Cyber Attack18 Jun 2025 • Ministry of Economic Affairs and Finance: Israel-Iran Conflict Sparks Wider Cyber Conflict, New Malware
Cyber Conflict Escalation in Middle East: Israel-Iran Hacktivism Surge
**Escalating Cyber Conflict in the Middle East as Israel-Iran Tensions Fuel Hacktivist Surge** The June 13 Israeli strikes on Iranian nuclear and military targets have triggered a sharp escalation in cyber warfare across the Middle East, with hacktivist groups launching a wave of attacks targeting Israel and regional allies. Between June 13 and 17, threat intelligence firm Cyble documented cyber operations by **74 hacktivist groups**, over **90% of which are pro-Iran**, focusing primarily on Israeli infrastructure while also striking entities in Egypt, Jordan, the UAE, Pakistan, and Saudi Arabia. ### **Targets and Tactics** Israel bore the brunt of the attacks, with government, defense, media, telecom, finance, education, and emergency services sectors hit by **DDoS attacks, website defacements, unauthorized access, data breaches, and ransomware/wiper malware campaigns**. Notable incidents included: - **Five ransomware/extortion attacks** by **Handala Group** against Israeli media, telecom, construction, education, and chemical/energy organizations, with data samples leaked in two cases. - A **ransomware/wiper executable ("encryption.exe")** attributed to the previously unknown **Anon-g Fox**, which checks for **Israel Standard Time (IST) and Hebrew language settings** before executing—terminating if conditions aren’t met. - A **banking malware campaign (IRATA)** targeting **50+ Iranian financial and crypto apps**, impersonating government entities like the **Judicial System of Iran** and the **Ministry of Economic Affairs**. The malware steals credentials, account balances, and card data while remotely controlling infected devices. Other documented attacks included **34 DDoS incidents, five defacements, two data breaches, and four credential leaks**, with groups like **Anonymous Guys, Arabian Ghosts, and GhostSec** actively participating. Hashtags such as **#OpIsrael, #FreePalestine, and #SupportIran** dominated the campaigns, reflecting ideological alignment with pro-Palestinian and pro-Iranian narratives. ### **Information Warfare and Psychological Tactics** Beyond technical attacks, hacktivist groups leveraged **Telegram channels to amplify geopolitical messaging**, reposting claims from allied collectives to project decentralized coordination. Content streams featured **pro-Iranian and pro-Palestinian propaganda**, including **missile strike footage and graphic images of Iranian casualties**, blurring the line between cyber operations and psychological warfare. ### **Regional Spillover and Broader Implications** The conflict’s cyber dimension has extended beyond Israel and Iran, with **Egypt, Jordan, Saudi Arabia, and the UAE** facing collateral attacks. The U.S. had previously linked **CyberAv3ngers (Mr. Soul)**, an IRGC-affiliated threat actor, to critical infrastructure attacks, underscoring the global reach of state-aligned hacktivism. As hacktivist groups exploit geopolitical tensions to advance ideological agendas, the surge in **ransomware, wipers, and banking malware** signals a shift toward more disruptive and financially motivated tactics in the region’s cyber landscape.
735
critical -11
IRA1767601584Incident Details -
Type
DDoS Website Defacement Unauthorized Access Data Breach Ransomware Wiper Malware Banking Malware
Attack Vector
Internet-facing systems Accessibility service abuse (Android malware) Geopolitically targeted malware
Motivation
Geopolitical Pro-Palestinian Pro-Iranian Anti-Western Ideological
Impact
Data Compromised: Banking and cryptocurrency data, personally identifiable information, credentials Government Defense Media Telecom Finance Education Emergency services Cryptocurrency exchanges Chemical/Energy Operational Impact: Disruption of services, unauthorized access, data exfiltration Brand Reputation Impact: Significant (defacements, data leaks, ransomware claims) Identity Theft Risk: High (banking data, PII exposed) Payment Information Risk: High (card data, bank account details harvested)
Response
Communication Strategy: Hacktivist groups using Telegram channels to amplify narratives and claims
Data Breach
Banking data Cryptocurrency data Personally identifiable information Credentials Card data Sensitivity Of Data: High (financial, PII, government-related) Data Exfiltration: Yes (claimed by Handala Group) Data Encryption: Yes (ransomware/wiper malware) Personally Identifiable Information: Yes (bank account numbers, balances, card data)
Lessons Learned
Hacktivist groups are leveraging geopolitical conflicts to amplify cyberattacks, combining digital operations with information warfare. Organizations in conflict zones or allied nations are at heightened risk of DDoS, defacement, data breaches, and ransomware attacks.
Recommendations
Invest in DDoS protections Enhance data breach prevention measures Monitor for website defacements Prepare for ransomware attacks Implement geopolitical threat intelligence Secure banking and cryptocurrency applications against malware Abuse prevention for Accessibility services on Android
Investigation Status
['Ongoing']
Stakeholder Advisories
Organizations in the Middle East and allied nations advised to bolster cybersecurity defenses due to heightened hacktivist activity.
Post Incident Analysis
Root Causes: Geopolitical conflict escalation, ideologically motivated hacktivist groups, exploitation of regional tensions
References