New research shows Iran's expansive cyber offensive during '12-Day War' with Israel
Briefly

Following the outbreak of hostilities between Iran and Israel, Iranian state-backed hackers initiated extensive cyber operations including phishing campaigns and website defacements. Telegram served as a platform for coordination among 178 hacktivist and proxy groups, facilitating the exchange of 250,000 messages. The cyber operations aimed to intimidate civilians, diminish Israeli morale, and propagate Iran's narrative. The Israeli strikes triggered a coordinated response from a hierarchy of Iranian cyber actors, blending singular hacktivism with organized state-sponsored cyber warfare that blurred the lines between volunteerism and state direction.
Iranian state-backed hackers and proxy groups launched phishing campaigns, defaced websites and claimed to have leaked troves of stolen data tied to the conflict.
Telegram served as a central hub for recruitment, propaganda and orchestration of cyberattacks, with 250,000 messages exchanged by 178 Iranian proxy and hacktivist groups.
Iranian operations aimed to intimidate civilians, undermine Israeli morale and amplify Iran's wartime narrative during the conflict.
The conflict began with Israel's preemptive strikes against nuclear targets in Iran, leading to a multi-layered cyber response from Iranian-linked actors.
Read at Nextgov.com
[
|
]