Part 1: The Iran-Israel Cyber Standoff - The Hacktivist Front

Between June 12–18, 2025, over 35 pro-Iranian hacktivist groups launched coordinated cyberattacks against Israeli military, government, and infrastructure targets, using DDoS, data leaks, and disinformation. Only 4–5 pro-Israel groups responded. These unsophisticated yet widespread attacks continue a year-long trend of exaggeration and recycled data. CloudSEK recommends urgent DDoS mitigation, multi-factor authentication, threat monitoring, and stronger incident response protocols.

Pagilla Manohar Reddy
June 19, 2025
Green Alert
Last Update posted on
June 19, 2025
Proactive Monitoring of the Dark Web for your organization.

Proactively monitor and defend your organization against threats from the dark web with CloudSEK XVigil.

Schedule a Demo
Table of Contents
Author(s)
Coauthors image
Nivya Ravi

Executive Summary

The Iran-Israel conflict experienced a significant escalation in cyber hacktivist activity between June 12-18, 2025, with over 35 distinct pro-Iranian groups launching coordinated attacks against Israeli infrastructure compared to only 4-5 identified pro-Israeli groups responding. This week-long surge follows the same tactical patterns observed throughout the broader June 2024-June 2025 period, demonstrating that hacktivist groups have not evolved their methodologies despite a full year of operations. The attacks predominantly consisted of DDoS assaults, website defacements, and claimed data breaches targeting government sites, military systems, and critical infrastructure, mirroring the unsophisticated approach used consistently over the past year. Most significantly, these recent attacks maintain the same pattern of exaggeration and disinformation that has characterized the broader hacktivist ecosystem, with groups continuing to take credit for unrelated service outages, recycle old data leaks, and inflate damage claims for media attention rather than achieving substantial operational impact.

Pro-Israel vs Pro-Iran Cyber Attacks

Pro-Iran Groups and Attacks

Group Name Primary Attack Targeted Entities
HackYourMomData breach/Credential leakMultiple FTP and website systems
Liwa Muhammad ﷺDDoS attacks, Missile strike claimsIsraeli Ministry of Defense, Unit 8200, Camero-Tech
IRGC-affiliated channelInfrastructure attacksNevatim Airbase, F-35/F-16/F-15 aircraft, command centers
Cyber-hacker 🇵🇸Information warfare, DDoSTel Aviv infrastructure, Israeli systems
LulzSec Black 🇵🇸DDoS, System disruptionAir/sea navigation systems, alert systems, infrastructure
Ghost PrincessInformation warfare, System attacksIsraeli military bases, defense systems
Lực Lượng Đặc Biệt Quân Đội Điện TửLayer 7 DDoS attacksIsraeli government sites, educational institutions
Dark Storm TeamWebsite monitoring/targetingIsraeli government ministries
Cyber Fattah teamCyberattacks, Information warfareIsraeli infrastructure
TEAM FEARLESDDoS attacksIsraeli government website
Anonymous groupsDDoS, Website defacementVarious Israeli sites
Nation Of SaviorsDDoS attacksIsraeli government website
Red Wolf CyberInfrastructure attacksIsraeli Ministry of Defense
SYLHET GANG-SGService disruptionTzofar Red Alert app, radio stations
DieNetData breach, Service disruptionIsrael Antiquities Authority, radio stations
Laneh/Team NestInfrastructure attacksIsraeli energy infrastructure
APT IRANData exfiltration, RansomwareIsraeli academic/government systems
Unified Islamic Cyber ResistanceICS attacksYBS (electric vehicle fleet management)
EvilMoroccoData theft757 GB Israeli infrastructure data
BD AnonymousData collection, DoxxingNetanyahu personal info, Israeli data
Team 1722Agency compromiseIsraeli/US agencies
Islamic Hacker ArmySystem breachIDF defense research computers
RootSecAccount hijackingIsraeli Instagram accounts
MadCapZoneAlert system attackTzofar system
Fatah cyber teamInfrastructure attacksIsraeli systems
Lebanese groupsDDoS attacksCamero-Tech radar systems
Handala HackData breachIsraeli military systems, Delek Group
Arabian GhostsDDoS attacksBank of Israel, Barzilai Medical Center
TwoNetDDoS, Data dumpsIsraeli defense/tech companies
Fatimion Cyber TeamGovernment system attacksIsraeli Air Force, government sites
REVOLUSI HIME666Data breachaurion-hosting.co.il
R3V0XAn0nymousWebsite attacksBNP Paribas Israel, Ministry of Education
INTEIDMulti-sector attacksIsraeli news, telecom, medical orgs

Pro-Israel Groups and Attacks

Group Name Primary Attack Targeted Entities
Syrian Electronic Army Data breach, Infrastructure targeting Iranian tech companies, nuclear facilities claims
Anonymous OpIran Unspecified attacks Iranian entities, IRGC facilities
Israeli hackers (via proxies) Cyberattacks Palestinian movements, solidarity groups
Predatory Sparrow Defensive operations Thwarted Iranian phone battery attack
Unattributed Israeli operations Infrastructure attacks Iranian nuclear sites, military facilities

Attack Statistics Summary

Category Number of Groups Primary Methods
Pro-Iran Groups 35+ distinct groups DDoS (most common), Data breaches, Ransomware, ICS attacks, Service disruption
Pro-Israel Groups 4–5 identified groups Infrastructure targeting, Data breaches, Defensive operations

Key Observations

  1. Attack Sophistication:
    • Pro-Iran groups: Mix of simple DDoS to complex ICS attacks
    • Pro-Israel groups: More targeted infrastructure operations
  2. Geographic Distribution:
    • Anti-Israel groups: Iran, Palestine, Indonesia, Lebanon, Yemen, international Anonymous affiliates
    • Pro-Israel groups: Less geographically diverse
  3. Target Selection:
    • Anti-Israel: Government sites, military systems, critical infrastructure, civilian services
    • Pro-Israel: Nuclear facilities, military infrastructure, tech companies

This analysis is based on the claims made in the hacktivist groups and does not verify the accuracy or success of these claimed attacks.

Hacktivist Campaigns (Jun 2024–Jun 2025)

  • Target Scope:


    • Attacks escalated against government bodies, election infrastructure, critical services, and high-visibility digital platforms.
    • Geopolitical focus:
      • Pro-Russian groups hit the EU (parliamentary elections) and UK (general election).
      • Pro-Palestinian/Islamist groups targeted Israel and India in response to military actions.
      • American and European assets frequently targeted for ideological or retaliatory reasons.

  • Motivations:
    • Driven by real-world events, arrests, or perceived injustices.
    • Examples:
      • Surge in attacks post Pahalgam terror incident (India) and Israel-Iran strikes (June 2025).
      • Justifications often rooted in nationalism, anti-Western sentiment, or religious causes (e.g., #FreeDurov, Operation Sindoor).

  • Tactics Used:
    • Predominantly DDoS, website defacement, and basic data leaks.
    • Data usually sourced from compromised credentials or misconfigured systems.
    • Notable groups like RipperSec and Mr_Hamza used combined takedown + defacement strategies.
    • Rise in multi-vector DDoS and short-lived data leaks, though most remain technically basic.

  • Narrative Manipulation & Attribution Issues:
    • Frequent exaggeration or fabrication of "breaches."
    • Groups often:
      • Claim credit for unrelated outages.
      • Reuse or repackage old leaks.
      • Inflate impact for media attention.

    • Attribution is murky due to shared handles, recycled themes, and cross-group narratives.
    • Some consistency is observed in groups like NoName057(16) and DieNet, but much of the scene is driven by theatrics.

Recommendations

Based on this analysis, immediate security measures should include:

  • Implement robust DDoS protection across government and critical infrastructure websites, including rate limiting, traffic filtering, and content delivery network services to mitigate the most common attack vector
  • Strengthen credential security through mandatory multi-factor authentication, regular password updates, and privileged access management systems to prevent unauthorized access from compromised credentials
  • Establish threat intelligence monitoring of hacktivist Telegram channels and social media platforms to provide early warning of planned campaigns and coordinate defensive responses
  • Develop incident response protocols that include rapid assessment capabilities to distinguish between actual breaches and false claims, preventing unnecessary panic and resource allocation
  • Enhance public communication strategies to counter disinformation campaigns by providing factual updates on attack impacts and correcting exaggerated claims made by hacktivist groups
  • Implement network segmentation for critical systems to limit the potential impact of successful intrusions and prevent lateral movement within organizational networks
  • Conduct regular security assessments of public-facing assets to identify and remediate misconfigurations that could be exploited by opportunistic attackers

References

Predict Cyber threats against your organization

Related Posts
No items found.

Join 10,000+ subscribers

Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.

Take action now

Secure your organisation with our Award winning Products

CloudSEK Platform is a no-code platform that powers our products with predictive threat analytic capabilities.

Adversary Intelligence

5

min read

Part 1: The Iran-Israel Cyber Standoff - The Hacktivist Front

Between June 12–18, 2025, over 35 pro-Iranian hacktivist groups launched coordinated cyberattacks against Israeli military, government, and infrastructure targets, using DDoS, data leaks, and disinformation. Only 4–5 pro-Israel groups responded. These unsophisticated yet widespread attacks continue a year-long trend of exaggeration and recycled data. CloudSEK recommends urgent DDoS mitigation, multi-factor authentication, threat monitoring, and stronger incident response protocols.

Authors
Pagilla Manohar Reddy
Co-Authors

Executive Summary

The Iran-Israel conflict experienced a significant escalation in cyber hacktivist activity between June 12-18, 2025, with over 35 distinct pro-Iranian groups launching coordinated attacks against Israeli infrastructure compared to only 4-5 identified pro-Israeli groups responding. This week-long surge follows the same tactical patterns observed throughout the broader June 2024-June 2025 period, demonstrating that hacktivist groups have not evolved their methodologies despite a full year of operations. The attacks predominantly consisted of DDoS assaults, website defacements, and claimed data breaches targeting government sites, military systems, and critical infrastructure, mirroring the unsophisticated approach used consistently over the past year. Most significantly, these recent attacks maintain the same pattern of exaggeration and disinformation that has characterized the broader hacktivist ecosystem, with groups continuing to take credit for unrelated service outages, recycle old data leaks, and inflate damage claims for media attention rather than achieving substantial operational impact.

Pro-Israel vs Pro-Iran Cyber Attacks

Pro-Iran Groups and Attacks

Group Name Primary Attack Targeted Entities
HackYourMomData breach/Credential leakMultiple FTP and website systems
Liwa Muhammad ﷺDDoS attacks, Missile strike claimsIsraeli Ministry of Defense, Unit 8200, Camero-Tech
IRGC-affiliated channelInfrastructure attacksNevatim Airbase, F-35/F-16/F-15 aircraft, command centers
Cyber-hacker 🇵🇸Information warfare, DDoSTel Aviv infrastructure, Israeli systems
LulzSec Black 🇵🇸DDoS, System disruptionAir/sea navigation systems, alert systems, infrastructure
Ghost PrincessInformation warfare, System attacksIsraeli military bases, defense systems
Lực Lượng Đặc Biệt Quân Đội Điện TửLayer 7 DDoS attacksIsraeli government sites, educational institutions
Dark Storm TeamWebsite monitoring/targetingIsraeli government ministries
Cyber Fattah teamCyberattacks, Information warfareIsraeli infrastructure
TEAM FEARLESDDoS attacksIsraeli government website
Anonymous groupsDDoS, Website defacementVarious Israeli sites
Nation Of SaviorsDDoS attacksIsraeli government website
Red Wolf CyberInfrastructure attacksIsraeli Ministry of Defense
SYLHET GANG-SGService disruptionTzofar Red Alert app, radio stations
DieNetData breach, Service disruptionIsrael Antiquities Authority, radio stations
Laneh/Team NestInfrastructure attacksIsraeli energy infrastructure
APT IRANData exfiltration, RansomwareIsraeli academic/government systems
Unified Islamic Cyber ResistanceICS attacksYBS (electric vehicle fleet management)
EvilMoroccoData theft757 GB Israeli infrastructure data
BD AnonymousData collection, DoxxingNetanyahu personal info, Israeli data
Team 1722Agency compromiseIsraeli/US agencies
Islamic Hacker ArmySystem breachIDF defense research computers
RootSecAccount hijackingIsraeli Instagram accounts
MadCapZoneAlert system attackTzofar system
Fatah cyber teamInfrastructure attacksIsraeli systems
Lebanese groupsDDoS attacksCamero-Tech radar systems
Handala HackData breachIsraeli military systems, Delek Group
Arabian GhostsDDoS attacksBank of Israel, Barzilai Medical Center
TwoNetDDoS, Data dumpsIsraeli defense/tech companies
Fatimion Cyber TeamGovernment system attacksIsraeli Air Force, government sites
REVOLUSI HIME666Data breachaurion-hosting.co.il
R3V0XAn0nymousWebsite attacksBNP Paribas Israel, Ministry of Education
INTEIDMulti-sector attacksIsraeli news, telecom, medical orgs

Pro-Israel Groups and Attacks

Group Name Primary Attack Targeted Entities
Syrian Electronic Army Data breach, Infrastructure targeting Iranian tech companies, nuclear facilities claims
Anonymous OpIran Unspecified attacks Iranian entities, IRGC facilities
Israeli hackers (via proxies) Cyberattacks Palestinian movements, solidarity groups
Predatory Sparrow Defensive operations Thwarted Iranian phone battery attack
Unattributed Israeli operations Infrastructure attacks Iranian nuclear sites, military facilities

Attack Statistics Summary

Category Number of Groups Primary Methods
Pro-Iran Groups 35+ distinct groups DDoS (most common), Data breaches, Ransomware, ICS attacks, Service disruption
Pro-Israel Groups 4–5 identified groups Infrastructure targeting, Data breaches, Defensive operations

Key Observations

  1. Attack Sophistication:
    • Pro-Iran groups: Mix of simple DDoS to complex ICS attacks
    • Pro-Israel groups: More targeted infrastructure operations
  2. Geographic Distribution:
    • Anti-Israel groups: Iran, Palestine, Indonesia, Lebanon, Yemen, international Anonymous affiliates
    • Pro-Israel groups: Less geographically diverse
  3. Target Selection:
    • Anti-Israel: Government sites, military systems, critical infrastructure, civilian services
    • Pro-Israel: Nuclear facilities, military infrastructure, tech companies

This analysis is based on the claims made in the hacktivist groups and does not verify the accuracy or success of these claimed attacks.

Hacktivist Campaigns (Jun 2024–Jun 2025)

  • Target Scope:


    • Attacks escalated against government bodies, election infrastructure, critical services, and high-visibility digital platforms.
    • Geopolitical focus:
      • Pro-Russian groups hit the EU (parliamentary elections) and UK (general election).
      • Pro-Palestinian/Islamist groups targeted Israel and India in response to military actions.
      • American and European assets frequently targeted for ideological or retaliatory reasons.

  • Motivations:
    • Driven by real-world events, arrests, or perceived injustices.
    • Examples:
      • Surge in attacks post Pahalgam terror incident (India) and Israel-Iran strikes (June 2025).
      • Justifications often rooted in nationalism, anti-Western sentiment, or religious causes (e.g., #FreeDurov, Operation Sindoor).

  • Tactics Used:
    • Predominantly DDoS, website defacement, and basic data leaks.
    • Data usually sourced from compromised credentials or misconfigured systems.
    • Notable groups like RipperSec and Mr_Hamza used combined takedown + defacement strategies.
    • Rise in multi-vector DDoS and short-lived data leaks, though most remain technically basic.

  • Narrative Manipulation & Attribution Issues:
    • Frequent exaggeration or fabrication of "breaches."
    • Groups often:
      • Claim credit for unrelated outages.
      • Reuse or repackage old leaks.
      • Inflate impact for media attention.

    • Attribution is murky due to shared handles, recycled themes, and cross-group narratives.
    • Some consistency is observed in groups like NoName057(16) and DieNet, but much of the scene is driven by theatrics.

Recommendations

Based on this analysis, immediate security measures should include:

  • Implement robust DDoS protection across government and critical infrastructure websites, including rate limiting, traffic filtering, and content delivery network services to mitigate the most common attack vector
  • Strengthen credential security through mandatory multi-factor authentication, regular password updates, and privileged access management systems to prevent unauthorized access from compromised credentials
  • Establish threat intelligence monitoring of hacktivist Telegram channels and social media platforms to provide early warning of planned campaigns and coordinate defensive responses
  • Develop incident response protocols that include rapid assessment capabilities to distinguish between actual breaches and false claims, preventing unnecessary panic and resource allocation
  • Enhance public communication strategies to counter disinformation campaigns by providing factual updates on attack impacts and correcting exaggerated claims made by hacktivist groups
  • Implement network segmentation for critical systems to limit the potential impact of successful intrusions and prevent lateral movement within organizational networks
  • Conduct regular security assessments of public-facing assets to identify and remediate misconfigurations that could be exploited by opportunistic attackers

References