Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel

Posted on December 8, 2025December 8, 2025 By CWS

The Kitten Venture has emerged as a coordinated hacktivist platform working on the intersection of activism and technical operations.

This initiative represents a shift in how cyber-focused teams set up their campaigns, shifting past remoted assaults towards centralized infrastructure that facilitates communication, useful resource sharing, and coordinated motion.

The platform, accessible by thekitten.group, serves as a hub the place a number of hacktivist teams collaborate to execute assaults and doxing campaigns towards Israeli targets.

The group seems primarily affiliated with pro-Iranian hacktivist teams, although it publicly claims independence from any authorities construction.

The assault panorama beneath this initiative spans a regarding vary of targets. Operations have progressed from fundamental knowledge publicity operations, comparable to releasing details about Israeli troopers, to extra refined makes an attempt towards essential infrastructure, together with Industrial Management Programs (ICS) and Programmable Logic Controllers (PLC).

kitten (Supply – Medium)

This escalation demonstrates the rising technical sophistication inside these hacktivist networks. Contributors within the Kitten Venture coordinate by non-public messaging channels, sharing instruments, methods, and marketing campaign documentation.

Recognized teams working beneath this umbrella embody the Handala Hacking Group, KilledByIsrael, and CyberIsraelFront, amongst others. The infrastructure itself seems designed to assist a number of teams concurrently, offering what features as a shared operations middle.

VECERT safety analysts recognized that the platform’s growth originated from infrastructure hosted on Iranian servers, particularly by subdomains of zagrosguard.ir.

This discovery revealed that whereas the mission claims operational independence, its technical spine connects to established Iranian cybersecurity suppliers.

The evaluation uncovered an IP deal with (185.164.72.226) registered in Iran, operated by Pars Parva Programs beneath ASN 60631. This infrastructure connection proved essential for understanding the precise assist construction behind the supposedly unbiased hacktivist collective.

Infrastructure and Technical Structure

The Kitten Venture’s technical infrastructure depends on a rigorously structured API system that helps multimedia content material sharing and person authentication.

VECERT safety analysts found a PHP-based backend using DirectoryIterator features to handle and serve photographs and movies throughout categorized mission folders.

Admin Panel (Supply – Medium)

The platform employs safety mechanisms, together with enter validation through common expression matching, limiting mission names to alphanumeric characters, dots, dashes, and underscores, restricted to 100 characters.

File names face related restrictions, stopping listing traversal assaults by specific path validation utilizing the realpath() features.

The authentication system requires customers to confirm their identification by a 64-digit monitoring ID and related electronic mail deal with earlier than accessing messaging sections.

.htaccess (Supply – Medium)

This construction permits the platform to keep up separate communication channels for various operational teams. API endpoints like picture.php and media.php deal with content material supply with HTTP vary request assist, enabling environment friendly video streaming capabilities for shared operational content material.

The .htaccess configuration signifies Node.js execution through CloudLinux Passenger, with the server working model 22 of Node.js.

This technical setup gives the platform with dynamic content-generation capabilities past static file serving, enabling builders to implement complicated backend operations that assist the hacktivist coordination infrastructure.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacks, Carrying, Groups, Hacktivist, Israel, Kitten, Project, Targeting

Post navigation

Previous Post: Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
Next Post: Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

Related Posts

Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations Cyber Security News
CISOs Guide to Navigating the 2025 Threat Landscape Cyber Security News
Instagram Started Using 1-Week Validity TLS certificates and Changes Them Daily Cyber Security News
Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations Cyber Security News
Microsoft Zero Day Quest Hacking Contest Cyber Security News
QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary
  • Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information
  • The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel
  • Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
  • USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary
  • Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information
  • The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel
  • Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
  • USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark