Emerging Cyber Alliance of Pro-Russia and Iran-Linked Groups
Pro-Russia threat entities have orchestrated a disparate coalition alongside Iranian-affiliated hacking collectives in reaction to the recent aerial assaults executed by the United States and Israel on Iran.
The alliance initiated collaborative efforts on Monday under the moniker #OpIsrael, focusing on the disruption of critical infrastructure and the exfiltration of sensitive data, according to insights provided by researchers at Flashpoint.
A faction dubbed the Cyber Islamic Resistance, collaborating with NoName057(16), has launched assaults targeting an Israeli defense contractor as well as multiple municipal governments, executing large-scale distributed denial of service (DDoS) attacks, Flashpoint reports.
Additionally, the Cyber Islamic Resistance has taken responsibility for breaching an Israeli health insurance provider, substantiating its claim by leaking CCTV footage, as indicated by researchers.
Another group, known as FAD Team, has asserted its involvement in an SQL injection attack, resulting in unauthorized data leaks from various organizations, including a small town in Pennsylvania and educational institutions across France, Vietnam, and India, alongside a virtual U.S. Air Force entity, according to Flashpoint experts.
Researchers from Palo Alto Networks Unit 42 estimate that approximately 60 threat actors, encompassing both Iranian and Russian-aligned factions, may be engaged in a spectrum of hacking activities in the wake of the bombing campaign.
Unit 42 has indicated that Handala Hack, a group affiliated with Iran’s Ministry of Intelligence and Security, has taken credit for successfully infiltrating an Israeli energy firm and several gas stations in Jordan.
Cautionary notes from researchers highlight that the operational capacity of state-linked activists appears considerably curtailed, chiefly due to a substantial decrease in internet connectivity throughout Iran, which has plummeted to below 4% of its usual capacity.
Consequently, many cyber incursions associated with state actors exhibit opportunistic tendencies and diverge from established behavioral patterns, as outlined by Unit 42 researchers.
Gil Messing, chief of staff at Check Point Software Technologies, an Israel-based cybersecurity firm, remarked, “The technical impact remains rather limited for now, yet the trend is unmistakably escalating, with attack volumes surging above standard baselines and global recruitment efforts for hackers intensifying to bolster operations.”
U.S. officials have informed Cybersecurity Dive that they remain vigilant about potential threats, both physical and cyber, directed toward the homeland.
Security leaders across critical U.S. sectors are likewise on high alert regarding the evolving threat landscape.
“Health-ISAC is acutely focused on the ongoing U.S.-Iran tensions and the prospective cyber ramifications for healthcare and public health,” stated Errol Weiss, chief security officer at Health-ISAC.
“While we are actively monitoring developments, we have yet to receive any specific or credible sector-wide cyber threat alerts linked to this recent situation.”
Analysts associated with the Foundation for Defense of Democracies, a Washington-based think tank that specializes in national security, concur that Iranian-backed hackers currently face significant challenges in formulating a substantial retaliatory response to the bombing campaign.
However, they emphasize that critical infrastructure within the U.S. remains vulnerable, given the historical potency of Iran-linked groups and the constrained capacities of numerous U.S. organizations to fortify their cybersecurity defenses.

“As many essential sectors’ infrastructures are owned and operated by smaller companies with limited cybersecurity resources and tools, Iran might achieve limited yet highly noticeable successes in the near future against these operators.
This is reminiscent of the incidents in the fall of 2023 involving small U.S. water systems,” remarked Annie Fixler, director of the Center on Cyber and Technology Innovation at the Foundation for Defense of Democracies.
Source link: Cybersecuritydive.com.






