{"id":33676,"date":"2026-03-24T11:05:09","date_gmt":"2026-03-24T11:05:09","guid":{"rendered":"https:\/\/www.europesays.com\/iran\/33676\/"},"modified":"2026-03-24T11:05:09","modified_gmt":"2026-03-24T11:05:09","slug":"resecurity-warns-that-iran-war-enters-multi-domain-phase-as-cyber-and-kinetic-operations-converge","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/iran\/33676\/","title":{"rendered":"Resecurity warns that Iran war enters multi-domain phase as cyber and kinetic operations converge"},"content":{"rendered":"<p>New data from Resecurity identified that the ongoing Iran war has fast evolved into a multi\u2011domain confrontation where traditional militarized strikes are tightly interwoven with digital operations, electronic interference, and psychological warfare, reshaping the nature of modern conflict. Noting that the Feb. 28, 2026, joint U.S.\u2013Israeli offensive against Iran was not <a href=\"https:\/\/industrialcyber.co\/analysis\/digital-battlegrounds-evolving-hybrid-kinetic-warfare\/\" rel=\"nofollow noopener\" target=\"_blank\">solely kinetic<\/a>, it triggered a surge in cyber and electronic activities aimed at disrupting communications, gathering intelligence, and degrading Iranian command networks.\u00a0<\/p>\n<p>Hacktivist groups aligned with both sides have joined the fray, executing DDoS (distributed denial of service) attacks, website defacements, and reconnaissance missions targeting critical infrastructure and government resources across the Middle East. These digital campaigns are not isolated but synchronized with physical operations to intensify operational impact and strategic pressure.<\/p>\n<p>Resecurity <a href=\"https:\/\/www.resecurity.com\/blog\/article\/iran-war-kinetic-cyber-electronic-and-psychological-warfare-convergence\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">identified<\/a> several key groups involved in the escalation, including Iranian-aligned hacktivist collectives such as Cyber Islamic Resistance, Fatimion Cyber Team, and Cyber Fattah. These groups have conducted reconnaissance, Distributed Denial of Service campaigns, website defacements, and data theft as part of coordinated cyber activity.<\/p>\n<p>On the opposing side, pro-Western hacktivist groups have targeted Iranian religious applications and news platforms in an effort to undermine state narratives and influence domestic perception. The broader landscape also includes Iranian opposition actors operating from abroad, particularly in the United States, the United Kingdom, the European Union, Canada, and Australia, who are actively engaging in cyber efforts against the current regime.<\/p>\n<p>Resecurity assessed that the Iran war is set to remain a prolonged and disruptive conflict with serious humanitarian and economic consequences. While a full-scale regional war remains unlikely, sustained missile, drone, and cyberattacks are expected to continue. Iran\u2019s nuclear program continues to pose a significant risk, with concerns over potential breakout despite recent setbacks. Cyber activity is also likely to intensify, driven primarily by Iranian proxies and externally based operatives, as near-total internet restrictions inside Iran limit the operational capacity of state-sponsored groups.<\/p>\n<p>The post highlights how cyber and electronic tactics are increasingly supporting battlefield objectives and shaping the psychological dimension of warfare. U.S. and allied forces reportedly <a href=\"https:\/\/industrialcyber.co\/industrial-cyber-attacks\/amazon-sounds-alarm-as-nation-state-groups-blend-cyber-intrusion-with-kinetic-targeting\/\" rel=\"nofollow noopener\" target=\"_blank\">leveraged<\/a> cyber reconnaissance and offensive actions to facilitate kinetic targeting and battle damage assessment, while Iranian hacktivist networks exploited exposed digital assets and vulnerabilities to strike at regional and Western targets.\u00a0<\/p>\n<p>Additionally, AI (artificial intelligence)\u2011driven influence campaigns and social media manipulation have been woven into the broader conflict narrative, amplifying misinformation and undermining adversary morale. The convergence of these domains underscores significant shift in conflict dynamics where digital tools are deployed in concert with bombs and missiles, complicating defense postures and signaling a new era of hybrid warfare that blurs the lines between <a href=\"https:\/\/industrialcyber.co\/reports\/chinas-typhoon-cyber-operations-target-us-critical-infrastructure-sectors-in-move-toward-large-scale-disruption\/\" rel=\"nofollow noopener\" target=\"_blank\">cyber operations<\/a> and conventional combat.<\/p>\n<p>Resecurity reported that there has been a sharp rise in <a href=\"https:\/\/industrialcyber.co\/reports\/cyber-retaliation-surges-after-us-israel-strikes-on-iran-as-hacktivists-hit-governments-defense-critical-sectors\/\" rel=\"nofollow noopener\" target=\"_blank\">cyber activity<\/a> following the recent U.S.\u2013Israeli strikes on Iran, with both Iranian-aligned and pro-Western hacktivist groups targeting critical infrastructure, military logistics, and symbolic digital assets. These cyberattacks extend beyond disruption, as both sides are also using cyber reconnaissance to support kinetic targeting and assess battle damage, reflecting a coordinated approach where cyber operations are integrated with military actions.<\/p>\n<p>The escalation is further evident in targeted cyber incidents, including coordinated attacks on Pakistani media platforms and a significant Iran-linked breach of <a href=\"https:\/\/industrialcyber.co\/medical\/suspected-iran-linked-cyberattack-hits-medical-technology-giant-stryker-amid-middle-east-tensions\/\" rel=\"nofollow noopener\" target=\"_blank\">Stryker Corporation<\/a> that disrupted global operations. At the same time, geopolitical developments such as evacuations and remote work shifts are expanding the cyberattack surface, exposing organizations to greater risk. Iran has also declared U.S. financial institutions and multinational technology companies as legitimate cyber targets, underscoring how offensive cyber capabilities are being used alongside broader strategic objectives in the conflict.<\/p>\n<p>The DDoS attacks and reconnaissance operations targeting U.S. and Israeli assets aim to disrupt services and gather intelligence for follow-on activity. These campaigns appear loosely coordinated but largely ineffective, relying on basic tools that generate noise rather than significant operational damage, often forcing organizations across the Gulf region to divert limited defensive resources.<\/p>\n<p>Iran\u2019s cyber capabilities in this area remain constrained, with limited capacity to generate high-impact DDoS volumes, leading to reliance on hacktivists and underground services, some of which have refused support. At the same time, cyber operations are embedded in a broader strategic framework, with alliances such as the so-called Islamic Resilience Cyber Axis driving recruitment and influence campaigns, including AI-enabled information operations. The targeting of an IRGC-linked cyber operations center in Tehran further underscores how cyber infrastructure itself has become a direct component of the conflict.<\/p>\n<p>\u201cIn fact, many of the activities are driven by the same alliances built in 2024-2025, nicknamed the Islamic Resilience Cyber Axis, a conglomerate of several ideologically motivated groups. These actors are actively recruiting new members to their movement and can generate influence campaigns via social media, including the use of artificial intelligence (AI),\u201d Resecurity mentioned in its post. \u201cOne of its subdivisions, the Electronic Operations Room, is responsible for malicious cyber activity. These actors are often associated not only with Iranian but also with pro-Hamas groups. The ecosystem of such groups is extremely dynamic and may involve actors from other geographies joining them who follow a similar ideology.\u201d<\/p>\n<p>Resecurity detailed that many DDoS attacks have been conducted using third-party underground services, such as \u2018stressers\u2019 for rent, including Cosmic Network (V2), SpaceStresser, TheFlashDDOS, and EliteStresser. \u201cSuch tooling may cause short-term outages and load on web servers and applications, especially when leveraging a combination of attacks against commercial CDNs and WAFs. To scale the volume of attacks, threat actors leverage residential proxies, compromised servers, and IoT devices to generate malicious traffic.\u201d<\/p>\n<p>Identified attacks were also targeting Israeli defense contractors and entities associated with the defense industrial base in other countries cooperating with Israel. One of the most active groups releasing such claims is 313 Team, presumably associated with the Islamic Cyber Resistance in Iraq.<\/p>\n<p>Besides DDoS claims, Pro-Iranian hacktivists such as Cyber Fattah, which calls itself an Iranian Cyber Team, were targeting other sectors. Attacks against <a href=\"https:\/\/industrialcyber.co\/utilities-energy-power-water-waste\/wef-warns-of-growing-cyber-threats-to-energy-infrastructure-following-iberian-blackout\/\" rel=\"nofollow noopener\" target=\"_blank\">energy infrastructure <\/a>have been detected targeting Jordan. The actors have already used exposed infostealer data to obtain credentials and access web panels and applications.\u00a0<\/p>\n<p>The post disclosed that hacktivists attempted to attack publicly exposed IoT devices by scanning Israeli-based IP ranges. \u201cThe pro-Iranian actors were also targeting popular Hikvision and Dahua cameras with several authentication and command-related vulnerabilities. The bugs they use include CVE-2017-7921, CVE-2021-36260, CVE-2023-6895, and CVE-2025-34067 for Hikvision; and CVE-2021-33044 for Dahua. Patches for all vulnerabilities are available now. DDoS attempts also targeted Israeli military resources by groups such as Conquerors Electronic Army.\u201d<\/p>\n<p>A Telegram channel presumably operated by Russian-speaking actors announced that the group Server Killers was joining the cyber war against the US and Israel. With a high level of confidence, this group\u2019s activity is more opportunistic than state-directed. Their claims of providing substantial support to Iran are exaggerated. Other groups, such as <a href=\"https:\/\/industrialcyber.co\/medical\/hc3-aha-warn-of-pro-russian-killnet-hacktivist-group-targeting-healthcare-sector-using-ddos-attack-technique\/\" rel=\"nofollow noopener\" target=\"_blank\">Killnet,<\/a> <a href=\"https:\/\/industrialcyber.co\/reports\/claroty-reports-82-of-cps-attacks-used-remote-access-protocols-as-hacktivists-target-hmis-and-scada-at-scale\/\" rel=\"nofollow noopener\" target=\"_blank\">NNM057 (16)<\/a>, and Russian Legion, have also been involved in similar activities. Regardless of claims that Russia is <a href=\"https:\/\/www.washingtonpost.com\/national-security\/2026\/03\/06\/russia-iran-intelligence-us-targets\/\" rel=\"nofollow noopener\" target=\"_blank\">providing<\/a> Iran with intelligence to target U.S. forces, activity in cyberspace appears to be uncoordinated and conducted by multiple disconnected groups.<\/p>\n<p>Resecurity reported that Iranian-affiliated hacktivist groups, including Cyber Islamic Resistance, have carried out website defacements, data theft, and data-wiping attacks targeting U.S. and Israeli military logistics providers in an effort to disrupt operations. At the same time, several Iranian-linked groups have called for cyber experts to join what they describe as a \u2018Great Epic Battle,\u2019 signaling efforts to expand their digital capabilities.<\/p>\n<p>However, these activities remain largely opportunistic and have had limited impact on core operational processes. According to the assessment, Iran\u2019s constrained cyber resources, compounded by damaged infrastructure and time pressures, limit its ability to mount more coordinated campaigns in the near term. The threat is expected to evolve toward ransomware-style operations, where critical data is held hostage for strategic leverage beyond financial gain.\u00a0<\/p>\n<p>Meanwhile, pro-Iranian channels have circulated alleged data on Israeli military personnel, though much of it appears to be recycled or misleading, aimed at creating uncertainty and amplifying psychological pressure through information operations.<\/p>\n<p>Around the beginning of March, Resecurity identified the emergence of relatively new groups, such as Cyber Isnaad Front. \u201cThe group has targeted critical infrastructure and telecommunication providers of Israel, but also released a \u2018hit list\u2019 of people operating in various industries.\u201d<\/p>\n<p>The post also highlighted <a href=\"https:\/\/industrialcyber.co\/industrial-cyber-attacks\/isac-advisory-highlights-cyber-and-physical-risks-to-critical-infrastructure-as-middle-east-tensions-rise\/\" rel=\"nofollow noopener\" target=\"_blank\">Handala<\/a> Hack Team as one of the most credible actors, with increased data theft and ransomware activity during the Iran War. In addition to targeting organizations, they focus on individuals in the defense sector to exert influence.\u00a0<\/p>\n<p>Resecurity mentioned that clips from military video games were circulated as real combat footage, misleading viewers about the reality on the ground. Iranian-aligned cyber groups have carried out cyberattacks and exaggerated their impact to sow confusion and fear. In one of the misinformation episodes, a pro-Iranian group was circulating messaging that Khamenei had not been killed.\u00a0<\/p>\n<p>The post also highlights misinformation focused on both cyber activity and kinetic actions. For instance, \u201cIran claims to have struck the USS Abraham Lincoln with missiles and drones, but the US Central Command released images showing the carrier operating as normal. The claims by Iran are part of a bigger misinformation campaign attempting to discredit the US military.\u201d<\/p>\n<p>In addition to Iranian-aligned groups, pro-Western hacktivists have also been active, targeting Iranian apps and websites. These attacks are likely intended to counter Iran\u2019s cyber retaliation and disrupt its digital infrastructure.<\/p>\n<p>The surge in hacktivist activity underscores the growing role of cyber operations as a parallel front in geopolitical conflict, where loosely affiliated groups act as proxies or independent actors to amplify the impact of state-backed campaigns. Experts also warn of heightened volatility in the cyber domain, particularly in the immediate aftermath of the strikes, with hacktivists and proxy actors likely to drive escalation while Tehran\u2019s central command regroups.<\/p>\n<p>In conclusion, Resecurity said that hacktivist activity has significantly escalated following the US-Israeli strikes on Iran. Both Iranian-aligned and pro-Western groups are actively engaging in cyberattacks, including DDoS campaigns, data-wiping operations, and website defacements. These actions underscore the increasing importance of cyber warfare and hacktivism as tools of retaliation and influence in modern conflicts.<\/p>\n<p>Both Iranian-aligned and pro-Western groups are actively engaging in cyberattacks, including DDoS campaigns, data-wiping operations, and website defacements. These actions underscore the increasing importance of cyber warfare and hacktivism as tools of retaliation and influence in modern conflicts.<\/p>\n<p>This escalation manifests through increased proxy militia attacks (rocket, drone, and IED strikes), cyber operations, and asymmetric tactics such as maritime harassment and influence campaigns. These responses are strategically designed to retaliate, deter further US action, and advance Iran\u2019s regional objectives, while carefully managing the risk of uncontrollable escalation.<\/p>\n<p>\t\t<img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" src=\"data:image\/svg+xml,%3Csvg%20xmlns=\" https:=\"\" alt=\"\" data-lazy-src=\"https:\/\/www.europesays.com\/iran\/wp-content\/uploads\/2026\/03\/1774350309_596_Anna-Ribeiro-min-96x96.jpg\"\/><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" src=\"https:\/\/www.europesays.com\/iran\/wp-content\/uploads\/2026\/03\/1774350309_596_Anna-Ribeiro-min-96x96.jpg\" alt=\"\"\/><\/p>\n<p>&#13;<br \/>\n\t\t\t\t\tAnna Ribeiro\t\t\t\t<\/p>\n<p>&#13;<br \/>\n\t\t\t\t\tIndustrial Cyber News Editor. Anna Ribeiro is a freelance journalist with over 14 years of experience in the areas of security, data storage, virtualization and IoT.\t\t\t\t<\/p>\n<p>\t<a class=\"post-author-link\" href=\"https:\/\/industrialcyber.co\/author\/annaribeiro\/\" rel=\"nofollow noopener\" target=\"_blank\"><\/p>\n","protected":false},"excerpt":{"rendered":"New data from Resecurity identified that the ongoing Iran war has fast evolved into a multi\u2011domain confrontation where&hellip;\n","protected":false},"author":2,"featured_media":33677,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[2240,15281,2241,15282,15283,7061,15284,34,15285,15286],"class_list":{"0":"post-33676","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-iran","8":"tag-critical-infrastructure","9":"tag-cyber-domain","10":"tag-cyber-warfare","11":"tag-cyberattacks","12":"tag-data-wiping","13":"tag-ddos","14":"tag-ddos-campaigns","15":"tag-iran","16":"tag-resecurity","17":"tag-website-defacements"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@iran\/116283829328310083","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/posts\/33676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/comments?post=33676"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/posts\/33676\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/media\/33677"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/media?parent=33676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/categories?post=33676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/iran\/wp-json\/wp\/v2\/tags?post=33676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}