During the past few years, the chronic military and political dimensions of the conflict between Israel and Iran have progressively taken on aspects of cyber warfare. This new battle arena involves state-sponsored groups and hacktivists targeting both countries’ critical infrastructure, financial systems, and public opinion.
Overview of Groups and Parties in Cyber Conflict
Pro-Iran Groups and Supporters
Cyber Fattah Team | Anonymous Iran |
7 October Union | РУССКИЙ ЗАДАЧА СИЛА | РТФ |
Z-BL4CX-H4T | VoltActivist |
Team Ahadun-Ahad | {DEDSEC MUSLIMS} | Khilafah H4ckers |
Anonymous Arabs | Noname057(16) |
High Society | UserSec |
Holy League | DEFACER INDONESIA |
SYLHET GANG-SG | MaghrebSec |
GhostSec | Black Maskers Army |
Anonymous Guys | AnonymousActivist |
Silent Cyber Force | Sumatra Selatan Cyber Team |
Ghost Of Gaza | Anonymous Muslims |
CyberDragon | Hacker Council Global |
DXPLOIT | Al Ahad |
Moroccan Black Cyber Army | CRYPTO CORP |
Pro-Palestine Hackers Movement | Keymous |
LAPSUS$ | DoubleFace |
KillSec | RipperSec |
RCH-SEC | Team 1945 |
Team insane Pakistan | Moroccan Dragons |
LulzSec Black | Evil of Anti ddos |
Anonymous Collective | Alixsec |
Examples of Attacks by Pro-Iranian Groups and Supporters
In the activity on Telegram detected by our team, the threat actor named “Moroccan Cyber Forces” claims to have leaked more than 200 login credentials of officials on Israeli WordPress websites.
In an activity on Telegram detected by our team, a threat actor named “Anonymous Guys” targeted Ben Gurion International Airport, an international airport in Israel, and the Technion Institute of Technology in Israel. As a result of the DDoS attack, the websites became unavailable for a while.
Attack Tactics and Techniques Used by Pro-Iranian Groups and Their Supporters
DDoS Attacks (%42.5): Pro-Iranian groups frequently use Distributed Denial of Service (DDoS) attacks against Israeli online services. These attacks involve sending massive traffic to make targeted websites temporarily inaccessible.
Website Defacement (%37.3): Groups supporting Iran may make unauthorized changes to the appearance or content of a targeted website. These changes are usually made to the site’s homepage and include a page with the attackers’ message or intent.
Cyber Espionage and Information Collection (%14): Pro-Iranian groups may engage in cyber espionage to collect sensitive data from specific individuals or organizations.
Phishing Attacks (%5.3): In some cases, pro-Iranian organizations may resort to phishing attacks to obtain sensitive information from targeted groups or individuals. In April 2024, APT42 appears to have intensified targeting users located in Israel.
Social Engineering and Ransomware (%1): Pro-Iranian groups use social engineering tactics to achieve their goals. They may also use ransomware to harm their targets or steal information.
Pro-Isreal Groups and Supporters
GlorySec | WeRedEvils |
KromSec | S1L3NT_0N3 |
Four different groups supporting Israel are mobilizing against Iran’s influence. Each group has different motivations and strategies, and these groups are launching cyber attacks targeting Iran. As an extension of the war on the digital front, these groups are taking the conflict to the virtual world, targeting Iran’s infrastructure and sensitive systems.
Examples of Attacks by Pro-Israel Groups
According to a detected telegram activity, GlorySec claims to have breached Khamenei, the official website of Ali Khamenei, Iran’s supreme religious and political leader and leaked Ali Khamenei’s information as a result of the breach.
According to a detected telegram activity, KromSec claims to have leaked the Islamic Republic of Iran’s Food and Drug Administration database. The database allegedly contains the personal data of registered system users and more.
Attack Tactics and Techniques Used by Pro-Israel Groups and Their Supporters
Website Defacement (44.8%): Groups supporting Israel may make unauthorized changes to the appearance or content of a targeted website. These changes are usually made to the site’s homepage and include a page with the attackers’ message or purpose.
DDoS Attacks (%29.9): Pro-Israel groups have been using Distributed Denial of Service (DDoS) attacks against Iranian online services. These attacks involve sending massive traffic to make targeted websites temporarily inaccessible.
Cyber Espionage and Information Collection (%10.4): Pro-Israel groups may engage in cyber espionage to collect sensitive data from specific individuals or organizations.
Social Engineering and Ransomware (%7.5): Pro-Israel groups use social engineering tactics to achieve their goals. They may also use ransomware to harm their targets or steal information.
Phishing Attacks (%7.5): In some cases, pro-Israel organizations may resort to phishing attacks to obtain sensitive information from targeted groups or individuals
Conclusion
The ongoing cyber warfare between Israel and Iran represents a digital extension of their physical conflict, with severe implications for both nations’ security and stability. As the cyber battlefield evolves, the sophistication and impact of these attacks are expected to grow, making cyber defense a critical component of national security for both Israel and Iran.
Digital War in the Middle East: Cyber Threats in Israel-Iran Conflict Report has been one of the most crucial, really describing the dynamic nature of cyber war in the Middle East and the need for strong cybersecurity with growing digital threats.
Contact ThreatMon: For more insights and intelligence on emerging cyber threats, contact ThreatMon, a leading platform providing comprehensive threat intelligence solutions.
Stay informed and stay secure in the digital world.