Skip to main content
Mallory
Mallory

Iran–Israel–US conflict triggers rapid hacktivist mobilization and elevated DDoS risk to government and critical infrastructure

hacktivismddosisraelcritical infrastructureirandisruptiontelegramgeopoliticsms-isacics
Updated March 13, 2026 at 10:00 PM7 sources
Iran–Israel–US conflict triggers rapid hacktivist mobilization and elevated DDoS risk to government and critical infrastructure

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Cyber activity surged immediately following joint U.S.–Israel strikes on Iran (described as Operation Epic Fury), with reporting indicating a fast-moving “cyber swarm” of hacktivists and aligned collectives conducting disruption, influence messaging, and broad cyber claim activity within hours of the kinetic events. A day-by-day Telegram-focused timeline described early DDoS campaigns against Israeli government sites expanding into a wider coalition of pro-Iranian, pro-Palestinian, and Russian-aligned groups targeting additional regions and sectors, including Gulf states, Europe, and the U.S., with increasing attention on critical infrastructure; examples cited include claims of DDoS disruption against Israeli commercial, defense-adjacent, and energy-related entities (e.g., an oil company and an advanced defense firm), sometimes accompanied by third-party availability “verification” links.

U.S. state and local governments were separately warned by MS-ISAC to expect heightened “low-level” activity—particularly DDoS—in the wake of the Iran-related escalation, and were urged to harden internet-facing and cloud services (e.g., remediation of critical/cloud infrastructure, use of firewalls/CDNs, and reducing exposed employee/organizational data). In parallel, a critical-infrastructure-focused interview tied to an upcoming OT security summit reiterated that energy, water, pipeline, and ICS environments face persistent probing by state adversaries and that “low-cost entry” cyber operations can be used to test and disrupt mission-critical systems; while not specific to the Iran conflict, it reinforces the broader risk context for OT operators amid heightened geopolitical tensions.

Sources

March 13, 2026 at 12:00 AM
March 13, 2026 at 12:00 AM
March 12, 2026 at 12:00 AM

2 more from sources like scworld and osint team blog

Related Stories

Cyber Operations Escalate Following US-Israeli Strikes on Iran

Cyber Operations Escalate Following US-Israeli Strikes on Iran

Military strikes by the United States and Israel against Iranian targets on **February 28, 2026** were followed within hours by a sharp escalation in cyber activity across the Middle East. Reporting describes widespread **DDoS attacks, website compromises, defacements, and breach claims**, with more than 150 hacktivist incidents reportedly claimed in the first two days of the crisis. Iranian connectivity was heavily disrupted, including outages affecting **IRNA**, while **Tasnim News** was reportedly compromised and displayed anti-regime messaging. The most affected sectors were identified as **government, aerospace and defense, and technology**, and regional states including **Israel, Kuwait, Jordan, Bahrain, Qatar, and the UAE** saw elevated cyber pressure. The surge also expanded beyond immediate regional targets, with security reporting warning that the conflict was driving attacks against global commercial sectors such as **travel, hospitality, and energy**. One cited example was a **March 11** claim by **Handala**, a hacktivist group alleged to have ties to Iranian intelligence, that it had conducted a large-scale **data-wiping attack** against medical technology company **Stryker**, allegedly destroying several terabytes of data. Additional reporting noted unconfirmed concerns that Iranian-linked actors could target the physical and digital infrastructure of major U.S. technology firms. The activity reflects a broader pattern of **geopolitically motivated cyber operations** acting as a force multiplier alongside kinetic conflict, rather than a standalone marketing or advisory narrative.

3 days ago
DDoS and Cyber Operations Escalate Amid Israel–U.S. Strikes on Iran

DDoS and Cyber Operations Escalate Amid Israel–U.S. Strikes on Iran

Threat monitoring and situation reporting tied a surge in **distributed denial-of-service (DDoS)** activity and broader cyber disruption to the escalation of the **Israel–U.S. conflict with Iran** in late February 2026. NSFOCUS reported sustained DDoS targeting of Iranian IP space following internal unrest and rising U.S.–Iran nuclear tensions, describing both botnet-driven floods and reflection/amplification techniques against **259 Iranian IPs**, including government, news, and network-infrastructure entities. As kinetic events intensified—particularly after Israel announced strikes on Iran—reporting described a sharp increase in DDoS activity and subsequent Iranian **network control measures**, including an internet shutdown intended to reduce exposure to anticipated cyberattacks. CloudSEK characterized the period as a shift into **hybrid conflict**, citing coordinated Israeli–U.S. strikes (described as *Operation Roaring Lion/Epic Fury*) alongside what it called a major cyber campaign contributing to a near-total Iranian internet blackout and disruption to government services, media, and parts of energy and aviation. In parallel, Russia’s internet regulator **Roskomnadzor** and the **Russian Defense Ministry** reported a separate “complex multi-vector” DDoS incident that briefly disrupted access to multiple Russian government websites and related infrastructure (including the **Main Radio Frequency Center**), with traffic attributed to servers/botnets across several countries; no actor claimed responsibility. While DDoS is a common tactic in geopolitical crises, the Russian incident appears operationally and geographically distinct from the Iran-focused escalation reporting.

1 weeks ago
Heightened Cyber Risk to US Financial Services and Critical Infrastructure Amid Iran-US Conflict

Heightened Cyber Risk to US Financial Services and Critical Infrastructure Amid Iran-US Conflict

US financial services and critical infrastructure operators have moved to heightened vigilance amid escalating **Iran–US conflict**, with industry groups and analysts warning that geopolitical shocks often correlate with increased cyber activity. Reuters reporting cited by *teiss* says US intelligence assesses **Iran-aligned hacktivists** could conduct **low-level attacks** against US networks—particularly **DDoS**—and that banks are increasing monitoring and resilience measures given the sector’s role in payments, clearing/settlement, and market infrastructure. Separate threat research argues the conflict environment increases the likelihood of **ICS/OT-focused** activity, emphasizing that US critical infrastructure presents an attractive retaliation surface due to civilian impact and a large internet-exposed OT footprint. CloudSEK highlights rapid activation of numerous hacktivist groups after late-February 2026 strikes and points to prior public reporting on long-dwell intrusions and campaigns affecting ICS devices; a SecuritySenses episode similarly describes state-linked hacktivist activity targeting OT (including **Unitronics PLCs**) and broader spillover effects beyond the region. Other items in the set—an ISC/SANS guest diary on opportunistic scanning and a Dark Reading piece on higher attack volumes in Latin America—do not describe the Iran-related escalation and are not directly part of this specific event narrative.

1 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.