Executive Summary
The Iran-Israel conflict experienced a significant escalation in cyber hacktivist activity between June 12-18, 2025, with over 35 distinct pro-Iranian groups launching coordinated attacks against Israeli infrastructure compared to only 4-5 identified pro-Israeli groups responding. This week-long surge follows the same tactical patterns observed throughout the broader June 2024-June 2025 period, demonstrating that hacktivist groups have not evolved their methodologies despite a full year of operations. The attacks predominantly consisted of DDoS assaults, website defacements, and claimed data breaches targeting government sites, military systems, and critical infrastructure, mirroring the unsophisticated approach used consistently over the past year. Most significantly, these recent attacks maintain the same pattern of exaggeration and disinformation that has characterized the broader hacktivist ecosystem, with groups continuing to take credit for unrelated service outages, recycle old data leaks, and inflate damage claims for media attention rather than achieving substantial operational impact.
Pro-Israel vs Pro-Iran Cyber Attacks
Pro-Iran Groups and Attacks
Pro-Israel Groups and Attacks
Attack Statistics Summary
Key Observations
- Attack Sophistication:
- Pro-Iran groups: Mix of simple DDoS to complex ICS attacks
- Pro-Israel groups: More targeted infrastructure operations
- Geographic Distribution:
- Anti-Israel groups: Iran, Palestine, Indonesia, Lebanon, Yemen, international Anonymous affiliates
- Pro-Israel groups: Less geographically diverse
- Target Selection:
- Anti-Israel: Government sites, military systems, critical infrastructure, civilian services
- Pro-Israel: Nuclear facilities, military infrastructure, tech companies
This analysis is based on the claims made in the hacktivist groups and does not verify the accuracy or success of these claimed attacks.
Hacktivist Campaigns (Jun 2024–Jun 2025)

- Target Scope:
- Attacks escalated against government bodies, election infrastructure, critical services, and high-visibility digital platforms.
- Geopolitical focus:
- Pro-Russian groups hit the EU (parliamentary elections) and UK (general election).
- Pro-Palestinian/Islamist groups targeted Israel and India in response to military actions.
- American and European assets frequently targeted for ideological or retaliatory reasons.
- Motivations:
- Driven by real-world events, arrests, or perceived injustices.
- Examples:
- Surge in attacks post Pahalgam terror incident (India) and Israel-Iran strikes (June 2025).
- Justifications often rooted in nationalism, anti-Western sentiment, or religious causes (e.g., #FreeDurov, Operation Sindoor).
- Tactics Used:
- Predominantly DDoS, website defacement, and basic data leaks.
- Data usually sourced from compromised credentials or misconfigured systems.
- Notable groups like RipperSec and Mr_Hamza used combined takedown + defacement strategies.
- Rise in multi-vector DDoS and short-lived data leaks, though most remain technically basic.
- Narrative Manipulation & Attribution Issues:
- Frequent exaggeration or fabrication of "breaches."
- Groups often:
- Claim credit for unrelated outages.
- Reuse or repackage old leaks.
- Inflate impact for media attention.
- Attribution is murky due to shared handles, recycled themes, and cross-group narratives.
- Some consistency is observed in groups like NoName057(16) and DieNet, but much of the scene is driven by theatrics.
Recommendations
Based on this analysis, immediate security measures should include:
- Implement robust DDoS protection across government and critical infrastructure websites, including rate limiting, traffic filtering, and content delivery network services to mitigate the most common attack vector
- Strengthen credential security through mandatory multi-factor authentication, regular password updates, and privileged access management systems to prevent unauthorized access from compromised credentials
- Establish threat intelligence monitoring of hacktivist Telegram channels and social media platforms to provide early warning of planned campaigns and coordinate defensive responses
- Develop incident response protocols that include rapid assessment capabilities to distinguish between actual breaches and false claims, preventing unnecessary panic and resource allocation
- Enhance public communication strategies to counter disinformation campaigns by providing factual updates on attack impacts and correcting exaggerated claims made by hacktivist groups
- Implement network segmentation for critical systems to limit the potential impact of successful intrusions and prevent lateral movement within organizational networks
- Conduct regular security assessments of public-facing assets to identify and remediate misconfigurations that could be exploited by opportunistic attackers
References