<p>The joint U.S.-Israeli strikes this week against Iran have resulted in retaliatory actions across the Gulf region that range from military to cyber.</p>
<p>Pro-Iran groups have launched cyberattacks, lashing out against Israel, America and their allies in a demonstration of how cyber and physical warfare intersect. These responses have been described as a form of <a href=”https://www.techtarget.com/searchsecurity/definition/hacktivism”>hacktivism</a> — politically motivated attacks intended to advance ideological or geopolitical reasons rather generate financial gain.</p>
<p>Sophos’ Counter Threat Unit Research Team <a target=”_blank” href=”https://www.sophos.com/en-us/blog/hacktivist-campaigns-increase-as-united-states-iran-and-israel-conflict-intensifies” rel=”noopener”>said</a> on Tuesday it has seen a surge in pro-Iran hacktivist activity since the military actions began with the Feb. 28 bombings in Tehran, with several hacktivist groups sharing misinformation and inciting violence. “Iranian groups routinely target publicly disclosed vulnerabilities rather than exploiting zero-days, so organizations should prioritize patching vulnerabilities listed in CISA’s <a target=”_blank” href=”https://www.cisa.gov/known-exploited-vulnerabilities-catalog” rel=”noopener”>Known Exploited Vulnerabilities Catalog</a>,” the researchers wrote.</p>
<p>Companies, especially those in utilities, should be extra vigilant, the Foundation for Defense of Democracies advised. “Iranian hackers have in the past successfully compromised critical components of essential services because utilities misconfigured systems, did not change default passwords or failed to install software patches to fix known vulnerabilities,” the nonpartisan research organization <a target=”_blank” href=”https://www.fdd.org/analysis/2026/03/04/irans-pro-regime-hackers-cannot-back-up-their-claims-of-successful-cyber-attacks/” rel=”noopener”>wrote</a> in brief published Wednesday.</p>
<p>This week’s features news demonstrates that <a href=”https://www.techtarget.com/searchsecurity/tip/10-cybersecurity-best-practices-and-tips-for-businesses”>best practices in cybersecurity</a> matter even more in moments of geopolitical danger.</p>
<section class=”section main-article-chapter” data-menu-title=”Pro-Iran cyberattacks target energy and defense companies”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Pro-Iran cyberattacks target energy and defense companies</h2>
<p>The US-Israeli military strikes on Iran have triggered a wave of retaliatory cyberattacks from Iran-linked groups. These attacks include DDoS hits, critical infrastructure breaches and data exfiltration campaigns targeting the U.S., Israel and their allies. Groups tied to Iran’s Islamic Revolutionary Guard Corps and Ministry of Intelligence and Security, along with sympathetic hacktivists, have launched operations under campaigns described as <i>#OpIsrael</i>.</p>
<p>Key targets include Saudi Arabia’s Aramco facility, an AWS data center in the United Arab Emirates, and Israeli defense and energy systems. Hacker groups such as Cotton Sandstorm and the FAD Team have executed SQL injection campaigns, leaked sensitive data and disrupted critical services in Bahrain, Saudi Arabia and Qatar. Pro-Iranian and pro-Russian groups, including the Cyber Islamic Resistance and NoName057(16), have also joined the fray, targeting Israeli infrastructure and defense systems.</p>
<p>Researchers warn of intensified cyberthreats aimed at causing global economic disruption and infrastructure damage. To mitigate risks from this escalating conflict, experts encourage cybersecurity teams to <a href=”https://www.techtarget.com/searchsecurity/tip/Multifactor-authentication-Examples-and-strategic-use-cases”>implement MFA</a> and enhance monitoring.</p>
<p><a target=”_blank” href=”https://www.darkreading.com/threat-intelligence/war-pro-iranian-actors-cyberattacks” rel=”noopener”><i>Read the full article by Elizabeth Montalbano on Dark Reading</i></a>.</p>
</section>
<section class=”section main-article-chapter” data-menu-title=”Hackers sympathetic to Iran exploit IP camera vulnerabilities”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Hackers sympathetic to Iran exploit IP camera vulnerabilities</h2>
<p>Iran-linked hackers have intensified attacks on surveillance cameras, targeting critical vulnerabilities in Hikvision and Dahua products, according to Check Point Research. Exploited flaws include a command injection vulnerability (CVE-2023-6895), a remote-command execution vulnerability (CVE-2025-34067) and an authentication bypass flaw (CVE-2021-33044).</p>
<p>The attacks, focused o
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: