Within hours of June’s 12-day war between Iran and Israel erupting, Iranian state-backed hackers and proxy groups launched phishing campaigns, defaced websites and claimed to have leaked troves of stolen data tied to the conflict, according to new threat intelligence released Tuesday.
Telegram also served as a central hub for recruitment, propaganda and orchestration of cyberattacks, according to some 250,000 messages exchanged by 178 Iranian proxy and hacktivist groups throughout the war that were analyzed by SecurityScorecard’s STRIKE threat intelligence team.
The analysis, one of the first comprehensive overviews of the cyberwarfare aspects of the nearly two-week-long conflict, found that Iranian operations were launched in an effort to intimidate civilians, undermine Israeli morale and amplify Iran’s wartime narrative.
New research shows Iran’s expansive cyber offensive during ‘12-Day War’ with Israel – Nextgov/FCW