NewsTech

Iranian Hackers Ramp Up Cyber Strikes on US and Israel Systems

By Arthur Kay
Security Correspondent

Tensions in the Middle East have spilled into the digital realm as Iranian hacking groups unleash a new wave of cyberattacks against Israel and the United States. Following recent physical missile strikes, security experts warn that state sponsored actors are shifting tactics from espionage to destructive digital strikes. This surge puts critical infrastructure and government agencies on high alert for potential disruptions.

Digital Probing Precedes Major Attacks

Cyber warfare often begins in silence long before any alarms go off. Security researchers have observed a sharp increase in advanced probing activities originating from Iran. These digital scans are testing the locks on mobile apps and government communication channels.

A recent analysis by mobile security firm Approov indicates that hackers began targeting Application Programming Interfaces, or APIs, earlier this month. APIs act as bridges between different software programs. If a hacker compromises an API, they can access sensitive data flowing between mobile apps and servers.

 cyber warfare digital map middle east connections

cyber warfare digital map middle east connections

“Iranian groups seemed to be placing malware on systems before open military action began,” said JP Castellanos, the threat intelligence director at Binary Defense.

This tactic is known as pre-positioning. Attackers quietly install tools inside a network and wait. They do not attack immediately. Instead, they maintain access so they can launch disruptive strikes the moment a conflict escalates.

Cotton Sandstorm and Deceptive Tactics

One specific group has drawn significant attention from intelligence analysts during this conflict. Known as Cotton Sandstorm, or sometimes Haywire Kitten, this hacking team has deep ties to Iran’s Islamic Revolutionary Guard Corps.

Their methods are deceptive and highly technical. Researchers at Check Point have tracked the group using a specific tool called WezRat. This software functions as a digital spy. It steals files and records keystrokes without the user knowing.

Common Tactics Used by Cotton Sandstorm:

  • Spearphishing: Sending emails that look like urgent software updates to trick employees.
  • Fake Ransomware: Encrypting data to look like a criminal financial demand when the goal is actually destruction.
  • Social Engineering: Creating fake personas on social media to gather intelligence from targets.

While some groups rely on sophisticated code, others rely on fear. Analysts have noted a rise in “hack-and-leak” operations. In these scenarios, hackers claim they have breached a secure system and leak documents to cause panic. Sometimes, the claims are exaggerated to create psychological pressure on the public.

US Infrastructure Faces Heightened Risk

Most confirmed attacks in this recent wave have hit targets in Israel and the Persian Gulf. However, American organizations remain a primary target for Iranian cyber operators. The United States often shares intelligence and infrastructure with allies in the region.

Federal agencies have previously warned that Iranian actors target Operational Technology, or OT systems. These are the computers that control physical machinery in water plants, energy grids, and factories.

Sectors Under Highest Alert:

  1. Water and Wastewater Systems: Facilities often use older technology with default passwords.
  2. Energy Providers: Power grids remain a top priority for state-level disruptors.
  3. Defense Contractors: Companies in the supply chain for military equipment.

In previous incidents, hackers defaced screens at water facilities to show anti-Israel messages. While those attacks caused limited physical damage, they proved that adversaries could access the controls of vital life-safety systems.

Preparing for a Long Cyber Conflict

Experts agree that this is not a temporary spike in activity. It appears to be part of a long-term strategy involving espionage, psychological warfare, and sabotage. The line between physical war and cyber war continues to blur.

Disinformation campaigns are expected to grow alongside technical attacks. Bots on platforms like X (formerly Twitter) and Instagram may spread false reports of infrastructure damage. This aims to confuse the public and sow doubt in government capabilities.

Security firms urge all organizations to take immediate defensive steps.

  • Patch Systems: Update all software immediately to close known loopholes.
  • Verify Access: Remove old user accounts that are no longer needed.
  • Train Staff: Teach employees to spot phishing emails that pretend to be system updates.

The digital front of this conflict is active and invisible. Organizations in the US must treat these threats as an immediate reality rather than a theoretical risk.

About author

Articles

Sofia Ramirez is a senior correspondent at Thunder Tiger Europe Media with 18 years of experience covering Latin American politics and global migration trends. Holding a Master's in Journalism from Columbia University, she has expertise in investigative reporting, having exposed corruption scandals in South America for The Guardian and Al Jazeera. Her authoritativeness is underscored by the International Women's Media Foundation Award in 2020. Sofia upholds trustworthiness by adhering to ethical sourcing and transparency, delivering reliable insights on worldwide events to Thunder Tiger's readers.

Leave a Reply

Your email address will not be published. Required fields are marked *