Digital War in the Middle East: Cyber Threats in Israel-Iran Conflict

This image is about cyber threats in the Israel-Iran conflict.

During the past few years, the chronic military and political dimensions of the conflict between Israel and Iran have progressively taken on aspects of cyber warfare. This new battle arena involves state-sponsored groups and hacktivists targeting both countries’ critical infrastructure, financial systems, and public opinion.

Overview of Groups and Parties in Cyber Conflict

Pro-Iran Groups and Supporters

Cyber Fattah TeamAnonymous Iran
7 October UnionРУССКИЙ ЗАДАЧА СИЛА | РТФ
Z-BL4CX-H4TVoltActivist
Team Ahadun-Ahad | {DEDSEC MUSLIMS}Khilafah H4ckers
Anonymous ArabsNoname057(16)
High SocietyUserSec
Holy LeagueDEFACER INDONESIA
SYLHET GANG-SGMaghrebSec
GhostSecBlack Maskers Army
Anonymous GuysAnonymousActivist
Silent Cyber ForceSumatra Selatan Cyber Team
Ghost Of GazaAnonymous Muslims
CyberDragonHacker Council Global
DXPLOITAl Ahad
Moroccan Black Cyber ArmyCRYPTO CORP
Pro-Palestine Hackers MovementKeymous
LAPSUS$DoubleFace
KillSecRipperSec
RCH-SECTeam 1945
Team insane PakistanMoroccan Dragons
LulzSec BlackEvil of Anti ddos
Anonymous CollectiveAlixsec

Examples of Attacks by Pro-Iranian Groups and Supporters

In the activity on Telegram detected by our team, the threat actor named “Moroccan Cyber Forces” claims to have leaked more than 200 login credentials of officials on Israeli WordPress websites. 

In an activity on Telegram detected by our team, a threat actor named “Anonymous Guys” targeted Ben Gurion International Airport, an international airport in Israel, and the Technion Institute of Technology in Israel. As a result of the DDoS attack, the websites became unavailable for a while.

Attack Tactics and Techniques Used by Pro-Iranian Groups and Their Supporters

DDoS Attacks (%42.5): Pro-Iranian groups frequently use Distributed Denial of Service (DDoS) attacks against Israeli online services. These attacks involve sending massive traffic to make targeted websites temporarily inaccessible.

Website Defacement (%37.3): Groups supporting Iran may make unauthorized changes to the appearance or content of a targeted website. These changes are usually made to the site’s homepage and include a page with the attackers’ message or intent.

Cyber Espionage and Information Collection (%14): Pro-Iranian groups may engage in cyber espionage to collect sensitive data from specific individuals or organizations.

Phishing Attacks (%5.3): In some cases, pro-Iranian organizations may resort to phishing attacks to obtain sensitive information from targeted groups or individuals. In April 2024, APT42 appears to have intensified targeting users located in Israel.

Social Engineering and Ransomware (%1): Pro-Iranian groups use social engineering tactics to achieve their goals. They may also use ransomware to harm their targets or steal information.

Pro-Isreal Groups and Supporters

GlorySecWeRedEvils
KromSecS1L3NT_0N3

Four different groups supporting Israel are mobilizing against Iran’s influence. Each group has different motivations and strategies, and these groups are launching cyber attacks targeting Iran. As an extension of the war on the digital front, these groups are taking the conflict to the virtual world, targeting Iran’s infrastructure and sensitive systems.

Examples of Attacks by Pro-Israel Groups

According to a detected telegram activity, GlorySec claims to have breached Khamenei, the official website of Ali Khamenei, Iran’s supreme religious and political leader and leaked Ali Khamenei’s information as a result of the breach.

According to a detected telegram activity, KromSec claims to have leaked the Islamic Republic of Iran’s Food and Drug Administration database. The database allegedly contains the personal data of registered system users and more.

Attack Tactics and Techniques Used by Pro-Israel Groups and Their Supporters

Website Defacement (44.8%): Groups supporting Israel may make unauthorized changes to the appearance or content of a targeted website. These changes are usually made to the site’s homepage and include a page with the attackers’ message or purpose. 

DDoS Attacks (%29.9): Pro-Israel groups have been using Distributed Denial of Service (DDoS) attacks against Iranian online services. These attacks involve sending massive traffic to make targeted websites temporarily inaccessible.

Cyber Espionage and Information Collection (%10.4): Pro-Israel groups may engage in cyber espionage to collect sensitive data from specific individuals or organizations.

Social Engineering and Ransomware (%7.5): Pro-Israel groups use social engineering tactics to achieve their goals. They may also use ransomware to harm their targets or steal information.

Phishing Attacks (%7.5): In some cases, pro-Israel organizations may resort to phishing attacks to obtain sensitive information from targeted groups or individuals

Conclusion

The ongoing cyber warfare between Israel and Iran represents a digital extension of their physical conflict, with severe implications for both nations’ security and stability. As the cyber battlefield evolves, the sophistication and impact of these attacks are expected to grow, making cyber defense a critical component of national security for both Israel and Iran.

Digital War in the Middle East: Cyber Threats in Israel-Iran Conflict Report has been one of the most crucial, really describing the dynamic nature of cyber war in the Middle East and the need for strong cybersecurity with growing digital threats.

Contact ThreatMon: For more insights and intelligence on emerging cyber threats, contact ThreatMon, a leading platform providing comprehensive threat intelligence solutions.

Stay informed and stay secure in the digital world.

More posts

This image is about monthly vulnerabilities for September 2024.
This image is about the ServiceNow data leak.
This image is about monthly vulnerabilities for July 2024.
This image is about cyber strategies for the Paris Olympics 2024.
This image is about Russian influence operations targeting the Paris Olympics 2024.
advanced divider

Share this article

Found it interesting? Don’t hesitate to share it to wow your friends or colleagues
advanced divider
Subscribe to our blog newsletter to follow the latest posts