Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

IRGC Hacker Groups Attacking Targeted Financial, Government, and Media Organizations

Posted on August 7, 2025August 7, 2025 By CWS

In the course of the 12-day battle between Israel and Iran in June 2025, a complicated community of Iranian-linked cyber risk actors launched coordinated digital operations in opposition to crucial infrastructure sectors worldwide.

The marketing campaign demonstrated unprecedented coordination between army operations and state-sponsored cyberattacks, focusing on monetary establishments, authorities companies, and media organizations throughout a number of international locations.

The cyber offensive concerned a fancy ecosystem of hackers starting from state-sponsored teams with direct ties to Iran’s Islamic Revolutionary Guard Corps (IRGC) to ideologically-aligned hacktivist collectives working with various levels of autonomy.

These risk actors employed numerous assault vectors together with malware-laden phishing campaigns, distributed denial-of-service (DDoS) assaults, SQL injection exploits, and complex social engineering methods designed to steal delicate information and disrupt crucial operations.

SecurityScorecard researchers recognized over 178 lively hacker teams collaborating within the marketing campaign, analyzing greater than 250,000 messages from Iranian proxies and hacktivist channels.

The evaluation revealed that a number of key teams, together with Imperial Kitten (often known as Tortoiseshell, Cuboid Sandstorm, and Yellow Liderc), quickly tailored their ways to align with Iran’s army goals, suggesting pre-planned coordination between cyber and kinetic operations.

Superior Phishing Infrastructure and Tactical Evolution

Essentially the most regarding side of this marketing campaign was the pace at which established risk actors modified their operational procedures to use the battle.

Imperial Kitten, a well-documented Iranian state-linked group infamous for its social engineering capabilities, deployed conflict-themed phishing lures inside hours of the army escalation starting.

The group’s phishing infrastructure integrated present occasions and emotional manipulation ways, utilizing topic strains referencing ongoing airstrikes and humanitarian crises to extend sufferer engagement charges.

The phishing emails contained malicious attachments designed to ascertain persistent entry to focus on networks, with payloads particularly crafted to evade detection in the course of the heightened alert durations typical of wartime cybersecurity postures.

This tactical evolution demonstrates how state-sponsored actors can quickly pivot their technical capabilities to assist broader strategic goals, creating important challenges for conventional risk detection methodologies.

Equip your SOC with full entry to the most recent risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attacking, Financial, Government, Groups, Hacker, IRGC, Media, Organizations, Targeted

Post navigation

Previous Post: Hackers Use Legitimate Drivers to Kill Antivirus Processes and Lower The System’s Defenses
Next Post: Black Hat USA 2025 – Summary of Vendor Announcements (Part 3)

Related Posts

Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life Cyber Security News
Windows User Account Control Bypassed Using Character Editor to Escalate Privileges Cyber Security News
Chinese PlushDaemon Hackers use EdgeStepper Tool to Hijack Legitimate Updates and Redirect to Malicious Servers Cyber Security News
MCPTotal Launches to Power Secure Enterprise MCP Workflows Cyber Security News
CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks Cyber Security News
Rise in Phishing Activity Using Spoofed SharePoint Domains With Sneaky2FA Techniques Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark