By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games
Computing

Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games

News Room
Last updated: 2025/06/25 at 7:32 AM
News Room Published 25 June 2025
Share
SHARE

Thousands of personal records allegedly linked to athletes and visitors of the Saudi Games have been published online by a pro-Iranian hacktivist group called Cyber Fattah.

Cybersecurity company Resecurity said the breach was announced on Telegram on June 22, 2025, in the form of SQL database dumps, characterizing it as an information operation “carried out by Iran and its proxies.”

“The actors gained unauthorized access to phpMyAdmin (backend) and exfiltrated stored records,” Resecurity said. “This is an example of Iran using data breaches as part of a larger anti-U.S., anti-Israel, and anti-Saudi propaganda activity in cyberspace, targeting major sports and social events.”

It’s believed that the data is likely pulled from the Saudi Games 2024 official website and then shared on DarkForums, a cybercrime forum that has gained attention in the wake of BreachForums’ repeated takedowns. The information was published by a forum user named ZeroDayX, a burner profile that was likely created to promote this breach.

The leaked data includes IT staff credentials; government official email addresses; athletes’ and visitors’ information; passports and ID cards; bank statements; medical forms; and scanned copies of sensitive documents.

“The activities of Cyber Fattah align with a broader trend of hacktivism in the Middle East, where groups frequently engage in cyber warfare as a form of activism,” Resecurity said.

Cybersecurity

The leak unfolds against the backdrop of simmering tensions between Iran and Israel, with as many as 119 hacktivist groups claiming to have conducted cyber attacks or have made declarations to align with or act against the two nations, per Cyberknow.

Cyber Fattah, which calls itself an “Iranian cyber team,” has a history of targeting Israeli and Western web resources and government agencies.

It’s also known to collaborate with other threat actors active in the region, such as 313 Team, which claimed responsibility for a distributed denial-of-service (DDoS) attack against social media platform Truth Social in retaliation for U.S. airstrikes on Iran’s nuclear facilities.

“This incident by Cyber Fattah may indicate an interesting shift from Israel-centric malicious activity toward a broader focus on anti-U.S. and anti-Saudi messaging,” Resecurity said.

Last week, a pro-Israel group known as Predatory Sparrow (aka Adalat Ali, Gonjeshke Darande, Indra, or MeteorExpress) claimed to have leaked data obtained from the Iranian Ministry of Communications. Notably, it also hacked Iran’s largest cryptocurrency exchange, Nobitex, and burned over $90 million in cryptocurrency by sending digital assets to invalid wallets.

Cybersecurity company Outpost24 said the attackers possibly had “access to internal documentation that detailed the inner workings of the exchange and possibly even authentication credentials” to pull off the heist, or that it was a case of a rogue insider who worked with the group.

“This was not a financially motivated heist but a strategic, ideological, and psychological operation,” security researcher Lidia López Sanz said. “By destroying rather than exfiltrating funds, the threat actor emphasized its goals: dismantling public trust in regime-linked institutions and signaling its technical superiority.”

Subsequently, on June 18, Iran’s state broadcaster IRIB’s (short for Islamic Republic of Iran Broadcasting) television stream was hijacked to display pro-Israeli and anti-Iranian government imagery. IRIB claimed Israel was behind the incident.

Image Source: Cyberknow

Israel, for its part, has also become a target of pro-Palestine hacking groups like the Handala team, which has listed several Israeli organizations on its data leak site starting June 14, 2025. These included Delek Group, Y.G. New Idan, and AeroDreams.

Another trend observed in the cyber warfare between Iran and Israel is the coming together of smaller hacktivist groups to form umbrella entities like the Cyber Islamic Resistance or United Cyber Front for Palestine and Iran.

Cybersecurity

“These loosely affiliated ‘cyber unions’ share resources and synchronize campaigns, amplifying their impact despite limited technical sophistication,” Trustwave SpiderLabs said in a report published last week.

The company also singled out another pro-Iranian group named DieNet that, despite its pro-Iranian and pro-Hamas stance, is believed to include Russian-speaking members and connections to other cyber communities in Eastern Europe.

“What distinguishes DieNet from many other pro-Iranian actors is its hybrid identity,” it noted. “Linguistic analysis of DieNet’s messages, as well as timestamps, metadata, and interaction pattern, suggests that at least part of the group communicates internally in Russian or uses Slavic-language resources.”

“This points to the broader phenomenon of cross-regional cyber collaboration, where ideological alignment overrides geographic or national boundaries.”

Group-IB, in an analysis of Telegram-based hacktivist activity following June 13, said DieNet was the most referenced channel, quoted 79 times during the time period. In all, more than 5,800 messages have been recorded across various hacktivist channels between June 13 and 20.

The deployment of cyber capabilities in the context of the Iran-Israel war, as well as other recent geopolitical events surrounding Hamas–Israel and Russia-Ukraine conflicts, demonstrates how digital operations are increasingly being integrated to supplement kinetic actions, influence public perception, and disrupt critical infrastructure, Trustwave added.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Is the OnePlus Nord 5 about to raise the bar for budget phone photography? | Stuff
Next Article Amazon Prime reveals new annual perk for millions – but it only lasts 96 hours
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The Best Language Learning Apps for 2025
News
CATL looks to grow emerging business with skateboard chassis · TechNode
Computing
A European Startup’s Spacecraft Made It to Orbit. Now It’s Lost at Sea
Gadget
Early Prime Day soundbar deals you can shop right now
News

You Might also Like

Computing

CATL looks to grow emerging business with skateboard chassis · TechNode

5 Min Read
Computing

HackerNoon and the Sia Foundation Partner to Decentralize Tech Publishing | HackerNoon

5 Min Read
Computing

Price war intensifies Amazon targets Chinese sellers TechNode

5 Min Read
Computing

Using OpenTelemetry to Diagnose a Critical Memory Leak | HackerNoon

21 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?