Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

IRGC Hacker Groups Attacking Targeted Financial, Government, and Media Organizations

Posted on August 7, 2025August 7, 2025 By CWS

In the course of the 12-day battle between Israel and Iran in June 2025, a complicated community of Iranian-linked cyber risk actors launched coordinated digital operations in opposition to crucial infrastructure sectors worldwide.

The marketing campaign demonstrated unprecedented coordination between army operations and state-sponsored cyberattacks, focusing on monetary establishments, authorities companies, and media organizations throughout a number of international locations.

The cyber offensive concerned a fancy ecosystem of hackers starting from state-sponsored teams with direct ties to Iran’s Islamic Revolutionary Guard Corps (IRGC) to ideologically-aligned hacktivist collectives working with various levels of autonomy.

These risk actors employed numerous assault vectors together with malware-laden phishing campaigns, distributed denial-of-service (DDoS) assaults, SQL injection exploits, and complex social engineering methods designed to steal delicate information and disrupt crucial operations.

SecurityScorecard researchers recognized over 178 lively hacker teams collaborating within the marketing campaign, analyzing greater than 250,000 messages from Iranian proxies and hacktivist channels.

The evaluation revealed that a number of key teams, together with Imperial Kitten (often known as Tortoiseshell, Cuboid Sandstorm, and Yellow Liderc), quickly tailored their ways to align with Iran’s army goals, suggesting pre-planned coordination between cyber and kinetic operations.

Superior Phishing Infrastructure and Tactical Evolution

Essentially the most regarding side of this marketing campaign was the pace at which established risk actors modified their operational procedures to use the battle.

Imperial Kitten, a well-documented Iranian state-linked group infamous for its social engineering capabilities, deployed conflict-themed phishing lures inside hours of the army escalation starting.

The group’s phishing infrastructure integrated present occasions and emotional manipulation ways, utilizing topic strains referencing ongoing airstrikes and humanitarian crises to extend sufferer engagement charges.

The phishing emails contained malicious attachments designed to ascertain persistent entry to focus on networks, with payloads particularly crafted to evade detection in the course of the heightened alert durations typical of wartime cybersecurity postures.

This tactical evolution demonstrates how state-sponsored actors can quickly pivot their technical capabilities to assist broader strategic goals, creating important challenges for conventional risk detection methodologies.

Equip your SOC with full entry to the most recent risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attacking, Financial, Government, Groups, Hacker, IRGC, Media, Organizations, Targeted

Post navigation

Previous Post: Hackers Use Legitimate Drivers to Kill Antivirus Processes and Lower The System’s Defenses
Next Post: Black Hat USA 2025 – Summary of Vendor Announcements (Part 3)

Related Posts

Streamlined Patch Management for Endpoint Device Security Cyber Security News
Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code Cyber Security News
Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered Cyber Security News
CodeIgniter Vulnerability Exposes Million of Webapps to File Upload Attacks Cyber Security News
Multiple GitLab Vulnerabilities Let Attackers Trigger DoS Attacks Cyber Security News
Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia
  • FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User
  • Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code
  • Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year
  • Key Capabilities Security Leaders Need to Know

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia
  • FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User
  • Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code
  • Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year
  • Key Capabilities Security Leaders Need to Know

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News