Military Space News, Nuclear Weapons, Missile Defense
Iran hacking capability still a threat despite war damage: experts
Paris, France, March 6 (AFP) Mar 06, 2026
Highly capable Iran-linked hacking groups have widened their activities across the region since the US and Israel attacked last weekend, experts argue, although disruption from the war may limit their effectiveness.

Spectacular coups against well-protected systems are unlikely, as cyberattackers prefer to target weaker links in the chain or dupe human users into granting them access to important data and networks.

Since the outbreak of war, suspected Iranian cyberattacks flagged by cyberintelligence company Unit 42 and Israeli cybersecurity firm Check Point include an alleged mass "phishing" attempt against Israelis.

Attackers allegedly saw opportunity in bugs with Israel's widely used Home Front Command application, which provides emergency alerts and information.

The hackers sent mass texts to users urging them to download an update.

"It was the kind of text that perfectly makes sense" but linked to "an app that imitated the Home Front Command," Check Point chief of staff Gil Messing told AFP.

"Actually, it was a malware that enables you to get a lot of information out of the device".

Messing added that a similar attack had previously targeted people expecting a package from the post office.

Check Point also alleged it saw suspected Iranian attackers accessing widely used connected surveillance cameras, which are often unsecured.

Beyond top target Israel, infiltrated cameras were found in Qatar, Bahrain, Kuwait, the United Arab Emirates, and Cyprus -- all countries targeted by Iranian drones and missiles.

Imagery was likely being used for battle damage assessment (BDA) after such kinetic attacks, Messing said, or "beforehand to collect the intelligence you need about... (targets') routines or where to strike".

Compromised cameras in Tehran were similarly used by Israel in planning the strike that killed Iran's supreme leader Ayatollah Ali Khamenei, the Financial Times and other media reported earlier this week.


- Disruptive strikes -


"Iran, I would say, is in the top five or seven cyber nations in the world when it comes to offence" alongside Russia, China and North Korea, Messing said.

Hackers are "a part of their army... very much government owned or backed" by the Islamic Revolutionary Guard Corps (IRGC) or the Ministry of Intelligence and Security, he alleged.

He identified several main avenues of Iranian cyberactivity: "classic" cyberattacks to extract information and show off capabilities, disinformation campaigns on social media, recruitment of arm's length agents in target nations for pay or via blackmail, and harassing Iranians in exile.

With drones and missiles in the air, "we must be careful not to overplay the role of cyber... It is easier to bomb a TV tower than conduct a cyberattack on a TV station," said James Sullivan, cyber and tech chief at London defence think-tank RUSI.

US and Israeli strikes have also inflicted "loss of connectivity and significant degradation of Iranian leadership and command structures" that will hamper its hackers, Unit 42 wrote in a report.

US cybersecurity firm Crowdstrike had seen "muted IRGC-linked retaliatory cyberattacks" since the outbreak of war, its intelligence chief Adam Meyers said.

Hinting at the extent of disruption to internet connectivity, Check Point said this week it had spotted cyberattackers using methods typical of Iranian groups operating via Starlink satellite connections.

Tehran had attempted weeks earlier to jam the Elon Musk-owned network to keep demonstrators from using it.


- 'Destructive operations' -


Crowdstrike said that it had seen "a surge in claimed activity from Iran-aligned and sympathetic hacktivist groups" since the outbreak of war.

The groups were claiming responsibility for acts like distributed denial of service (DDoS) attacks, in which a target server is inundated with requests for information.

Such attacks are a relative constant of life online and do not require sophisticated capabilities.

And the claims, often made via social media or defaced websites, are difficult to verify.

Suspected Iran-linked groups tracked by Unit 42 claimed attacks on targets in healthcare, banking, oil infrastructure and an airport in countries including Jordan, Saudi Arabia, the UAE and Kuwait this week.

And a Russian group known as Z-Pentest claimed it had gained access to factory automation systems and CCTV networks in the United States, Crowdstrike added.

"Western organisations should remain on high alert... Activity may move beyond hacktivism and into destructive operations," Crowdstrike's Meyers said.

tgb/jj

CHECK POINT SOFTWARE TECHNOLOGIES


ADVERTISEMENT




 WAR.WIRE

SINO.WIRE

NUKE.WIRE
Military Space News, Nuclear Weapons, Missile Defense
Sidekick autonomy software guides YFQ-42A test mission for CCA program
Infleqtion lists shares on NYSE as neutral atom quantum firm
Top Chinese gaming companies continue to challenge
Space Tourism, Space Transport and Space Exploration News
Japan startup's space rocket fails for third time
NASA Stennis proves water systems ready for Artemis IV upper stage trials
Sateliot books Spanish Miura 5 launch for two next gen Trito satellites in 2027
24/7 News Coverage
Curiosity Blog, Sols 4798-4803: Back for More Science
UAE extends Mars probe mission until 2028
Mars relay orbiter seen as backbone for future exploration
24/7 Coverage of GPS News
Vantor adds Google Earth AI models to Tensorglobe for secure mission support
ASII launches national geospatial digital twin for Australian agriculture
China rolls out BeiDou satellite messaging for emergency use
Space Business News
Turkey says missile launched from Iran destroyed by NATO
Japan startup's space rocket fails for third time
EU's Kallas warns anti-drone stock 'limited' as Mideast, Ukraine wars rage
24/7 News Coverage
Einstein probe catch may show black hole shredding white dwarf
Cheops spots inside out exoplanet quartet
Swift observatory changes operations ahead of planned orbit reboost
24/7 Coverage of GPS News
NASA announces overhaul of Artemis lunar program amid technical delays
Chang'e-6 farside samples reshape lunar impact history
New Wenchang lunar pad completes first Long March 10 test
Robot News from RoboDaily.com
Apparent AI use in Iran war raises daunting questions: expert
Carbon fibers bend and straighten under electric control
Autonomous TerraScout robot delivers real-time field prescriptions
Radar News from RadarDaily.com
Satellite radar maps reveal rapid delta land loss
Valen array advances multi-mission sensing tech
Airbus taps Synspective SAR radar network for expanded Earth imaging
Indo Daily
Southern Indian Ocean waters lose salt as climate shifts currents
India's tougher AI social media rules spark censorship fears
Brazil eyes fossil fuel roadmap 'that unites'
Russo Daily
EU's Kallas warns anti-drone stock 'limited' as Mideast, Ukraine wars rage
NATO trains storming Baltic beach to deter Russia
Madagascar's new leader in Moscow for talks with Putin
24/7 News Coverage
China boosts military spending with eyes on US, Taiwan
Taiwan opposition backs over $11bn for US arms, but no 'blank cheque'
Philippines detains three defence personnel on China spying allegations

All rights reserved. Copyright Agence France-Presse. Sections of the information displayed on this page (dispatches, photographs, logos) are protected by intellectual property rights owned by Agence France-Presse. As a consequence, you may not copy, reproduce, modify, transmit, publish, display or in any way commercially exploit any of the content of this section without the prior written consent of Agence France-Presse.