Resecurity
Facts (15)
Sources
Resecurity warns that Iran war enters multi-domain phase as cyber ... industrialcyber.co Mar 24, 2026 8 facts
claimThe group Server Killers, described by a Telegram channel as Russian-speaking, has joined the cyber war against the United States and Israel, though Resecurity assesses their activity as opportunistic rather than state-directed and their claims of providing substantial support to Iran as exaggerated.
claimResecurity identified the emergence of the Cyber Isnaad Front, a group that has targeted Israeli critical infrastructure and telecommunication providers and released a 'hit list' of individuals in various industries.
perspectiveResecurity assesses that Iranian cyber activities remain largely opportunistic and have had limited impact on core operational processes due to constrained cyber resources, damaged infrastructure, and time pressures.
claimResecurity identified that the ongoing Iran war has evolved into a multi-domain confrontation where traditional militarized strikes are tightly interwoven with digital operations, electronic interference, and psychological warfare.
claimResecurity reported a sharp rise in cyber activity following recent U.S.–Israeli strikes on Iran, with both Iranian-aligned and pro-Western hacktivist groups targeting critical infrastructure, military logistics, and symbolic digital assets.
claimResecurity reported that actors associated with Iranian and pro-Hamas groups are actively recruiting new members and utilizing artificial intelligence to generate influence campaigns on social media.
claimResecurity reported that hacktivist activity has significantly escalated following the US-Israeli strikes on Iran.
perspectiveResecurity assesses that the Iran war will remain a prolonged and disruptive conflict, with sustained missile, drone, and cyberattacks expected despite the unlikelihood of a full-scale regional war.
Iran War: Kinetic, Cyber, Electronic and Psychological Warfare ... resecurity.com Mar 17, 2026 7 facts
claimResecurity identifies the Handala Hack Team as one of the most credible actors, noting their increased data theft and ransomware activity during the Iran War, with a specific focus on targeting individuals in the defense sector to exert influence.
claimResecurity asserts that GNSS and GPS spoofing pose substantial risks to the Operational Technology (OT) environment because digital and physical services rely on geolocation.
claimResecurity assesses that Iran lacks the internal capacity to generate the DDoS attack volumes required for significant impact and has consequently engaged with hacktivists and third-party underground services.
claimResecurity anticipates that Iranian-affiliated cyber activity will shift toward ransomware operations, where critical operational data is held hostage for demands beyond simple financial compensation.
perspectiveResecurity interprets Hamas and Hezbollah as the primary actors conducting malicious cyber activity, supported by proxies abroad, due to Iran's limited internal capabilities to conduct counterattacks.
claimResecurity investigations found that many cyberattack claims made by hacktivist groups during the Iran conflict did not cause meaningful impact or were not executed.
accountPro-Iranian channels circulated data regarding Israeli military personnel, which Resecurity identified as misinformation containing previously leaked records of IDF members intended to create uncertainty via social media.