Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    5 Methods to Use Cross-Validation to Enhance Time Sequence Fashions

    March 5, 2026

    Why the Hybrid SOC Is Your Subsequent Use of AI

    March 5, 2026

    149 Hacktivist DDoS Assaults Hit 110 Organizations in 16 International locations After Center East Battle

    March 5, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»149 Hacktivist DDoS Assaults Hit 110 Organizations in 16 International locations After Center East Battle
    AI Ethics & Regulation

    149 Hacktivist DDoS Assaults Hit 110 Organizations in 16 International locations After Center East Battle

    Declan MurphyBy Declan MurphyMarch 5, 2026No Comments6 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    149 Hacktivist DDoS Assaults Hit 110 Organizations in 16 International locations After Center East Battle
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Cybersecurity researchers have warned of a surge in retaliatory hacktivist exercise following the U.S.-Israel coordinated army marketing campaign towards Iran, codenamed Epic Fury and Roaring Lion.

    “The hacktivist menace within the Center East is extremely lopsided, with two teams, Keymous+ and DieNet, driving almost 70% of all assault exercise between February 28 and March 2,” Radware stated in a Tuesday report. The primary distributed denial-of-service (DDoS) assault was launched by Hider Nex (aka Tunisian Maskers Cyber Drive) on February 28, 2026.

    In keeping with particulars shared by Orange Cyberdefense, Hider Nex is a shadowy Tunisian hacktivist group that helps pro-Palestinian causes. It leverages a hack-and-leak technique combining DDoS assaults with knowledge breaches to leak delicate knowledge and advance its geopolitical agenda. The group emerged in mid-2025.

    In all, a complete of 149 hacktivist DDoS claims had been recorded concentrating on 110 distinct organizations throughout 16 international locations. The assaults had been carried out by 12 totally different teams, together with Keymous+, DieNet, and NoName057(16), which accounted for 74.6% of all exercise.

    Of those assaults, the overwhelming majority, 107, had been concentrated within the Center East, disproportionately concentrating on public infrastructure and state-level targets. Europe was the goal of twenty-two.8% of the entire international exercise through the time interval. Almost 47.8% of all focused organizations globally belonged to the federal government sector, adopted by finance (11.9%) and telecommunications (6.7%) sectors.

    “The digital entrance is increasing alongside the bodily one within the area, with hacktivist teams concurrently concentrating on extra nations within the Center East than ever earlier than,” Radware stated. “The distribution of assaults throughout the area was closely concentrated in three particular nations: Kuwait, Israel, and Jordan, with Kuwait accounting for 28%, Israel for 27.1%, and Jordan for 21.5% of the entire assault claims.”

    Moreover Keymous+, DieNet, and NoName057(16), a few of the different teams which have engaged in disruptive operations embrace Nation of Saviors (NOS), the Conquerors Digital Military (CEA), Sylhet Gang, 313 Workforce, Handala Hack, APT Iran, the Cyber Islamic Resistance, Darkish Storm Workforce, the FAD Workforce, Evil Markhors, and PalachPro, per knowledge from Flashpoint, Palo Alto Networks Unit 42, and Radware.

    The present scope of cyber assaults is listed under –

    • Professional-Russian hacktivist teams like Cardinal and Russian Legion claimed to have breached Israeli army networks, together with its Iron Dome missile protection system.
    • An energetic SMS phishing marketing campaign has been noticed utilizing a rogue duplicate of the Israeli House Entrance Command RedAlert utility to ship cellular surveillance and data-exfiltrating malware. “By manipulating victims into sideloading this malicious APK underneath the guise of an pressing wartime replace, the adversaries efficiently deploy a completely purposeful alert interface that masks an invasive surveillance engine designed to prey on a hyper-vigilant inhabitants,” CloudSEK stated.
    • Iran’s Islamic Revolutionary Guard Corps (IRGC) focused the power and digital infrastructure sectors within the Center East, hanging Saudi Aramco and an Amazon Internet Companies knowledge middle within the U.A.E. with an intent to “inflict most international financial ache as a counter-pressure to army losses,” Flashpoint stated.
    • Cotton Sandstorm (aka Haywire Kitten) revived its outdated cyber persona, Altoufan Workforce, claiming to have hacked web sites in Bahrain. “This displays the reactive nature of the actor’s campaigns and a excessive likelihood of their additional involvement in intrusions throughout the Center East amid the battle,” Verify Level stated.
    • Knowledge gathered by Nozomi Networks exhibits that the Iranian state-sponsored hacking group often known as UNC1549 (aka GalaxyGato, Nimbus Manticore, or Delicate Snail) was the fourth most energetic actor within the second half of 2025, focusing its assaults on protection, aerospace, telecommunications, and regional authorities entities to advance the nation’s geopolitical priorities.
    • Main Iranian cryptocurrency exchanges have remained operational however introduced operational changes, both suspending or batching withdrawals, and issuing danger steering urging customers to arrange for doable connectivity disruption.
    • “What we’re seeing in Iran shouldn’t be clear proof of mass capital flight, however fairly a market managing volatility underneath constrained connectivity and regulatory intervention,” stated Ari Redbord, International Head of Coverage at TRM Labs. “For years, Iran has operated a shadow financial system that, partially, has used crypto to evade sanctions, together with by subtle offshore infrastructure. What we’re seeing now – underneath the pressure of warfare, connectivity shutdowns, and risky markets – is a real-time stress check of that infrastructure and the regime’s means to leverage it.”
    • Sophos stated it “noticed a surge in hacktivist exercise, however not an escalation in danger,” primarily from pro-Iran personas, together with Handala Hack staff and APT Iran within the type of DDoS assaults, web site defacements, and unverified claims of compromises involving Israeli infrastructure.
    • The U.Okay. Nationwide Cyber Safety Centre (NCSC) alerted organizations to a heightened danger of Iranian cyber assaults, urging them to strengthen their cybersecurity posture to higher reply to DDoS assaults, phishing exercise, and ICS Focusing on.

    In a publish shared on LinkedIn, Cynthia Kaiser, ransomware analysis middle SVP at Halcyon and former Deputy Assistant Director with the Federal Bureau of Investigation’s Cyber Division, stated Iran has a observe file of utilizing cyber operations to retaliate towards “perceived political slights,” including these actions have more and more integrated ransomware. 

    “Tehran has lengthy most popular to show a blind, or no less than detached, eye to non-public cyber operations towards targets within the US, Israel, and different allied international locations,” Kaiser added. “That is as a result of accessing cyber criminals offers the federal government choices. As Iran considers its response to US and Israeli army actions, it’s prone to activate any of those cyber actors if it believes their operations can ship a significant retaliatory affect.”

    Cybersecurity firm SentinelOne has additionally assessed with excessive confidence that organizations in Israel, the U.S., and allied nations are prone to face direct or oblique concentrating on, notably inside authorities, vital infrastructure, protection, monetary providers, educational, and media sectors.

    “Iranian menace actors have traditionally demonstrated a willingness to mix espionage, disruption, and psychological affect operations to advance strategic aims,” Nozomi Networks stated. “In intervals of instability, these operations usually intensify, concentrating on vital infrastructure, power networks, authorities entities, and personal business far past the fast battle zone.”

    To counter the chance posed by the kinetic battle, organizations are suggested to activate steady monitoring to replicate escalated menace exercise, replace menace intelligence signatures, scale back exterior assault floor, conduct complete publicity opinions of linked property, validate correct segmentation between info expertise and operational expertise networks, and guarantee correct isolation of IoT units.

    “In previous conflicts, Tehran’s cyber actors have aligned their exercise with broader strategic aims that improve stress and visibility at targets, together with power, vital infrastructure, finance, telecommunications, and healthcare,” Adam Meyers, head of Counter Adversary Operations at CrowdStrike, stated in a press release shared with The Hacker Information.

    “Iranian adversaries have continued to evolve their tradecraft, increasing past conventional intrusions into cloud and identity-focused operations, which positions them to behave quickly throughout hybrid enterprise environments with elevated scale and affect.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    CISA Warns Qualcomm Chipsets Reminiscence Corruption Vulnerability Is Actively Exploited in Assaults

    March 4, 2026

    Iranian cyberattacks fail to materialize however risk stays acute

    March 4, 2026

    Center East Battle: Iran-US-Israel Cyber-Kinetic Disaster

    March 4, 2026
    Top Posts

    5 Methods to Use Cross-Validation to Enhance Time Sequence Fashions

    March 5, 2026

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    5 Methods to Use Cross-Validation to Enhance Time Sequence Fashions

    By Yasmin BhattiMarch 5, 2026

    On this article, you’ll be taught 5 sensible cross-validation patterns that make time sequence analysis…

    Why the Hybrid SOC Is Your Subsequent Use of AI

    March 5, 2026

    149 Hacktivist DDoS Assaults Hit 110 Organizations in 16 International locations After Center East Battle

    March 5, 2026

    Black Forest Labs' new Self-Circulation approach makes coaching multimodal AI fashions 2.8x extra environment friendly

    March 5, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.