Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel

The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel

Posted on December 8, 2025December 8, 2025 By CWS

The Kitten Venture has emerged as a coordinated hacktivist platform working on the intersection of activism and technical operations.

This initiative represents a shift in how cyber-focused teams set up their campaigns, shifting past remoted assaults towards centralized infrastructure that facilitates communication, useful resource sharing, and coordinated motion.

The platform, accessible by thekitten.group, serves as a hub the place a number of hacktivist teams collaborate to execute assaults and doxing campaigns towards Israeli targets.

The group seems primarily affiliated with pro-Iranian hacktivist teams, although it publicly claims independence from any authorities construction.

The assault panorama beneath this initiative spans a regarding vary of targets. Operations have progressed from fundamental knowledge publicity operations, comparable to releasing details about Israeli troopers, to extra refined makes an attempt towards essential infrastructure, together with Industrial Management Programs (ICS) and Programmable Logic Controllers (PLC).

kitten (Supply – Medium)

This escalation demonstrates the rising technical sophistication inside these hacktivist networks. Contributors within the Kitten Venture coordinate by non-public messaging channels, sharing instruments, methods, and marketing campaign documentation.

Recognized teams working beneath this umbrella embody the Handala Hacking Group, KilledByIsrael, and CyberIsraelFront, amongst others. The infrastructure itself seems designed to assist a number of teams concurrently, offering what features as a shared operations middle.

VECERT safety analysts recognized that the platform’s growth originated from infrastructure hosted on Iranian servers, particularly by subdomains of zagrosguard.ir.

This discovery revealed that whereas the mission claims operational independence, its technical spine connects to established Iranian cybersecurity suppliers.

The evaluation uncovered an IP deal with (185.164.72.226) registered in Iran, operated by Pars Parva Programs beneath ASN 60631. This infrastructure connection proved essential for understanding the precise assist construction behind the supposedly unbiased hacktivist collective.

Infrastructure and Technical Structure

The Kitten Venture’s technical infrastructure depends on a rigorously structured API system that helps multimedia content material sharing and person authentication.

VECERT safety analysts found a PHP-based backend using DirectoryIterator features to handle and serve photographs and movies throughout categorized mission folders.

Admin Panel (Supply – Medium)

The platform employs safety mechanisms, together with enter validation through common expression matching, limiting mission names to alphanumeric characters, dots, dashes, and underscores, restricted to 100 characters.

File names face related restrictions, stopping listing traversal assaults by specific path validation utilizing the realpath() features.

The authentication system requires customers to confirm their identification by a 64-digit monitoring ID and related electronic mail deal with earlier than accessing messaging sections.

.htaccess (Supply – Medium)

This construction permits the platform to keep up separate communication channels for various operational teams. API endpoints like picture.php and media.php deal with content material supply with HTTP vary request assist, enabling environment friendly video streaming capabilities for shared operational content material.

The .htaccess configuration signifies Node.js execution through CloudLinux Passenger, with the server working model 22 of Node.js.

This technical setup gives the platform with dynamic content-generation capabilities past static file serving, enabling builders to implement complicated backend operations that assist the hacktivist coordination infrastructure.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacks, Carrying, Groups, Hacktivist, Israel, Kitten, Project, Targeting

Post navigation

Previous Post: Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
Next Post: CISA Adds Critical React2Shell Vulnerability to KEV Catalog Following Active Exploitation

Related Posts

New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways Cyber Security News
Threat Actors Weaponizing .hwp Files to Deliver RokRAT Malware Threat Actors Weaponizing .hwp Files to Deliver RokRAT Malware Cyber Security News
Multiple Django Vulnerabilities Enables SQL Injection and Denial-of-Service Attacks Multiple Django Vulnerabilities Enables SQL Injection and Denial-of-Service Attacks Cyber Security News
Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data Cyber Security News
Infamous BreachForums Is Back Online With All Accounts and Posts Restored Infamous BreachForums Is Back Online With All Accounts and Posts Restored Cyber Security News
UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News