Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hacktivist Surge: 149 DDoS Attacks Across 16 Nations

Hacktivist Surge: 149 DDoS Attacks Across 16 Nations

Posted on March 4, 2026 By CWS

In the wake of the joint U.S.-Israel military operations against Iran, a significant increase in hacktivist activities has been observed. This cyber retaliation, primarily involving distributed denial-of-service (DDoS) attacks, has targeted 110 organizations across 16 countries. Cybersecurity firm Radware has identified two hacktivist groups, Keymous+ and DieNet, as responsible for nearly 70% of these attacks.

Key Players in the Hacktivist Surge

The cyber offensive began on February 28, 2026, with the Tunisian group known as Hider Nex initiating the first attack. This group, which supports pro-Palestinian causes, employs a hack-and-leak strategy that combines DDoS attacks with data breaches to further its geopolitical objectives. Emerging in mid-2025, Hider Nex has quickly become a notable player in the cyber domain.

A total of 12 hacktivist groups were involved in the recorded attacks, with Keymous+, DieNet, and NoName057(16) accounting for 74.6% of the activity. The majority of these cyber assaults, 107 in total, were concentrated in the Middle East, focusing largely on public infrastructure and state-level targets.

Regional Focus and Sector Impact

The impact of these hacktivist activities was most pronounced in the Middle East, with Kuwait, Israel, and Jordan being the primary targets. Specifically, Kuwait accounted for 28% of the attacks, Israel 27.1%, and Jordan 21.5%. Europe also faced significant activity, making up 22.8% of the global attacks during this period.

Globally, nearly half of the targeted organizations belonged to the government sector, followed by finance and telecommunications. This pattern highlights the strategic focus of hacktivist groups on critical sectors to maximize disruption and visibility.

Broader Implications and Future Outlook

The ongoing cyber conflict has seen pro-Russian groups claiming breaches of Israeli military networks and the use of phishing campaigns masked as official applications to deliver malware. In addition, Iran’s Revolutionary Guard has targeted energy and digital infrastructure in the Middle East, aiming to counteract military losses with economic impact.

As tensions continue, cybersecurity experts emphasize the need for heightened vigilance and robust defense mechanisms. Organizations in Israel, the U.S., and allied nations are advised to monitor for threats, update security protocols, and ensure proper network segmentation to mitigate risks.

The situation underscores the evolving landscape of cyber warfare, where hacktivist operations increasingly blend espionage, disruption, and psychological tactics. With the potential for further escalation, maintaining cybersecurity readiness is vital for safeguarding critical infrastructure and national interests.

The Hacker News Tags:cyber attacks, cyber threat, cyber vigilance, cyber warfare, Cybersecurity, DDoS, government sector, hack-and-leak, Hacktivist, hacktivist groups, Infrastructure, Iran, Israel, Middle East, retaliatory attacks

Post navigation

Previous Post: Enhance SOC Efficiency with Improved Team Collaboration
Next Post: Global Effort Shuts Down Tycoon 2FA Phishing Network

Related Posts

Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads The Hacker News
Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel The Hacker News
Russian Arrests LeakBase Admin in Major Cybercrime Bust Russian Arrests LeakBase Admin in Major Cybercrime Bust The Hacker News
Microsoft Fixes 59 Security Flaws, Including Six Critical Zero-Days Microsoft Fixes 59 Security Flaws, Including Six Critical Zero-Days The Hacker News
How CISOs Can Drive Effective AI Governance How CISOs Can Drive Effective AI Governance The Hacker News
Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats
  • Fiverr Faces Data Breach Due to Cloudinary Misconfiguration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats
  • Fiverr Faces Data Breach Due to Cloudinary Misconfiguration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark