Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: Using the Old Bean

      June 19, 2025

      IBM launches new integration to help unify AI security and governance

      June 18, 2025

      Meet Accessible UX Research, A Brand-New Smashing Book

      June 18, 2025

      Modernizing your approach to governance, risk and compliance

      June 18, 2025

      RAIDOU Remastered: The Mystery of the Soulless Army Review (PC) – A well-done action-RPG remaster that makes me hopeful for more revivals of classic Atlus titles

      June 18, 2025

      With Windows 10 circling the drain, Windows 11 sees a long-overdue surge

      June 18, 2025

      This PC app boosts FPS in any game on any GPU for only $7 — and it just got a major update

      June 18, 2025

      Sam Altman claims Meta is trying to poach OpenAI staffers with $100 million bonuses, but “none of our best people have decided to take them up on that”

      June 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Manipulate Image URLs in Laravel with the Image Transform Package

      June 19, 2025
      Recent

      Manipulate Image URLs in Laravel with the Image Transform Package

      June 19, 2025

      How cron and Task Scheduler work in Laravel

      June 19, 2025

      Laravel: Import Very Large CSV With Jobs and Queues

      June 19, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      FOSS Weekly #25.25: Nitrux Hyprland, Joplin Tips, Denmark Ditching Microsoft, Tiling Moves and More Linux Stuff

      June 19, 2025
      Recent

      FOSS Weekly #25.25: Nitrux Hyprland, Joplin Tips, Denmark Ditching Microsoft, Tiling Moves and More Linux Stuff

      June 19, 2025

      BrosTrend 5 Port 2.5GB Switch Review

      June 19, 2025

      Cuneo is a widget-like calculator and conversion tool

      June 19, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Israel-Iran Conflict Sparks Wider Cyber Conflict, New Malware

    Israel-Iran Conflict Sparks Wider Cyber Conflict, New Malware

    June 18, 2025

    Israel-Iran conflict hacktivism

    The Israel-Iran conflict that began with Israeli attacks on Iranian nuclear and military targets on June 13 has sparked a wider cyber conflict in the region, including the launch of new malware campaigns.

    Cyble threat intelligence researchers documented cyberattacks by 74 hacktivist groups in the Middle East region between June 13 and 17. The vast majority of the hacktivist groups – more than 90% – are considered pro-Iran. Most of the cyberattacks have targeted Israeli organizations. Iran has been a target in several of the cyberattacks, and the regional cyber conflict has also spilled over into Egypt, Jordan, the UAE, Pakistan and Saudi Arabia.

    Cyberattacks launched by hacktivist groups in the region have included DDoS attacks, website defacements, unauthorized access, and data breaches – and the launch of ransomware/wiper and banking malware campaigns. In the midst of the increased cyber activity, Iran has apparently begun restricting internet access in an attempt to limit Israeli cyber operations.

    Middle East Hacktivism Includes Information Operations

    After the outbreak of hostilities on June 13, Cyble detected a significant escalation in hacktivist activity targeting Israel and several regional states. The operations were driven by a broad coalition of ideologically motivated actors, many of whom identify with pro-Palestinian, pro-Iranian, or anti-Western narratives, Cyble said in an advisory to threat intelligence clients this week.

    Israel was the principal target, with dozens of cyberattacks affecting government, defense, media, telecom, finance, education, and emergency services. The majority of incidents involved distributed denial-of-service (DDoS) attacks, but there were also cases of unauthorized access, defacement, data breaches, and ransomware deployment.

    Hashtags used in the cyber campaigns have included:

    • #SalomZionist
    • #OpIsrael
    • #OneUmmah
    • #FreePalestine
    • #SupportIran
    • #HackForHumanity
    • #OpJordan

    The full list of hacktivist groups detected by Cyble is detailed in the graphic below:

    Hacktivism groups active in Israel-Iran conflict
    Hacktivism groups active in Israel-Iran conflict (Cyble)

    In addition to publicizing their own DDoS attacks and defacement operations, hacktivist groups have been systematically using their Telegram channels to amplify the broader cyber and geopolitical narrative. This includes reposting claims of attacks by affiliated or ideologically aligned collectives, thus reinforcing “a sense of decentralized coordination,” Cyble said.

    The groups’ content streams frequently include pro-Iranian and pro-Palestinian narratives, often framed in “emotive and polarizing terms,” the researchers said. A notable trend is the circulation of video footage depicting missile strikes and drone operations, alongside graphic images of casualties from the Iranian side.

    “These materials serve both as mobilization tools and as psychological warfare, blurring the line between cyber activity and information operations,” the Cyble advisory said. “The groups appear to position themselves not only as digital combatants but also as part of a broader resistance media ecosystem.”

    Hacktivist Attacks: DDoS, Breaches, Malware Campaigns

    Among the cyberattack claims documented by Cyble were five ransomware/extortion attacks claimed by Handala Group against Israeli organizations, including media, telecom, construction, education, and chemical/energy targets. The group provided data samples in two of the five claimed attacks.

    Other notable hacktivist attack claims documented by Cyble in recent days included 34 DDoS attacks, five defacements, two data breaches, two cases of unauthorized access, a claim of a ransomware attack against an Israeli government target, and four incidents involving data or credential leaks.

    Among the hacktivist groups active in recent days and their targets were:

    Hacktivist group Target
    Anonymous Guys Israel
    Arabian Ghosts Jordan
    Handala Hack Israel
    Server Killers Israel
    RipperSec Israel
    Dienet Israel
    LulzSec Black Israel
    Cyber Ghost Team Israel
    Keymous+ Egypt
    GhostSec Israel
    Dark Storm Team Israel
    Yemen Cyber Army Saudi Arabia
    Anonymous Syria Hackers Iran
    Red Eagle Pakistan
    Mysterios Team Egypt
    Tunisian Maskers Egypt
    Unit Nine Egypt
    Islamic Hacker Army Iran
    Cyber Islamic Resistance Israel
    Nation of Saviors Israel
    Unknown Cybers Team UAE
    Mr Hamza Israel
    EvilByte Israel
    Digital Ghost Israel
    Cyber Fattah Team Israel
    Predatory Sparrow Iran

    On June 16, a ransomware or wiper executable identified as “encryption.exe” was observed in the wild and attributed to a previously unreported threat actor known as Anon-g Fox. Notably, the malware checks the system’s time zone as Israel Standard Time (IST) and language as Hebrew before further executing. If those conditions are not present, it prevents execution with the error statement ‘This program can only run in Isreal’, thus suggesting a geopolitical motive, potentially linked to the ongoing Iran-Israel cyber conflict.

    Cyble Research and Intelligence Labs researchers also uncovered a campaign involving the IRATA Android malware targeting banking applications in Iran. The malware has been observed impersonating government entities, including the Judicial System of the Islamic Republic of Iran and the Ministry of Economic Affairs and Finance. It targets over 50 banking and cryptocurrency applications, abusing the Accessibility service to identify the targeted bank, steal bank account numbers and balances, and harvest card data.

    The malware is capable of remotely controlling the infected device and executing various actions such as hiding its icon, collecting SMS messages and contacts, capturing screenshots, and retrieving a list of installed applications. These capabilities enable the malware to gather comprehensive information, which can be used to carry out fraudulent transactions from the victim’s account, potentially leading to significant financial loss.

    Hacktivists and Conflict

    Hacktivists often see conflict as an opportunity to promote their agenda, to retaliate, and to amplify impressions of fear and chaos, as happened in the Indian state of Jammu and Kashmir last month. And as the Iran-Israel conflict shows, allied nations on either side of a conflict can find themselves targeted by hacktivist attacks. Even before hostilities between Israel and Iran broke out last week, the U.S. was offering a reward for information on CyberAv3ngers/Mr. Soul – a threat actor allegedly aligned with Iran’s IRGC Cyber-Electronic Command – for alleged cyberattacks against critical infrastructure in the U.S. and elsewhere.

    Organizations that could find themselves a target of hacktivism are advised to invest in DDoS protections and to take steps to ensure against data breaches, website defacements – and increasingly, ransomware attacks.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleVidsYouTube – Free Online Video Downloader for YouTube, TikTok, Instagram & More
    Next Article FedRAMP at Startup Speed: Lessons Learned

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2005-2347 – CVE-2022-1234: Apache Struts XML Entity Expansion (XXE) Vulnerability

    June 19, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-32896 – Apache SeaTunnel Unauthenticated Arbitrary File Read and Deserialization Vulnerability

    June 19, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-36049 – IBM webMethods Integration Server XML External Entity Injection (XXE) Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-0913 – Apache os File Symlink Creation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Exploit CVE-2019-9978: Remote Code Execution in Social Warfare WordPress Plugin (<= 3.5.2)

    Security

    CVE-2025-4064 – ScriptAndTools Online-Travling-System Remote File Inclusion Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-31235 – “Apple iPadOS and macOS Double Free Vulnerability”

    May 12, 2025

    CVE ID : CVE-2025-31235

    Published : May 12, 2025, 10:15 p.m. | 1 hour, 28 minutes ago

    Description : A double free issue was addressed with improved memory management. This issue is fixed in iPadOS 17.7.7, macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. An app may be able to cause unexpected system termination.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    How we’re making security easier for the average developer

    April 10, 2025

    Top 25 Terraform Interview Questions for Beginners

    May 17, 2025

    CVE-2024-46899 – Hitachi Ops Center Analyzer Viewpoint OVF Authentication Credentials Leakage Vulnerability

    April 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.