Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel

The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel

Posted on December 8, 2025December 8, 2025 By CWS

The Kitten Venture has emerged as a coordinated hacktivist platform working on the intersection of activism and technical operations.

This initiative represents a shift in how cyber-focused teams set up their campaigns, shifting past remoted assaults towards centralized infrastructure that facilitates communication, useful resource sharing, and coordinated motion.

The platform, accessible by thekitten.group, serves as a hub the place a number of hacktivist teams collaborate to execute assaults and doxing campaigns towards Israeli targets.

The group seems primarily affiliated with pro-Iranian hacktivist teams, although it publicly claims independence from any authorities construction.

The assault panorama beneath this initiative spans a regarding vary of targets. Operations have progressed from fundamental knowledge publicity operations, comparable to releasing details about Israeli troopers, to extra refined makes an attempt towards essential infrastructure, together with Industrial Management Programs (ICS) and Programmable Logic Controllers (PLC).

kitten (Supply – Medium)

This escalation demonstrates the rising technical sophistication inside these hacktivist networks. Contributors within the Kitten Venture coordinate by non-public messaging channels, sharing instruments, methods, and marketing campaign documentation.

Recognized teams working beneath this umbrella embody the Handala Hacking Group, KilledByIsrael, and CyberIsraelFront, amongst others. The infrastructure itself seems designed to assist a number of teams concurrently, offering what features as a shared operations middle.

VECERT safety analysts recognized that the platform’s growth originated from infrastructure hosted on Iranian servers, particularly by subdomains of zagrosguard.ir.

This discovery revealed that whereas the mission claims operational independence, its technical spine connects to established Iranian cybersecurity suppliers.

The evaluation uncovered an IP deal with (185.164.72.226) registered in Iran, operated by Pars Parva Programs beneath ASN 60631. This infrastructure connection proved essential for understanding the precise assist construction behind the supposedly unbiased hacktivist collective.

Infrastructure and Technical Structure

The Kitten Venture’s technical infrastructure depends on a rigorously structured API system that helps multimedia content material sharing and person authentication.

VECERT safety analysts found a PHP-based backend using DirectoryIterator features to handle and serve photographs and movies throughout categorized mission folders.

Admin Panel (Supply – Medium)

The platform employs safety mechanisms, together with enter validation through common expression matching, limiting mission names to alphanumeric characters, dots, dashes, and underscores, restricted to 100 characters.

File names face related restrictions, stopping listing traversal assaults by specific path validation utilizing the realpath() features.

The authentication system requires customers to confirm their identification by a 64-digit monitoring ID and related electronic mail deal with earlier than accessing messaging sections.

.htaccess (Supply – Medium)

This construction permits the platform to keep up separate communication channels for various operational teams. API endpoints like picture.php and media.php deal with content material supply with HTTP vary request assist, enabling environment friendly video streaming capabilities for shared operational content material.

The .htaccess configuration signifies Node.js execution through CloudLinux Passenger, with the server working model 22 of Node.js.

This technical setup gives the platform with dynamic content-generation capabilities past static file serving, enabling builders to implement complicated backend operations that assist the hacktivist coordination infrastructure.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacks, Carrying, Groups, Hacktivist, Israel, Kitten, Project, Targeting

Post navigation

Previous Post: Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
Next Post: CISA Adds Critical React2Shell Vulnerability to KEV Catalog Following Active Exploitation

Related Posts

Microsoft Patch for Old Flaw Reveals New Kernel Address Leak Vulnerability in Windows 11/Server 2022 24H2 Microsoft Patch for Old Flaw Reveals New Kernel Address Leak Vulnerability in Windows 11/Server 2022 24H2 Cyber Security News
Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data Cyber Security News
GitLab Patches Multiple Vulnerabilities that Enables Arbitrary Code Execution GitLab Patches Multiple Vulnerabilities that Enables Arbitrary Code Execution Cyber Security News
Multiple Apache OpenOffice Vulnerabilities Leads to Memory Corruption and Unauthorized Content Loading Multiple Apache OpenOffice Vulnerabilities Leads to Memory Corruption and Unauthorized Content Loading Cyber Security News
Critical Vulnerability Exposes 50,000 WordPress Sites Critical Vulnerability Exposes 50,000 WordPress Sites Cyber Security News
How Businesses Stop Complex Social Engineering Attacks Early How Businesses Stop Complex Social Engineering Attacks Early Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark