Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Noauth’s vulnerability still affects 9% of Microsoft Entra SaaS apps two years after discovery

Citrix releases emergency patch for CVE-2025-6543 actively utilized in Netscaler ADC

Bumble to solve 30% of employees

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Pro-Iranian hacktivist group leaks personal records from the 2024 Saudi Arabian game
Identity

Pro-Iranian hacktivist group leaks personal records from the 2024 Saudi Arabian game

userBy userJune 25, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Pro-Iranian hacktivist group

The personal records of thousands of people allegedly linked to athletes and visitors to the Saudi Arabian game are published online by a group of hacktivists in Pruilla called Cyberfatta.

The return of the cybersecurity company said that the violation was announced on Telegram in the form of a SQL database dump on June 22, 2025, and was characterized as an information manipulation “conducted by Iran and its deputies.”

“The actors gained unauthorized access to the phpmyAdmin (backend) and ruled out records,” Resecurity said. “This is an example of Iran using data breaches as part of larger anti-US, anti-Israel, and anti-Saudi propaganda activities in cyberspace, targeting major sports and social events.”

The data is likely to be drawn from the official Saudi Games 2024 website and then shared on Darkforums, a cybercrime forum that has since attracted attention following repeated takedowns of Breachforums. This information was published by a forum user named Zerodayx, a burner profile that is likely created to promote this violation.

The leaked data contains IT staff credentials. Official government email address. Athlete and visitors information. Passport and ID card. Bank statement. Medical form; A copy of a confidential document has been scanned.

“Cyberfatta’s activities are consistent with the broader trends of hacktivism in the Middle East, where groups engage in cyber warfare as a form of behavior,” the response states.

Cybersecurity

The leak unfolds against the backdrop of a simmering tension between Iran and Israel, claiming that as many as 119 Hattivist groups have carried out cyberattacks or that they have made a declaration of concordance with two countries or acted with two countries per cyber knowledge.

Cyberfatta, known as the “Iranian Cyber ​​Team,” has a history of targeting Israeli and Western web resources and government agencies.

It is also known to work with other threat actors operating in the region, including the 313 team. This argued responsibility for the true denied social distributive (DDO) attacks on social media platforms in retaliation for US airstrikes on Iran’s nuclear facilities.

“This incident with Cyberfatta may represent an interesting shift from malicious Israeli-centric activity to a broad focus on anti-Sudi and anti-Saudi messages,” the response said.

Last week, a pro-Israel group known as predatory sparrows (aka Adalat Ali, Gonjeshke Dalande, Indra, or Metalexpress) allegedly leaked data obtained from the Iranian Ministry of Communications. In particular, it burned over $90 million in cryptocurrency by hacking nobitex, Iran’s largest cryptocurrency exchange, and sending digital assets to an invalid wallet.

Cybersecurity company Outpost24 said it could be “access to internal documents detailing the internal mechanisms of the exchange and authentication credentials” for attackers to pull off the robbery, or a case of fraudulent insiders who worked in the group.

“It was not a financially motivated robbery, it was a strategic, ideological and psychological operation,” said security researcher Lydia Lopez Sants. “The threat actor emphasized its goal by destroying its funds rather than removing them. It dismantles public trust in government-related institutions and demonstrates its technical advantage.”

Then, on June 18, Iran’s state broadcaster Irib (short for Iranian broadcasting in the Islamic Republic) television stream was hijacked to display images of pro-Israel and anti-Iranian governments. Ilib claimed that Israel was behind the incident.

Image source: CyberKnow

Israel has also been targeted by pro-Palestin hacking groups such as the Handala Team, which has listed several Israeli organizations on data leak sites since June 14, 2025.

Another trend observed in the cyberwar between Iran and Israel is a small gathering of hackitivist groups that form the presence of umbrellas such as cyber Islamic resistance and the United Cyber ​​Front of Palestinian and Iran.

Cybersecurity

“These loosely affiliated ‘Cyber ​​Unions’ share resources, synchronize campaigns and amplify their impact despite limited technical refinement,” Trustwave SpiderLabs said in a report released last week.

The company also picked out another pro-Iranian group named Dienette. This is thought to include connections between Russian-speaking members and other cyber communities in Eastern Europe despite Iran’s pro-Hamas attitudes.

“It is its hybrid identity that distinguishes Deenet from many other pro-Iranian actors.” “Linguistic analysis of Dienet’s messages and timestamps, metadata, and interaction patterns suggests that at least some of the groups communicate internally in Russian or use slab language resources.”

“This points to the broader phenomenon of cross-regional cyber collaboration, where ideological alignment overturns geographical or national boundaries.”

Group-IB in an analysis of Telegram-based Hacktivist activities during the period of V, Voshephing, June 13th. Overall, over 5,800 messages have been recorded across various Hacktivist channels between June 13th and 20th.

The development of cyber capabilities in the context of the Iranian-Israel war, as well as other recent geopolitical events surrounding the Hamas-Russia-Ukrain conflict, demonstrate the increasingly integrated digital operations to complement kinetic actions, influence public perceptions, and destroy critical infrastructure.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBeware of hidden risks in the Entra environment
Next Article Will the EU meet its packaging waste reduction goals?
user
  • Website

Related Posts

Noauth’s vulnerability still affects 9% of Microsoft Entra SaaS apps two years after discovery

June 25, 2025

Citrix releases emergency patch for CVE-2025-6543 actively utilized in Netscaler ADC

June 25, 2025

A defect in Citrix Bleed 2 allows token theft. SAP GUI is flawed in the risk of sensitive data exposure

June 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Noauth’s vulnerability still affects 9% of Microsoft Entra SaaS apps two years after discovery

Citrix releases emergency patch for CVE-2025-6543 actively utilized in Netscaler ADC

Bumble to solve 30% of employees

A defect in Citrix Bleed 2 allows token theft. SAP GUI is flawed in the risk of sensitive data exposure

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.