotely controlling the infected device and executing various actions such as hiding its icon, collecting SMS messages and contacts, capturing screenshots, and retrieving a list of installed applications. These capabilities enable the malware to gather comprehensive information, which can be used to carry out fraudulent transactions from the victim’s account, potentially leading to significant financial loss.

    Hacktivists and Conflict

    Hacktivists often see conflict as an opportunity to promote their agenda, to retaliate, and to amplify impressions of fear and chaos, as happened in the Indian state of Jammu and Kashmir last month. And as the Iran-Israel conflict shows, allied nations on either side of a conflict can find themselves targeted by hacktivist attacks. Even before hostilities between Israel and Iran broke out last week, the U.S. was offering a reward for information on CyberAv3ngers/Mr. Soul – a threat actor allegedly aligned with Iran’s IRGC Cyber-Electronic Command – for alleged cyberattacks against critical infrastructure in the U.S. and elsewhere.

    Organizations that could find themselves a target of hacktivism are advised to invest in DDoS protections and to take steps to ensure against data breaches, website defacements – and increasingly, ransomware attacks.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleVidsYouTube – Free Online Video Downloader for YouTube, TikTok, Instagram & More
    Next Article FedRAMP at Startup Speed: Lessons Learned

    Related Posts

    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    August 2, 2025
    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    August 2, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Bill Gates says “AI will replace humans for most things” in 20 years, including blue-and white-collar jobs — but floats short work weeks and early retirement as trade-offs

    News & Updates

    CVE-2025-46569 – Open Policy Agent (OPA) HTTP Data API Code Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Playwright MCP: Expert Strategies for Success

    Development

    CVE-2025-6647 – PDF-XChange Editor U3D File Parsing Remote Code Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-7401 – WordPress Premium Age Verification/Restriction Remote File Read/Write Vulnerability

    July 11, 2025

    CVE ID : CVE-2025-7401

    Published : July 11, 2025, 5:15 a.m. | 4 hours, 22 minutes ago

    Description : The Premium Age Verification / Restriction for WordPress plugin for WordPress is vulnerable to arbitrary file read and write due to the existence of an insufficiently protected remote support functionality in remote_tunnel.php in all versions up to, and including, 3.0.2. This makes it possible for unauthenticated attackers to read from or write to arbitrary files on the affected site’s server which may make the exposure of sensitive information or remote code execution possible.

    Severity: 9.8 | CRITICAL

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    JetBrains YouTrack Price Hike: New Plans & Features Arrive October 1, 2025

    July 1, 2025

    Last Week in AI #312 – Meta’s Superintelligence lab, Anthropic & Midjourney sued

    June 17, 2025

    CVE-2025-45387 – osTicket Broken Access Control Vulnerability

    June 2, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.