A fresh bout of online actions emerged overnight Friday into Saturday, running parallel to air assaults carried out jointly by U.S. and Israeli forces against sites inside Iran, security researchers noted. The timing suggests the virtual maneuvers were linked to real-world strikes – possibly aiming to scramble communication lines, shape information flow, or hinder organized reactions on the ground.
Someone poking around online security thinks the app got picked on purpose – lots of people who back the government use it to look up faith stuff. According to Hamid Kashifi, who started a tech outfit called DarkCell, that crowd turned the platform into a useful path for hackers aiming to push content within national borders.
Some reports noted cyber actions focused on various Iranian state functions, administrative bodies, along with possible facilities tied to defense.
Possibly just the start, this online behavior could signal deeper conflicts ahead. With hostilities growing, factions linked to Iran might strike back through digital means, according to Rafe Pilling. He leads threat analysis work at Sophos. Targets may include U.S. or Israeli defense systems, businesses, even everyday infrastructure.
What researchers have seen lately involves reviving past data leaks, while also trying simpler ways to target online industrial controls. Early moves like these could serve as probes – checking weak spots or collecting details ahead of bigger actions, according to experts.
Now working at the cybersecurity firm Halcyon, Cynthia Kaiser – once a top cyber official at the Federal Bureau of Investigation – observed a clear rise in digital operations throughout the Middle East. Calls urging more aggressive moves have already emerged from online actors aligned with Iran, she pointed out.
Though tensions rise, some experts point to how warfare now blends physical strikes with online attacks – raising fears of broader digital clashes.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article:
