By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Iranian hacktivists muster their forces but state APTs lay low | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Iranian hacktivists muster their forces but state APTs lay low | Computer Weekly
News

Iranian hacktivists muster their forces but state APTs lay low | Computer Weekly

News Room
Last updated: 2026/03/04 at 6:15 PM
News Room Published 4 March 2026
Share
Iranian hacktivists muster their forces but state APTs lay low | Computer Weekly
SHARE

As the spreading war in the Middle East spills into a fifth day, the threat intelligence community has observed signs of an uptick in cyber attack volumes, with pro-Iran hacktivists successfully breaching multiple targets including Saudi energy and hospitality sector infrastructure, while GPS spoofing attacks – in which satellite data is manipulated to send victims off course – have hit over 1,000 ships in the Persian Gulf region.

New data shared by Flashpoint revealed insight into the activities of numerous pro-Iran groups in the past few days. Among some of the operations known to be active right now are Handala Team, a pro-Palestine hacktivist operation with links to the Iranian intelligence services, that has claimed a breach at Saudi Aramco, alleging that its hackers destroyed the victim’s infrastructure and caused it to cease oil extraction – claims that have not yet been verified due to insufficient evidence.

A second group going by the moniker FAD Team (aka Fatimiyoun/Fatimion) – which identifies with the Islamic Resistance in Iraq has claimed responsibility for an as-yet unconfirmed breach at WeLearn – an Israeli scaleup – and Maad Hospitality Towers – a  planned 50,000 plus bed hotel in Makkah, Saudi Arabia, designed to accommodate travelers making the Hajj pilgrimage.

Meanwhile, a group known as PalachPro – claiming to be Russia-based – has signaled its readiness to collaborate with Iranian hackers, amplifying its messages alongside the Russian hacktivist NoName057(16) network.

Other notable claims in recent days – via Palo Alto Networks’ Unit 42 – come from hacktivist groups such as APT Iran, which said it sabotaged critical national infrastructure in Jordan, the Cyber Islamic Resistance umbrella group, incorporating threat actors such as RipperSec and Cyb3rDragonzz, which says it targeted Israeli organisations with synchronised distributed denial of service (DDoS) attacks and data wiping malwares. Other active groups flagged by Unit 42 include Dark Storm Team, Evil Markhors, Sylhet Gang, 313 Team and DieNet – all of these say they have targeted organisations in Bahrain, Israel, Kuwait, Saudi Arabia, and the United Arab Emirates (UAE).

And in a sign that analogue and kinetic methods still have their uses in modern hybrid warfare, Amazon Web Services (AWS) datacentre facilities in the region experienced downtime pulled offline after apparent drone strikes at facilities in Bahrain and the UAE, while Flashpoint also reported the discovery of a new Farsi-language shortwave numbers station on 7910kHz, likely transmitting coded instructions to Iranian sleeper cells.

A Cold War relic, numbers stations were used by both the Eastern and Western blocs to communicate with undercover operatives  – one famous British example known colloquially as the Lincolnshire Poacher broadcast from Bletchley Park.

Kathryn Raines, cyber threat intelligence team lead for the National Security Solutions team at Flashpoint, said the groups making the most noise right now – whether they be truly autonomous hacktivists or those like Handala with possible state links – were designed for immediate psychological impact on Iran’s enemies.

“Looking at their tactics – which have thus far consisted of DDoS, defacements, claiming to deploy wiper malware, or leaking pre-stolen data – they require lower operational security and less stable infrastructure. It is likely in their mandate from the regime to create immediate chaos and project strength, which makes them the ideal first responders in the cyber domain,” Raines told Computer Weekly.

What has become of Iran’s state APTs?

The biggest impacts of hacktivist-led cyber attacks are indeed website defacements and, to some extent, DDoS attacks, both of which are disruptive but rarely many of the currently active groups will be operating on an opportunistic basis and many may not even be based in Iran itself.

Raines said that in contrast to hacktivists, top-tier espionage APTs relied on stealth, persistence, and highly-secure command and control (C2) infrastructure.

“The current kinetic environment and the regime’s domestic internet throttling severely disrupt their ability to operate safely, and rather than risking exposure of say, high-value accesses or zero-day exploits, during a period of extreme network [and] internet instability, these elite cyber units are forced into a defensive posture – likely much more focused internally on network hardening, assessing damage, and regime continuity,” she explained.

Alex Orleans, head of threat intelligence at Sublime Security, said that for Iranian APTs operating with a nexus to the state, the priority right now was more likely survival than attack.

However, he also noted as-yet unconfirmed reports the extent of leadership decapitation has been so great that the Iranian chain of command is known to be telling parts of its security establishment to operate on their own initiative.

“If true, that would be especially relevant to cyber because it is a non-critical function for national defense and virtually all of Iran’s cyber operations fall under MOIS or IRGC; and both of those organisations have suffered heavy losses,” Orleans said.

Gene Moody, field chief technology officer (CTO) at Action1, said that while activity so far has indeed been opportunistic, state-aligned groups do move quickly when tensions rise

“In practice, that means scanning the internet at scale for exposed services and weaponising recently disclosed vulnerabilities within days, sometimes hours. They often rely on known flaws in VPNs, edge devices, firewalls, email gateways, and remote access platforms rather than novel zero-days,” said Moody.

“For security teams, the operational impact is increased background noise, more aggressive scanning, and a higher probability of exploitation attempts against perimeter systems. Expect phishing tied to geopolitical themes, credential harvesting, and possible disruptive actions such as data theft, ransomware, or destructive wiper activity if escalation occurs.”

Indeed, experts at Nozomi Networks say they see some early signs of activity from APTs such as MuddyWater, OilRig and APT33, which seem to have the manufacturing and transport sectors in their crosshairs.

“The current [MITRE ATT&CK] detection pattern strongly suggests that adversaries are still in the exploratory and positioning phase of their operations. The dominance of default credential abuse and valid account usage, combined with brute force and scanning, indicates that attackers are leveraging trusted access to quietly map environments to identify high-value assets and establish persistence,” wrote the Nozomi team.

“This is characteristic of early-stage intrusion activity, where the objective is to understand network architecture, privilege relationships and operational dependencies before escalating to disruptive or destructive tactics.”

In short order, the researchers said, these playbooks will expand to privilege escalation, lateral movement in operational technology environments, and possibly the deployment of data wipers. APT33 is particularly adept in this regard, reportedly having had pre-positioned access inside US energy networks. The UK is no bystander either, said Nozomi, and CNI operators should take note.

Orleans at Sublime Security agreed that although Iranian APTs will be “laying low” for the foreseeable, that will probably change.

“[It is] likely … that in a few days, some of these actors will peek out and see what preexisting accesses they were able to maintain to targets they had compromised before this began,” he said. “Then they will likely spam some janky attempts at disruption effects.”

Flashpoint’s Raines also foresaw a resurgence of APT activity once the fog of war lifts a little, Tehran feels a little more secure, and civilian internet traffic returns to mask their movements.

“When these groups return to the offensive, we suspect they’ll likely transition from the current noisy phase to highly targeted, quiet espionage and destructive attacks, potentially weaponising the accesses and targets currently being gathered by the hacktivist tier,” she said.

Use this time well

In the meantime, Sublime’s Orleans said that defenders could use the coming hours and days to their advantage.

“Focus less on worrying about a new Iranian campaign to phish you this week and more on using this opportunity to threat hunt in your environment for possible signs of compromise by Iranian actors that predate this conflict – likely in the last 90-120 days,” he said. “Do what’s necessary to contain and evict any hostile presence on those networks.”

Action1’s Moody said that prep work should focus on speed and hygiene. “Patch all externally exposed systems immediately after disclosure, even if that means temporarily bypassing normal patch cycles. Under these conditions, delay equals exposure. Prioritise internet facing assets, identity infrastructure, and remote access systems. Validate backups, test restoration, and confirm MFA enforcement across privileged accounts. Increase logging retention, tune detection for mass scanning and brute force activity, and rehearse incident response playbooks. In short, reduce attack surface quickly and assume known vulnerabilities will be targeted first.

“Be prepared as this will be a true cyber offensive versus targeted operations for financial gain or political messaging, there will be damage here,” he said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Can Palantir (PLTR) Justify a Premium Price: 5 Key Questions Answered Can Palantir (PLTR) Justify a Premium Price: 5 Key Questions Answered
Next Article Do You Need AppleCare+? Here’s What Apple’s Extended Warranty Really Covers Do You Need AppleCare+? Here’s What Apple’s Extended Warranty Really Covers
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Google talks Aluminium OS: Release plans, continuity, AI, and what happens to Chrome OS
Google talks Aluminium OS: Release plans, continuity, AI, and what happens to Chrome OS
Gadget
Pepe Coin Price Prediction: Does PEPE Have 100x Potential or Could Pepeto Offer Greater Returns With Three Real Products
Pepe Coin Price Prediction: Does PEPE Have 100x Potential or Could Pepeto Offer Greater Returns With Three Real Products
Gadget
ExpressVPN Launches Tool to Block Child Sexual Abuse Material
ExpressVPN Launches Tool to Block Child Sexual Abuse Material
News
AI is driving new content strategies and powering localization, but cultural understanding still depends on humans · TechNode
AI is driving new content strategies and powering localization, but cultural understanding still depends on humans · TechNode
Computing

You Might also Like

ExpressVPN Launches Tool to Block Child Sexual Abuse Material
News

ExpressVPN Launches Tool to Block Child Sexual Abuse Material

3 Min Read
Industry group representing Apple voices concern to Pentagon over Anthropic ban – 9to5Mac
News

Industry group representing Apple voices concern to Pentagon over Anthropic ban – 9to5Mac

4 Min Read
NASA Targets April 1 for Delayed Artemis II Lunar Flyby
News

NASA Targets April 1 for Delayed Artemis II Lunar Flyby

6 Min Read
How to preorder the Apple iPhone 17e: Price, specs, release date
News

How to preorder the Apple iPhone 17e: Price, specs, release date

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?