Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel

The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel

Posted on December 8, 2025December 8, 2025 By CWS

The Kitten Venture has emerged as a coordinated hacktivist platform working on the intersection of activism and technical operations.

This initiative represents a shift in how cyber-focused teams set up their campaigns, shifting past remoted assaults towards centralized infrastructure that facilitates communication, useful resource sharing, and coordinated motion.

The platform, accessible by thekitten.group, serves as a hub the place a number of hacktivist teams collaborate to execute assaults and doxing campaigns towards Israeli targets.

The group seems primarily affiliated with pro-Iranian hacktivist teams, although it publicly claims independence from any authorities construction.

The assault panorama beneath this initiative spans a regarding vary of targets. Operations have progressed from fundamental knowledge publicity operations, comparable to releasing details about Israeli troopers, to extra refined makes an attempt towards essential infrastructure, together with Industrial Management Programs (ICS) and Programmable Logic Controllers (PLC).

kitten (Supply – Medium)

This escalation demonstrates the rising technical sophistication inside these hacktivist networks. Contributors within the Kitten Venture coordinate by non-public messaging channels, sharing instruments, methods, and marketing campaign documentation.

Recognized teams working beneath this umbrella embody the Handala Hacking Group, KilledByIsrael, and CyberIsraelFront, amongst others. The infrastructure itself seems designed to assist a number of teams concurrently, offering what features as a shared operations middle.

VECERT safety analysts recognized that the platform’s growth originated from infrastructure hosted on Iranian servers, particularly by subdomains of zagrosguard.ir.

This discovery revealed that whereas the mission claims operational independence, its technical spine connects to established Iranian cybersecurity suppliers.

The evaluation uncovered an IP deal with (185.164.72.226) registered in Iran, operated by Pars Parva Programs beneath ASN 60631. This infrastructure connection proved essential for understanding the precise assist construction behind the supposedly unbiased hacktivist collective.

Infrastructure and Technical Structure

The Kitten Venture’s technical infrastructure depends on a rigorously structured API system that helps multimedia content material sharing and person authentication.

VECERT safety analysts found a PHP-based backend using DirectoryIterator features to handle and serve photographs and movies throughout categorized mission folders.

Admin Panel (Supply – Medium)

The platform employs safety mechanisms, together with enter validation through common expression matching, limiting mission names to alphanumeric characters, dots, dashes, and underscores, restricted to 100 characters.

File names face related restrictions, stopping listing traversal assaults by specific path validation utilizing the realpath() features.

The authentication system requires customers to confirm their identification by a 64-digit monitoring ID and related electronic mail deal with earlier than accessing messaging sections.

.htaccess (Supply – Medium)

This construction permits the platform to keep up separate communication channels for various operational teams. API endpoints like picture.php and media.php deal with content material supply with HTTP vary request assist, enabling environment friendly video streaming capabilities for shared operational content material.

The .htaccess configuration signifies Node.js execution through CloudLinux Passenger, with the server working model 22 of Node.js.

This technical setup gives the platform with dynamic content-generation capabilities past static file serving, enabling builders to implement complicated backend operations that assist the hacktivist coordination infrastructure.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacks, Carrying, Groups, Hacktivist, Israel, Kitten, Project, Targeting

Post navigation

Previous Post: Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
Next Post: CISA Adds Critical React2Shell Vulnerability to KEV Catalog Following Active Exploitation

Related Posts

Threat Actor Exploited Multiple FortiWeb Appliances to Deploy Sliver C2 for Persistent Access Threat Actor Exploited Multiple FortiWeb Appliances to Deploy Sliver C2 for Persistent Access Cyber Security News
New Phishing Attack Leverages Popular Brands to Harvest Login Credentials New Phishing Attack Leverages Popular Brands to Harvest Login Credentials Cyber Security News
SoundCloud Data Breach Exposes 29.8 Million Personal users Details SoundCloud Data Breach Exposes 29.8 Million Personal users Details Cyber Security News
Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges Cyber Security News
Phishing Alert: Fake Party Invites Install Remote Access Software Phishing Alert: Fake Party Invites Install Remote Access Software Cyber Security News
WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News