Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

X taps William Shatner to distribute an invitation to his payment service X Money

Father sues Google, claiming Gemini chatbot drove son into deadly delusions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » 149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict
Identity

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

userBy userMarch 4, 2026No Comments6 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity in the wake of the joint US-Israeli military operations against Iran, codenamed Epic Fury and Roaring Lion.

“The hacktivist threat in the Middle East is highly skewed, with two groups, Keymous+ and DieNet, leading nearly 70% of all attack activity from February 28 to March 2,” Radware said in a report on Tuesday. The first distributed denial of service (DDoS) attack was launched by Hider Nex (also known as Tunisian Maskers Cyber ​​Force) on February 28, 2026.

According to details shared by Orange Cyberdefense, Hider Nex is a shadowy Tunisian hacktivist group that supports pro-Palestinian causes. Leverage hack-and-leak strategies that combine DDoS attacks and data breaches to leak sensitive data and advance geopolitical agendas. This group was born in mid-2025.

In total, we recorded a total of 149 alleged hacktivist DDoS attacks targeting 110 different organizations in 16 countries. The attacks were carried out by 12 different groups, including Keymous+, DieNet, and NoName057(16), accounting for 74.6% of all activity.

The majority of these attacks, 107, were concentrated in the Middle East, disproportionately targeting public infrastructure and nation-state targets. 22.8% of global activity during this period was in Europe. Almost 47.8% of all targeted organizations worldwide were in the government sector, followed by the finance (11.9%) and telecommunications (6.7%) sectors.

“The digital front is expanding in parallel with the physical front in the region, with hacktivist groups targeting more countries in the Middle East simultaneously than ever before,” Radware said. “The distribution of attacks in the region is concentrated in three specific countries: Kuwait, Israel, and Jordan, with Kuwait accounting for 28% of all attack claims, Israel accounting for 27.1%, and Jordan accounting for 21.5%.”

In addition to Keymous+, DieNet, and NoName057(16), other groups that engaged in subversive operations include the Nation of Saviors (NOS), Conquerors Electronic Army (CEA), Sylhet Gang, 313 Team, Handala Hack, APT Iran, Cyber ​​Islamic Resistance, Dark Storm Team, FAD Team, Evil Markhors, and PalachPro, according to Flashpoint data. Palo Alto Networks Unit 42, and Radware.

The scope of current cyber attacks is as follows:

Pro-Russian hacktivist groups such as Cardinal and Russian Legion claimed to have compromised Israeli military networks, including the Iron Dome missile defense system. An active SMS phishing campaign has been observed using malicious replicas of the Israeli Home Front Command RedAlert application to deliver mobile surveillance and data leakage malware. “By manipulating victims into sideloading this malicious APK under the guise of an emergency wartime update, the adversary was able to deploy a fully functional alert interface, masking an intrusive monitoring engine designed to prey on hyper-vigilant populations,” CloudSEK said. Iran’s Islamic Revolutionary Guards Corps (IRGC) targeted the energy and digital infrastructure sectors in the Middle East, attacking data centers of Saudi Aramco and Amazon Web Services in the UAE, with the aim of “inflicting maximum pain on the global economy as a response to military losses,” Flashpoint said. Cotton Sandstorm (aka Haywire Kitten) claimed to have hacked a Bahraini website and resurrected his old cyber persona, Altoufan Team. “This reflects the reactive nature of this actor’s activities and their likely further involvement in incursions throughout the Middle East during times of conflict,” Check Point said. Data collected by Nozomi Networks shows that the Iranian state-sponsored hacker group known as UNC1549 (also known as GalaxyGato, Nimbus Manticore, or Subtle Snail) was the fourth most active actor in the second half of 2025, focusing on attacks on defense, aerospace, telecommunications, and local government to advance the country’s geopolitical priorities. Iran’s main cryptocurrency exchanges remain open but have announced operational adjustments, including suspending or bulk processing withdrawals, and issued risk guidance urging users to prepare for possible connection disruptions. “What we are seeing in Iran is not clear evidence of mass capital flight, but rather markets managing volatility under constrained connectivity and regulatory intervention,” said Ali Redboad, global policy director at the TRM Institute. “Iran has been running a shadow economy for years, using cryptocurrencies in part to evade sanctions through sophisticated offshore infrastructure. Under the strain of war, communications blackouts, and volatile markets, what we are now witnessing is a real-time stress test of that infrastructure and the regime’s ability to leverage it.” “We have observed an uptick in hacktivist activity, including DDoS attacks from Iran and other pro-Iranian actors, website defacements, and unconfirmed claims of compromise involving Israeli infrastructure, but we have not observed an increase in risk,” he said. The UK’s National Cyber ​​Security Center (NCSC) has warned organizations of the increased risk of Iranian cyber-attacks and urged them to strengthen their cybersecurity posture to better respond to DDoS attacks, phishing operations and ICS targets.

Cynthia Kaiser, senior vice president of Halcyon’s Ransomware Research Center and former assistant director of the Federal Bureau of Investigation’s cyber division, said in a post shared on LinkedIn that Iran has a history of using cyber operations to retaliate against “perceived political slights,” adding that these operations are increasingly incorporating ransomware.

“The Iranian government has long preferred to turn a blind eye, or at least turn a blind eye, to civilian cyber operations against targets of the United States, Israel, and other allies,” Kaiser added. “That’s because having access to cybercriminals gives governments options. As Iran considers its response to U.S. and Israeli military action, it is likely to activate one of these cyberattackers if it believes their operations could have a meaningful retaliatory effect.”

Cybersecurity firm SentinelOne also assesses with high confidence that organizations in Israel, the United States, and allied countries are likely to face direct or indirect targets, particularly in the government, critical infrastructure, defense, financial services, academic, and media sectors.

“Iranian threat actors have historically demonstrated a willingness to blend espionage, disruption, and psychological influence operations to advance strategic objectives,” Nozomi Networks said. “In times of instability, these operations often intensify, targeting critical infrastructure, energy networks, government institutions, and private industry far beyond the immediate conflict area.”

To combat the risks posed by dynamic conflicts, organizations are encouraged to activate continuous monitoring to reflect escalating threat activity, update threat intelligence signatures, reduce external attack surfaces, conduct comprehensive exposure reviews of connected assets, verify proper segmentation between information technology and operational technology networks, and ensure proper isolation of IoT devices.

“In past conflicts, Tehran’s cyber adversaries have operated in alignment with broader strategic objectives that increased pressure and visibility on targets in energy, critical infrastructure, finance, telecommunications, healthcare, and more,” Adam Myers, head of counteradversarial operations at CrowdStrike, said in a statement shared with Hacker News.

“Iran’s adversaries continue to evolve their methods, expanding beyond traditional intrusions to cloud and identity-focused operations, and are positioned to increase scale and impact and move quickly across hybrid enterprise environments.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleX taps William Shatner to distribute an invitation to his payment service X Money
user
  • Website

Related Posts

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

March 4, 2026

New RFP template for AI usage control and AI governance

March 4, 2026

Fake Laravel packages on Packagist deploy RAT on Windows, macOS, and Linux

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

X taps William Shatner to distribute an invitation to his payment service X Money

Father sues Google, claiming Gemini chatbot drove son into deadly delusions

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.