Iranian hacktivists muster their forces but state APTs lay low | Computer Weekly
Briefly

Iranian hacktivists muster their forces but state APTs lay low | Computer Weekly
"Handala Team, a pro-Palestine hacktivist operation with links to the Iranian intelligence services, that has claimed a breach at Saudi Aramco, alleging that its hackers destroyed the victim's infrastructure and caused it to cease oil extraction - claims that have not yet been verified due to insufficient evidence."
"FAD Team (aka Fatimiyoun/Fatimion) - which identifies with the Islamic Resistance in Iraq has claimed responsibility for an as-yet unconfirmed breach at WeLearn - an Israeli scaleup - and Maad Hospitality Towers - a planned 50,000 plus bed hotel in Makkah, Saudi Arabia, designed to accommodate travelers making the Hajj pilgrimage."
"GPS spoofing attacks - in which satellite data is manipulated to send victims off course - have hit over 1,000 ships in the Persian Gulf region."
As Middle East conflict enters its fifth day, cyber threat intelligence reveals significant uptick in attack volumes from pro-Iran hacktivist groups. Handala Team claimed breach of Saudi Aramco, alleging infrastructure destruction and oil extraction cessation, though claims remain unverified. FAD Team claimed responsibility for breaches at Israeli startup WeLearn and Maad Hospitality Towers in Makkah. GPS spoofing attacks have targeted over 1,000 ships in Persian Gulf waters. Additional groups including APT Iran, Cyber Islamic Resistance, and Russia-based PalachPro have claimed attacks on critical infrastructure in Jordan and Israeli organizations using DDoS and data wiping malware. Multiple hacktivist networks are coordinating operations and amplifying messaging.
Read at ComputerWeekly.com
Unable to calculate read time
[
|
]