How hacktivist cyber operations surged amid Israeli-Iranian conflict

In June 2025, Israel carried out airstrikes against key Iranian military and nuclear facilities. Iran swiftly retaliated, escalating regional tensions to unprecedented levels. This military confrontation has not only unfolded in conventional warfare but also triggered a massive surge in cyber operations.

Almost immediately after the kinetic attacks, numerous hacktivist groups began launching cyberattacks primarily targeting Israel and its international allies. The vast majority of these groups present themselves as pro-Iranian and pro-Palestinian actors, motivated by ideological, political, and religious narratives.

However, cybersecurity analysts caution that certain attacks may involve nation-state actors disguising their activity behind the facade of hacktivism. This phenomenon is widely referred to as faketivism.

Summary of hacktivist activity in the Israel-Iran conflict

This article provides a comprehensive, evidence-based analysis of the hacktivist activity surrounding the Israeli-Iranian conflict, examining public statements, claimed attacks, profiles of the key actors involved, and emerging patterns suggesting state-sponsored faketivist involvement.

  • Over 80 distinct hacktivist groups are actively conducting or supporting offensive cyber operations targeting Israel and its allies. To a lesser extent, there are some hacktivist groups supporting Israel as well.
  • Primary motivations of these groups include pro-Palestinian solidarity, anti-Western sentiment, Islamic ideological alignment, and in some cases, direct support for Iranian geopolitical objectives.
  • Attacks span across government, military, defense contractors, judicial systems, energy infrastructure, satellite operations, ICS/OT systems, social media platforms, and financial institutions.
  • Several hacktivist entities (e.g., Keymous+, Mr Hamza, Mysterious Team, Inteid, Cyber Islamic Resistance) demonstrate coordination, sharing resources and intelligence, and form operational alliances.
  • Suspected faketivist entities such as CyberAv3ngers, Handala, and Predatory Sparrow are likely operating with state support or directly under state direction.

Hacktivist groups’ statements and strategic alliances

Following the Israeli military strikes on Iranian targets, dozens of hacktivist groups responded almost immediately with statements of solidarity and coordinated calls for cyber retaliation. Most of these communications occurred via Telegram, with some activity spilling onto X (formerly Twitter).

These public declarations are ideologically charged, often referencing anti-Zionist, pan-Islamic, and anti-Western narratives. Below is an overview of key statements and alliances made:

Mysterious Team Bangladesh

This group expressed full support for Iran, calling for “Operation True Promise 3” against Israel. The group warned Jordan, Egypt, and Saudi Arabia to avoid interfering with Iranian operations or risk retaliatory cyberattacks against their own infrastructure.

Mysterious Team Bangladesh announcing cyber operations against Israeli and regional defense systems supporting Israel.
Figure 1: Mysterious Team Bangladesh announcing cyber operations against Israeli and regional defense systems supporting Israel.

Team Insane Pakistan

The pro-Pakistan hacktivist group expressed solidarity, urging Iran to aggressively challenge Israel. They compared the conflict to Pakistan’s recent confrontations with India.

Team Insane Pakistan showing explicit cyber support for Iran, framing its actions as resistance against regional powers.
Figure 2: Team Insane Pakistan showing explicit cyber support for Iran, framing its actions as resistance against regional powers.

Z-Alliance

In a statement written in Russian, Z-Alliance openly declared their full support for Iran. They rejected political neutrality and stated their readiness to conduct offensive operations without constraint.

Z-Alliance openly declaring support for Iran and threatening cyber retaliation against perceived opponents.
Figure 3: Z-Alliance openly declaring support for Iran and threatening cyber retaliation against perceived opponents.

Server Killers

Server Killers publicly aligned themselves with the anti-Israel campaign and initiated attacks against Israeli judicial, educational, and governmental web infrastructure. They simultaneously encouraged widespread participation from external supporters.

Server Killers explicitly calling for cyberattacks against Israeli governmental websites.
Figure 4: Server Killers explicitly calling for cyberattacks against Israeli governmental websites.

Akatsuki Cyber Team

Akatsuki Cyber Team positioned itself within the pan-Muslim hacktivist narrative, fully rejecting Israel’s legitimacy as a state and expressing intentions to unite additional actors for a broader coordinated cyber offensive.

Akatsuki Cyber Team expressing refusal to recognize Israel and promising escalated cyberattacks.
Figure 5: Akatsuki Cyber Team expressing refusal to recognize Israel and promising escalated cyberattacks.

GhostSec

GhostSec expanded its already ongoing campaigns against Israeli infrastructure, presenting a detailed summary of previously compromised Israeli water, industrial control, and satellite systems. The group outlined its ongoing multiphase attacks, reflecting both persistent operational capabilities and a continued escalation model.

GhostSec announcing attacks on Israeli infrastructure, detailing compromised Modbus and VSAT devices.
Figure 6: GhostSec announcing attacks on Israeli infrastructure, detailing compromised Modbus and VSAT devices.

Keymous+ and Inteid

Keymous+ and Inteid announced collaboration, explicitly supporting Iranian cyberwar efforts and naming specific Israeli media targets, demonstrating operational coordination.

Keymous and Inteid groups coordinating cyberattacks supporting Iran against Israeli digital infrastructure.
Figure 7: Keymous and Inteid groups coordinating cyberattacks supporting Iran against Israeli digital infrastructure.

Anonymous Kashmir and Mr Hamza Cyber Force

Anonymous Kashmir and Mr Hamza Cyber Force formalized their alliance, explicitly stating unity based on shared ideological motives. They emphasized joint efforts in support of Palestine and Iran.

Mr Hamza and Anonymous Kashmir announcing an alliance and listing cyberattack targets in Israel.
Figure 8: Mr Hamza and Anonymous Kashmir announcing an alliance and listing cyberattack targets in Israel.

DieNet

The group has positioned itself as a vocal supporter of Iran in the broader cyber conflict against Israel, amplifying Tehran’s messaging while leveraging digital platforms for influence operations.

DieNet announcing support for Iran in an ongoing cyber conflict, detailing planned attacks on Israeli radio infrastructure.
Figure 9: DieNet announcing support for Iran in an ongoing cyber conflict, detailing planned attacks on Israeli radio infrastructure.

BD Anonymous & Root Cyber 25

They have formed a new alliance with religious and ideological messaging, stating their intention to support Palestine and oppose Zionism, colonialism, and the West.

BD Anonymous and Root Cyber 25 alliance banner promoting “One Ummah, One Mission".
Figure 10: BD Anonymous and Root Cyber 25 alliance banner promoting “One Ummah, One Mission“.

Claimed hacktivist cyber-attacks on Israeli government and critical industries

Hacktivist groups have claimed responsibility for a wide range of cyberattacks on Israeli systems. While many of these claims remain unverified, they reveal the breadth and ambition of these actors, from symbolic defacements to alleged disruptions of critical infrastructure.

Here is a structured breakdown of publicly claimed attacks:

Industry SectorOrganization / Targeted SystemsClaiming Hacktivist Group
Academic & Research InstitutionsWeizmann Institute of Science (Data exfiltration)Handala Hack
Agriculture & Food SecurityIsraeli Ministry of Agriculture and Food Security (data leak)Digital Ghost
Commercial ServicesBeatBox Karaoke (Israeli entertainment chain)DieNet
Energy Infrastructure Delek GroupHandala Hack
Energy Infrastructure Paz Oil Company, Rapac EnergyMr Hamza
Energy Infrastructure Haifa Refinery, oil pipelines, gas transmission linesLaneh 
Financial InstitutionsBNP Paribas IsraelR3VOXAnonymous
Financial InstitutionsMercantile Discount Bank (Israel)Inteid
Financial InstitutionsAgura B.C., LTD (crypto infrastructure vendor, Haifa)Handala Hack
Financial InstitutionsNobitex (Iranian crypto exchange)Gonjeshke Darande
Government Alert SystemsTzofar Red Alert SystemGhostSec, DieNet
Government InstitutionsIsraeli Judicial Authority, Supreme Court of IsraelServer Killers
Government InstitutionsIsraeli Ministry of EducationServer Killers, R3VOXAnonymous, Dark Storm Team
Government InstitutionsJordanian Ministry of EducationArabian Ghosts
Government InstitutionsIsrael Ministry of JusticeDark Storm Team
Government InstitutionsIsrael State ArchivesDark Storm Team
Government InstitutionsIsrael Tax AuthorityDark Storm Team
Government InstitutionsIsrael Supreme CourtDark Storm Team
ICS/OT Systems100+ Modbus PLC devices, 40+ Aegis 2 water control devices, 8 Unitronics devicesGhostSec
ICS/OT SystemsSiemens S7 PLCs in Tel AvivSYLHET GANG SG
Internet InfrastructureTel Aviv Internet (ISP: R.L Internet and Networks Ltd.)Cyber Islamic Resistance
LogisticsPart2Port (port logistics)Mr Hamza
LogisticsMor-Logistics Ltd (425GB data leak)Handala Hack
Media NetworksIsraeli television network TBN (data deletion)Cyber Islamic Resistance / @zerodayx1
Media NetworksIsraeli Radio Live servicesDieNet
Media NetworksIsraelNews.co.il, Nana10.co.ilArabian Ghosts
Media NetworksTimes of Israel (DoS outage)Cyber Jihad Movement, Team Fearless (JOS)
Military & SecurityCyber Command operations under IDF Maj. Gen. Shlomi BinderHandala Hack
Military & SecurityAshot Ashkelon Industries, Meprolight, Orbit Communications SystemsMr Hamza
Military & SecurityElbit Systems, Aeronautics, IMCO, Plasan, DSIT Solutions, Tar Ideal ConceptsMr Hamza
Military & SecurityIron Dome System (alleged data leak)Digital Ghost
Municipal InfrastructureIsrael Antiquities Authority (document breach 2016–2025)DieNet
Satellite InfrastructureNof-Yam, Gilat Satellite Networks, Imagesat Intl.ARABIAN GHOSTS
Satellite Infrastructure10 VSAT devicesGhostSec
Social Media PlatformsIsraeli Instagram AccountsTeam Fearless / #WeAreRootSec
Social Media PlatformsPersonal data of PM Netanyahu (doxxing)Team Fearless / #WeAreRootSec
Statistical & Data PlatformsIsrael Central Bureau of Statistics (cbs.gov.il)WeAreRootSec
Transportation ServicesCityRide (Israeli ride-sharing platform)Inteid
Water InfrastructureGan HaDarom pumping station, Gderot Regional CouncilZ-Alliance

These incidents range from relatively unsophisticated DDoS and web defacement campaigns to disruptions of ICS/OT systems, exfiltration of sensitive data, and psychologically targeted doxxing campaigns. Some groups have even hinted at ransomware deployments, suggesting an escalation in both capabilities and intent.

Who are the main hacktivist groups involved, and what are their capabilities?

The following groups have notably increased their operational tempo amid this geopolitical conflict:

Mr Hamza

  • Focus: Pro-Muslim, pro-Palestinian, anti-pornography, anti-Western platforms.
  • Activities: Attacks on Israeli military suppliers, ports, energy companies, communications, defense contractors, IT, and government portals.
  • Tools: Abyssal DDoS V3, botnets (Maple, Onyx C2, RebirthStress, Squid C2).
  • Alliances: Anonymous Kashmir, Anonymous Guys, Team Fearless, Azzasec, Arab Ghosts Hackers.
  • Origin Hypothesis: Possibly Moroccan-managed (unconfirmed).
Mr Hamza sharing a distributed denial-of-service (DDoS) attack tool and listing Israeli companies targeted.
Figure 11: Mr Hamza sharing a distributed denial-of-service (DDoS) attack tool and listing Israeli companies targeted.

Dark Storm Team

  • Focus: Pro-Palestine, pro-Russia, anti-NATO, anti-Israel, financially motivated hacktivism.
  • Activities: DDoS-for-hire services, web defacements, data leaks, crypto-based fundraising, anti-Western propaganda.
  • Tools: Arthur C2 botnet, Telegram-based DDoS orchestration platforms.
  • Alliances: Moroccan Black Cyber Army, Akatsuki Cyber Team, Z-Pentest, Keymous+, Noname057(16).
  • Origin Hypothesis: Egyptian leadership.
Dark Storm Team claiming responsibility for cyberattacks on multiple Israeli government services, including the Ministry of Justice, Police, Education, and the Supreme Court.
Figure 12: Dark Storm Team claiming responsibility for cyberattacks on multiple Israeli government services, including the Ministry of Justice, Police, Education, and the Supreme Court.

GhostSec

  • Focus: Pro-Islam, anti-Israel, human rights hacktivism; highly organized; former commercial cybercrime activity.
  • Activities: DDoS, ICS targeting, industrial sabotage, data exfiltration, extortion, ransomware (GhostLocker), doxing, spamming, zero-day sales.
  • Tools: Custom tools (GhostLocker ransomware, GhostStealer, Ghostly Development malware), botnet services; DarkZone forum launched in 2024.
  • Alliances: SiegedSec (longstanding partner), Stormous (joint ransomware), Five Families (until 2024).
GhostSec detailing their extensive cyber campaign targeting critical Israeli industrial systems.
Figure 13: GhostSec detailing their extensive cyber campaign targeting critical Israeli industrial systems.

DieNet

  • Focus: Anti-Zionist, anti-US, anti-Trump hacktivism; increasingly aligned with Iranian geopolitical narratives.
  • Activities: DDoS attacks on Israeli emergency alert and radio broadcasting infrastructure; data leaks from government and media entities; defacements of commercial websites; public psychological operations via Telegram; announced development of the “LockNet” ransomware platform.
  • Tools: Custom botnet for DDoS attacks (unnamed); third-party verification tools (e.g., Check-Host.net); bespoke scripts for service availability monitoring and attack confirmation.
  • Alliances: Possible relation with Arabian Ghosts; public rivalry with Dark Storm Team.
  • Origin: Decentralized international actor network; most of its members are allegedly from Russia.
DieNet claims responsibility for breaching Israeli karaoke chain BeatBox, and targeting Israeli radio infrastructure (103FM) during ongoing missile strikes.
Figure 14: DieNet claims responsibility for breaching Israeli karaoke chain BeatBox, and targeting Israeli radio infrastructure (103FM) during ongoing missile strikes.

Arabian Ghosts

  • Focus: Regional and ideological hacktivism; initially anti-Iran/Russia, now aligned with anti-Israel operations.
  • Activities: DDoS, defacements, ICS/OT disruption, data leaks. Claimed Red Alert app attack; announced but unconfirmed ransomware project BadLadyBird.
  • Origin Hypothesis: Likely Syrian; self-identified as “Syrian Ghosts” supporting Anonymous Syria.
  • Alliances: No formal ties, but recurrent references to DieNet, Mr. Hamza, SYLHET_GANG_SG, and others suggest informal collaboration.
 Arabian Ghosts claiming responsibility for takedowns of multiple satellite and defense-related domains, as well as the Jordanian Ministry of Education.
Figure 15: Arabian Ghosts claiming responsibility for takedowns of multiple satellite and defense-related domains, as well as the Jordanian Ministry of Education.

Laneh Dark

  • Focus: Pro-Iran, anti-Israel, anti-Gulf states; ideologically driven hacktivism with elements of cyber extortion.
  • Activities: Data theft and ransom-style pressure tactics on companies in Saudi Arabia, Jordan, UAE, and Azerbaijan; public leaks of sensitive infrastructure data; political messaging aligned with Iranian strategic interests; alleged mass device access via “All Seeing Eye” vulnerability.
  • Tools: Custom leak operations; extortion demands; Telegram/X for psychological ops; claims of undisclosed vulnerability exploitation tools affecting 45,000 global systems.
  • Alliances: NoName057(16); part of “Nest Security Group” alliance with Russian, Palestinian, and Iranian-affiliated actors.
  • Origin Hypothesis: Likely Iranian-managed, ideologically motivated with indirect state alignment; emerged in 2024 with increasing visibility post-June 2025.
Laneh Dark publishes what it claims to be classified topographical and structural maps related to Israeli energy infrastructure.
Figure 16: Laneh Dark publishes what it claims to be classified topographical and structural maps related to Israeli energy infrastructure.

Are nation-states disguising themselves as hacktivists?

While many hacktivist groups appear motivated by ideological or political convictions, several actors involved in the Israeli-Iranian conflict are suspected of being state-controlled or heavily state-influenced, blurring the lines between grassroots hacktivism and state-sponsored cyber operations.

These so-called faketivist entities serve as plausible deniability fronts for nation-states, complicating attribution and escalating geopolitical risks. These groups blur the line between independent hacktivism and state-sponsored cyber warfare, complicating attribution and increasing the geopolitical risks of escalation.

Notable faketivist entities that analysts continuously monitor include:

Cyber Av3ngers

  • Attribution: Iran-linked faketivist group likely operated under IRGC (Islamic Revolutionary Guard Corps) control.
  • Focus: Disruption of Israeli and U.S. critical infrastructure (ICS/OT, energy, water systems).
  • Activities: Targeting Israeli companies (e.g., BAZAN Group), U.S. water plants (Unitronics PLCs), oil & gas (Sophos firewall exploits); data exfiltration, limited sales of compromised data in underground forums.
  • Tools: IOControl embedded Linux backdoor with wiper capabilities; AI-assisted vulnerability research; ICS/SCADA exploit development.
  • Alliances: May have indirect links with other Iranian groups such as Moses Staff; unconfirmed relations with IRGC’s “Soldiers of Solomon“.
  • Commercial Activity: Participated in data sales via Breached and DarkForums, though with limited underground presence.

Handala Hack Team

  • Attribution: Likely Iranian-controlled faketivist persona posing as pro-Palestinian hacktivist group.
  • Focus: Phishing-based wiper deployment using social engineering around high-profile events.
  • Activities: Claimed “Operation HamsaUpdate” (Hatef/Hamsa wipers exploiting F5 vulnerabilities) and phishing during the 2024 CrowdStrike outage.
  • Indicators of State Backing: High sophistication in targeting, Hebrew language proficiency, victim data inclusion, consistent with state-level preparation.
  • Tools: Hatef (Windows wiper), Hamsa (Linux wiper); social engineering campaigns leveraging trending security incidents.
  • Underground Presence: Brief activity in BreachForums and RAMP after December 2023 creation; maintains active Telegram channels and TOR domains.
Handala Hack group claiming the breach of sensitive data from Delek Group and Weizmann Institute of Science.
Figure 17: Handala Hack group claiming the breach of sensitive data from Delek Group and Weizmann Institute of Science.

Preadtory Sparrow (aka Gonjeshke Darande)

  • Attribution: Highly likely Israeli state-sponsored offensive actor masquerading as an Iranian opposition group. Read our recent analysis into their attack on the Nobitex crypto exchange.
  • Focus: Strategic disruption of Iranian critical infrastructure.
  • Activities: Sabotage of Iran’s railway (Meteor wiper), gas stations (payment system attacks), steel industry (Khouzestan mill sabotage), energy infrastructure.
  • Tools: Custom wipers (Meteor, Stardust, Comet), lockscreen message payloads; highly tailored attacks involving prior detailed reconnaissance.
  • Narrative Control: Justifies operations via Telegram/X accounts with anti-IRGC (Quds Force) rhetoric, emphasizing civilian protection.
  • Tactics: Long periods of dormancy between highly impactful operations, often coinciding with major regional escalations.
Gonjeshke Darande claiming responsibility for a cyberattack targeting the infrastructure of Iran's Islamic Revolutionary Guard Corps, specifically Bank Sepah.
Figure 18: Gonjeshke Darande claiming responsibility for a cyberattack targeting the infrastructure of Iran’s Islamic Revolutionary Guard Corps, specifically Bank Sepah.

What can we expect next in this evolving cyber conflict?

The dramatic rise in hacktivist cyber operations following recent geopolitical escalations between Israel and Iran underscores the increasingly central role cyber conflict plays within modern warfare. Ideologically-driven hacktivists, alongside possible nation-state faketivists, have clearly demonstrated their readiness to exploit geopolitical tensions to pursue diverse strategic objectives.

Given that the Israeli-Iranian confrontation is still developing, it’s hard to predict whether a ceasefire will hold. If cyber activity re-intensifies, expected trends would likely include:

  • Increased DDoS campaigns targeting Israeli energy, telecom, defense, and government systems.
  • Escalation towards allies such as the US, UK, and Arab states aligned with Israel.
  • Emerging retaliatory operations by pro-Israeli groups such as Predatory Sparrow, already engaging in offensive activity against Iranian systems.
  • Sustained propaganda and psychological operations, further exploiting public fear and political instability.

Organizations across all geopolitical fault lines are advised to adopt heightened cybersecurity postures to defend against what may evolve into a prolonged and highly disruptive cyber conflict.

Stay ahead of emerging threats

Outpost24’s CompassDRP solution combines the asset discovery powers of our EASM platform with threat-intelligence powered DRP modules. Customers are backed up by our world-class human-led threat intelligence team, KrakenLabs. Get in touch to learn more. 

About the Author

Lidia López Sanz Senior Threat Intelligence Analyst

Lidia is a Senior Threat Intelligence Analyst at Outpost24’s KrakenLabs Strategic Research team. Her role involves researching and profiling threat actors, monitoring their campaigns, IOCs, and TTPs. She also creates threat intelligence reports and keeps a close eye on fraudulent activity in the cybercriminal underground.