Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

Posted on November 20, 2025November 20, 2025 By CWS

Nov 20, 2025Ravie LakshmananCyber Warfare / Risk Intelligence
Risk actors with ties to Iran engaged in cyber warfare as a part of efforts to facilitate and improve bodily, real-world assaults, a development that Amazon has referred to as cyber-enabled kinetic focusing on.
The event is an indication that the strains between state-sponsored cyber assaults and kinetic warfare are more and more blurring, necessitating the necessity for a brand new class of warfare, the tech big’s risk intelligence group stated in a report shared with The Hacker Information.
Whereas conventional cybersecurity frameworks have handled digital and bodily threats as separate domains, CJ Moses, CISO of Amazon Built-in Safety, stated these delineations are synthetic and that nation-state risk actors are participating in cyber reconnaissance exercise to allow kinetic focusing on.
“These aren’t simply cyber assaults that occur to trigger bodily harm; they’re coordinated campaigns the place digital operations are particularly designed to help bodily army targets,” Moses added.

For instance, Amazon stated it noticed Imperial Kitten (aka Tortoiseshell), a hacking group assessed to be affiliated with Iran’s Islamic Revolutionary Guard Corps (IRGC), conducting digital reconnaissance between December 2021 and January 2024, focusing on a ship’s Computerized Identification System (AIS) platform with the objective of getting access to crucial transport infrastructure.
Subsequently, the risk actor was recognized as attacking further maritime vessel platforms, in a single case even getting access to CCTV cameras fitted on a maritime vessel that supplied real-time visible intelligence.
The assault progressed to a focused intelligence gathering part on January 27, 2024, when Imperial Kitten carried out focused searches for AIS location knowledge for a selected transport vessel. Merely days later, that very same vessel was focused by an unsuccessful missile strike carried out by Iranian-backed Houthi militants.
The Houthi forces have been attributed to a string of missile assaults focusing on business transport within the Crimson Sea in help of the Palestinian militant group Hamas in its battle with Israel. On February 1, 2024, the Houthi motion in Yemen claimed it had struck a U.S. service provider ship named KOI with “a number of acceptable naval missiles.”

“This case demonstrates how cyber operations can present adversaries with the exact intelligence wanted to conduct focused bodily assaults towards maritime infrastructure – a crucial part of worldwide commerce and army logistics,” Moses stated.
One other case research issues MuddyWater, a risk actor linked to Iran’s Ministry of Intelligence and Safety (MOIS), that established infrastructure for a cyber community operation in Might 2025, and later used that server a month later to entry one other compromised server containing dwell CCTV streams from Jerusalem to collect real-time visible intelligence of potential targets.

On June 23, 2025, across the time Iran launched widespread missile assaults towards the town, the Israel Nationwide Cyber Directorate disclosed that “Iranians have been making an attempt to hook up with cameras to know what occurred and the place their missiles hit to enhance their precision.”
To tug off these multi-layered assaults, the risk actors are stated to have routed their site visitors via anonymizing VPN providers to obscure their true origins and complicate attribution efforts. The findings serve to spotlight that espionage-focused assaults can finally be a launchpad for kinetic focusing on.
“Nation-state actors are recognizing the power multiplier impact of mixing digital reconnaissance with bodily assaults,” Amazon stated. “This development represents a elementary evolution in warfare, the place the standard boundaries between cyber and kinetic operations are dissolving.”

The Hacker News Tags:AIs, Attempt, Data, days, Hackers, IranLinked, Mapped, Missile, RealWorld, Ship, Strike

Post navigation

Previous Post: SolarWinds Patches Three Critical Serv-U Vulnerabilities
Next Post: Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files

Related Posts

Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack The Hacker News
Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More The Hacker News
Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure The Hacker News
Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices The Hacker News
Why More Security Leaders Are Selecting AEV Why More Security Leaders Are Selecting AEV The Hacker News
Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News