Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

IRGC Hacker Groups Attacking Targeted Financial, Government, and Media Organizations

Posted on August 7, 2025August 7, 2025 By CWS

In the course of the 12-day battle between Israel and Iran in June 2025, a complicated community of Iranian-linked cyber risk actors launched coordinated digital operations in opposition to crucial infrastructure sectors worldwide.

The marketing campaign demonstrated unprecedented coordination between army operations and state-sponsored cyberattacks, focusing on monetary establishments, authorities companies, and media organizations throughout a number of international locations.

The cyber offensive concerned a fancy ecosystem of hackers starting from state-sponsored teams with direct ties to Iran’s Islamic Revolutionary Guard Corps (IRGC) to ideologically-aligned hacktivist collectives working with various levels of autonomy.

These risk actors employed numerous assault vectors together with malware-laden phishing campaigns, distributed denial-of-service (DDoS) assaults, SQL injection exploits, and complex social engineering methods designed to steal delicate information and disrupt crucial operations.

SecurityScorecard researchers recognized over 178 lively hacker teams collaborating within the marketing campaign, analyzing greater than 250,000 messages from Iranian proxies and hacktivist channels.

The evaluation revealed that a number of key teams, together with Imperial Kitten (often known as Tortoiseshell, Cuboid Sandstorm, and Yellow Liderc), quickly tailored their ways to align with Iran’s army goals, suggesting pre-planned coordination between cyber and kinetic operations.

Superior Phishing Infrastructure and Tactical Evolution

Essentially the most regarding side of this marketing campaign was the pace at which established risk actors modified their operational procedures to use the battle.

Imperial Kitten, a well-documented Iranian state-linked group infamous for its social engineering capabilities, deployed conflict-themed phishing lures inside hours of the army escalation starting.

The group’s phishing infrastructure integrated present occasions and emotional manipulation ways, utilizing topic strains referencing ongoing airstrikes and humanitarian crises to extend sufferer engagement charges.

The phishing emails contained malicious attachments designed to ascertain persistent entry to focus on networks, with payloads particularly crafted to evade detection in the course of the heightened alert durations typical of wartime cybersecurity postures.

This tactical evolution demonstrates how state-sponsored actors can quickly pivot their technical capabilities to assist broader strategic goals, creating important challenges for conventional risk detection methodologies.

Equip your SOC with full entry to the most recent risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attacking, Financial, Government, Groups, Hacker, IRGC, Media, Organizations, Targeted

Post navigation

Previous Post: Hackers Use Legitimate Drivers to Kill Antivirus Processes and Lower The System’s Defenses
Next Post: Black Hat USA 2025 – Summary of Vendor Announcements (Part 3)

Related Posts

Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight Cyber Security News
Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites Cyber Security News
New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data Cyber Security News
Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges Cyber Security News
How to Implement Zero Trust Architecture in Enterprise Networks Cyber Security News
Microsoft Teams RCE Vulnerability Let Attackers Read, Write and Delete Messages Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Manpower Says Data Breach Stemming From Ransomware Attack Impacts 140,000
  • Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network
  • What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive
  • Fortinet, Ivanti Release August 2025 Security Patches
  • Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Manpower Says Data Breach Stemming From Ransomware Attack Impacts 140,000
  • Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network
  • What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive
  • Fortinet, Ivanti Release August 2025 Security Patches
  • Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News