{"id":12805,"date":"2026-03-10T14:56:15","date_gmt":"2026-03-10T14:56:15","guid":{"rendered":"https:\/\/www.europesays.com\/iran\/12805\/"},"modified":"2026-03-10T14:56:15","modified_gmt":"2026-03-10T14:56:15","slug":"cyber-retaliation-surges-after-us-israel-strikes-on-iran-as-hacktivists-hit-governments-defense-critical-sectors","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/iran\/12805\/","title":{"rendered":"Cyber retaliation surges after US\u2013Israel strikes on Iran as hacktivists hit governments, defense, critical sectors"},"content":{"rendered":"<p>New analysis from Intel 471 found that military strikes by the U.S. and Israel against Iran triggered a sharp surge in hacktivist activity across cyber threat landscape. Researchers observed numerous ideologically aligned groups launching campaigns in response to the escalation, with many cyber adversaries claiming DDoS (distributed-denial-of-service) attacks, website defacements, and other disruptive operations against government, corporate, and regional targets. The activity <a href=\"https:\/\/industrialcyber.co\/industrial-cyber-attacks\/us-israeli-campaign-triggers-iranian-counteroffensive-targeting-gulf-energy-critical-infrastructure\/\" rel=\"nofollow noopener\" target=\"_blank\">highlights<\/a> how geopolitical events increasingly spill into cyberspace, where loosely organized hacktivist collectives and state-aligned proxies use cyber operations to signal support, amplify propaganda, and retaliate against perceived adversaries.<\/p>\n<p>According to the report, these campaigns <a href=\"https:\/\/www.intel471.com\/blog\/israeli-us-strikes-against-iran-triggers-a-surge-in-hacktivist-activity\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">often involve<\/a> a mix of pro-Iranian and regional hacktivist groups coordinating attacks or amplifying claims through social media and messaging platforms. While many operations remain low-level or largely symbolic, the surge in activity illustrates how modern conflicts rapidly trigger waves of cyber retaliation that can target government systems, private companies, and potentially <a href=\"https:\/\/industrialcyber.co\/reports\/team-cymru-says-sophisticated-ot-ics-adversaries-embed-in-critical-infrastructure-ahead-of-disruptive-attacks\/\" rel=\"nofollow noopener\" target=\"_blank\">critical infrastructure<\/a> in countries linked to the dispute.\u00a0<\/p>\n<p>\u201cIn the week of Feb. 27, 2026, to March 6, 2026, Israel was by far the most impacted region, followed by Kuwait and Jordan,\u201d Intel 471 identified. \u201cAdditionally, Bahrain, Qatar and the UAE also landed in the top ten most impacted regions for the week. Moreover, the top three most impacted industries were national government, aerospace and defense, and technology.\u201d<\/p>\n<p>Pro-Iranian and Iran-aligned actors rapidly positioned themselves within the broader retaliation narrative following the strikes, launching a wave of hacktivist activity largely targeting the U.S., Israel, and neighboring countries. According to analysis from Intel 471, these operations primarily involved claims of data breaches and DDoS attacks against government, military, and corporate targets.<\/p>\n<p>Members of the Iranian Handala Hack <a href=\"https:\/\/industrialcyber.co\/ransomware\/symantec-reports-iranian-seedworm-hackers-infiltrate-us-infrastructure-and-defense-supply-chain-networks\/\" rel=\"nofollow noopener\" target=\"_blank\">claimed<\/a> to have compromised multiple <a href=\"https:\/\/industrialcyber.co\/mining-oil-gas\/dnv-details-steganoamor-malware-campaign-used-against-iranian-oil-and-gas-traders-extends-to-maritime-operators\/\" rel=\"nofollow noopener\" target=\"_blank\">oil and gas organizations <\/a>across Israel, Jordan, and Saudi Arabia, and also alleged a breach of an Israel-based research institute. Another Iranian group, WeAreUst, said it collaborated with Anonymous Sana\u2019a to target an Israel-based defense and security technology company. The Iranian UniT 313 also claimed responsibility for DDoS attacks against military and government entities in Bahrain and Saudi Arabia.<\/p>\n<p>Other groups reported operations against communications and infrastructure targets. The Cyber Islamic Resistance claimed to have compromised home routers linked to an Israeli fiber-optic communications provider and a control systems manufacturer, and also said it launched a denial-of-service attack against a U.S. military online directory.\u00a0<\/p>\n<p>Meanwhile, the Iraqi FAD Team claimed attacks against supervisory control and data acquisition systems affecting Israel and allied countries, while the North African Keymous reportedly carried out denial-of-service attacks against several Israeli telecommunications companies.<\/p>\n<p>Additional activity included denial-of-service attacks by the DieNet targeting Kuwaiti\u00a0government websites. An Iranian actor known as Mr. Soul, previously linked to the <a href=\"https:\/\/industrialcyber.co\/industrial-cyber-attacks\/iranian-hacker-group-cyberav3ngers-allegedly-breach-municipal-water-authority-of-aliquippa\/\" rel=\"nofollow noopener\" target=\"_blank\">Cyber Av3ngers<\/a>, threatened independent cyber operations against Israel and later claimed access to Israeli power transmission infrastructure, alleging it had targeted and disabled warning sirens. The Cyber Isnaad Front also claimed attacks against Israeli government and military communications systems.<\/p>\n<p>Earlier this month, pro-Russian hacktivist group <a href=\"https:\/\/industrialcyber.co\/reports\/forescout-reports-global-cyberattacks-spread-wider-in-2025-with-more-distributed-and-costly-threats-emerging-in-2026\/\" rel=\"nofollow noopener\" target=\"_blank\">NoName057(16)<\/a> declared solidarity with Iran and announced distributed denial-of-service attacks <a href=\"https:\/\/industrialcyber.co\/threats-attacks\/pro-russian-global-hacktivists-unite-for-coordinated-cyber-strikes-on-israeli-government-and-critical-sectors\/\" rel=\"nofollow noopener\" target=\"_blank\">against <\/a>Israeli targets under the #OpIsrael banner. The group claimed to target websites linked to political parties, local authorities, and telecommunications providers in Israel. According to analysis from Intel 471, several other pro-Russian collectives soon signaled support for the campaign or threatened related attacks.<\/p>\n<p>The Hider_Nex joined the #Op_Israel_USA campaign and claimed to have disrupted the services of an Israeli telecommunications company. The PalachPro publicly stated its intention to assist Iranian hackers in targeting Israeli and U.S. organizations.\u00a0<\/p>\n<p>Meanwhile, the Z-Pentest Alliance alleged it had gained full control of a pump control and water supply management system in Israel, while the RuskiNet Group claimed a denial-of-service attack that temporarily disrupted the website of KPMG Israel.<\/p>\n<p>Additional activity included claims by the Dark Storm Team, which said it launched DDoS attacks against several Israeli banks. The Cardinal and Russian Legion groups also jointly claimed attacks on Israeli military systems, including alleged breaches of the Iron Dome radar and interception infrastructure.<\/p>\n<p>Intel 471 observed a smaller number of anti-Iranian hacktivist claims. These incidents were significantly lower in volume and appeared aimed primarily at creating psychological or political pressure within Iran rather than causing large-scale disruption.<\/p>\n<p>Members of the Anonymous \u2013 \u05d0\u05b7\u05e0\u05d5\u05e0\u05b4\u05d9\u05de\u05b4\u05d9 group shared what they said was personally identifiable information belonging to members of the Islamic Revolutionary Guard Corps and other Iranian military operatives. The group also claimed responsibility for a distributed denial-of-service attack targeting Iranian regime-affiliated news agencies.<\/p>\n<p>Separately, the Anonymous Syria Hackers announced a campaign against Iran and claimed to have breached the database of an e-commerce platform, leaking personally identifiable information, login credentials, and PayPal account details.<\/p>\n<p>As part of its assessment outlook, Intel 471 noted that the recent surge in pro-Iranian hacktivist activity is currently providing the Iranian regime with a greater ability to project perceived power in a time when domestic connectivity is highly constrained. These groups almost certainly are attempting to distract regional adversaries, mainly Israel and their western allies, by employing DDoS attacks and other disruptive cyber tactics. While the actual damage was likely negligible, the aim of the attacks was likely to serve as a show of resistance.<\/p>\n<p>\u201cMeanwhile, pro-Russian groups almost certainly are seizing the opportunity to expand their influence by collaborating with pro-Iran and pro-Palestinian collectives. This behavior is not new, as these groups often supported one another in the past following geopolitical flare-ups,\u201d it added. \u201cThese collaborations can be mutually beneficial since groups often re-post activity to their followers, amplifying the effect of their actions. Furthermore, for pro-Russian groups, participating in hacktivist activity in support of Iran allows them to extend their reach into the Middle East, maintain their anti-Western geopolitical alignment, and promote themselves as high-profile actors and\/or groups in the hacktivist ecosystem by continuing to target critical infrastructure and government entities.\u201d<\/p>\n<p>The analysis emphasizes that while the surge in DDoS attacks, website defacements and other disruptive cybercrime is real, these groups frequently exaggerate the actual impact and\/or depth of their activity in an attempt to maximize psychological impact and media attention.\u00a0<\/p>\n<p>\u201cLooking ahead in the near term, we expect regional tensions to persist, resulting in continued attacks from both pro-Iranian and pro-Russian collectives against the U.S., Israel and other Gulf nations,\u201d Intel 471 detailed. \u201cThese likely will remain in the form of varying disruptive actions, including DDoS attacks and claims of data breaches, focused on entities in industries such as banking, government, <a href=\"https:\/\/industrialcyber.co\/reports\/rockwell-research-flags-cyber-threats-as-a-top-driver-of-technology-investment-across-oil-and-gas\/\" rel=\"nofollow noopener\" target=\"_blank\">oil and gas,<\/a> telecommunications and other critical national infrastructure. In the medium to long term, we typically see a reduction in attacks as actor interest wanes but devout and state-associated adversaries likely will persist in their activity.\u201d<\/p>\n<p>Commenting on the cybersecurity implications of the ongoing Middle East conflict, Mike Maddison, CEO of NCC Group, wrote in an emailed statement that the current conflict in the Middle East is proof that cyber operations have become fully integrated with military strategy. \u201cIsrael and the US have combined cyber attacks with physical strikes to contribute to Iran\u2019s communications blackout. Overall, the majority of cyber activity tied to the Israel\u2013Iran conflict consists of DDoS attacks, website defacements, exaggerated breach claims, and widespread AI\u2011driven misinformation. This activity is high in volume but low in impact, rather than being materially disruptive.\u201d<\/p>\n<p>He highlighted that \u201cThe breadth of global supply chains means that while Iran\u2019s cyber capabilities are focused on Israel, the US and the Gulf-region, global companies still need to be vigilant. Supply chains and widely connected digital infrastructure face a realistic risk of disruption or being caught in an information war.\u201d<\/p>\n<p>\u201cThe use of GPS jamming in the Middle East is a <a href=\"https:\/\/industrialcyber.co\/regulation-standards-and-compliance\/lawmakers-revive-satellite-cybersecurity-bill-to-shield-commercial-space-systems-from-rising-threats\/\" rel=\"nofollow noopener\" target=\"_blank\">timely reminder<\/a> of the fragility of our reliance on satellite navigation systems,\u201d Maddison said. \u201cAll Global Navigation Satellite System (<a href=\"https:\/\/industrialcyber.co\/news\/dhs-releases-gnss-test-vector-suite-to-boost-pnt-security-for-critical-infrastructure\/\" rel=\"nofollow noopener\" target=\"_blank\">GNSS<\/a>) platforms share a critical vulnerability \u2013 their signals are inherently weak and susceptible to targeted jamming. This situation underscores the urgent need for robust security investment to safeguard critical national infrastructure.\u201d\u00a0<\/p>\n<p>Maddison warned that \u201cThe <a href=\"https:\/\/industrialcyber.co\/transport\/cydome-report-finds-150-surge-in-maritime-ot-cyberattacks-as-ransomware-tightens-grip-in-2025\/\" rel=\"nofollow noopener\" target=\"_blank\">maritime sector<\/a> remains a high-value target due to the scale of disruption a successful attack can cause. As threats evolve, the industry must shift from reactive defence to proactive resilience strategies. Alternative technologies like Long Range Navigation (LORAN) or emerging quantum-based systems offer promise, but neither has yet been delivered at scale. Until then, resilience must come from layered defences and strategic foresight.\u201d<\/p>\n<p>\t\t<img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" src=\"https:\/\/www.europesays.com\/iran\/wp-content\/uploads\/2026\/03\/Anna-Ribeiro-min-96x96.jpg\" alt=\"\"\/><\/p>\n<p>&#13;<br \/>\n\t\t\t\t\tAnna Ribeiro\t\t\t\t<\/p>\n<p>&#13;<br \/>\n\t\t\t\t\tIndustrial Cyber News Editor. Anna Ribeiro is a freelance journalist with over 14 years of experience in the areas of security, data storage, virtualization and IoT.\t\t\t\t<\/p>\n<p>\t<a class=\"post-author-link\" href=\"https:\/\/industrialcyber.co\/author\/annaribeiro\/\" rel=\"nofollow noopener\" target=\"_blank\"><\/p>\n","protected":false},"excerpt":{"rendered":"New analysis from Intel 471 found that military strikes by the U.S. and Israel against Iran triggered a&hellip;\n","protected":false},"author":2,"featured_media":12806,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[4614,7055,7056,7057,2240,7058,7059,7060,7061,648,7062,7063,7064,7065,37,947,7066,7067],"class_list":{"0":"post-12805","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-israel","8":"tag-aerospace","9":"tag-anonymous-sanaa","10":"tag-communications","11":"tag-control-system","12":"tag-critical-infrastructure","13":"tag-cyber-operation","14":"tag-cyber-threat","15":"tag-data-breaches","16":"tag-ddos","17":"tag-defense","18":"tag-hacktivist","19":"tag-handala-hack-oil-and-gas","20":"tag-intel-471","21":"tag-iranian-unit-313","22":"tag-israel","23":"tag-technology","24":"tag-threat-landscape","25":"tag-weareust"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@iran\/116205465430110745","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/posts\/12805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/comments?post=12805"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/posts\/12805\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/media\/12806"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/media?parent=12805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/categories?post=12805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/tags?post=12805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}