Following the outbreak of direct conflict between Iran and Israel in June 2025, SecAlliance published an analysis of Iran’s cyber strategy, unpicking key drivers of Iranian operations, the structure of its state-sponsored cyber apparatus and Tehran’s broader cyber capabilities.
Within our various intelligence-sharing communities, there has been a lot of discussion concerning the potential cyber implications of the June 2025 Israel-Iran conflict. Many organisations have questions regarding the likely targets of Iranian cyber activity, how significant this activity is likely to be and what form it might take. Looking at each of these questions in turn:
The Israeli state, its security forces and Israeli society more generally are almost certainly the highest priority targets for Iran at the time of writing.
Cyber-enabled espionage attacks against military and political/governmental targets are almost certainly ongoing. Cyber-enabled intrusion and sabotage efforts targeting the Israeli military (especially missile defence systems) and broader critical national infrastructure (CNI), including transport networks, utilities and financial systems, are also highly likely. The nature of Israeli kinetic targeting in Iran, such as strikes on oil export infrastructure and state media, indicates that Iranian attempts to retributively target broader Israeli economic and social interests are likely. However, the comparative capabilities of both sides and Israel’s position as a ‘hard target’ with effective and sophisticated cyber defence mechanisms in place indicate that the likelihood of notable success in such attacks is very low.
There is a strong possibility that Iranian cyberespionage and sabotage operations may extend to states which Iran assesses to be assisting Israel (most notably Jordan), or which Tehran considers to be hostile to its interests (such as Saudi Arabia and the UAE). These countries are assessed to be significantly less well-prepared than Israel to counter Iranian cyber threats, and therefore arguably present the most realistic mechanism through which Iran could effectively wield its limited cyber capability in this conflict.
At the time of writing, an increase in Iranian targeting of North America, Europe and the West more broadly is unlikely. Iran’s already-ongoing small-scale, relatively targeted and generally less sophisticated cyber-enabled espionage and intrusion operations targeting the West are unlikely to alter as a result of the developing conflict and will likely continue on a similar scale and tempo. Additional targeting of Western business interests unrelated to Israel or other areas of interest to Iran (such as nuclear discussions and policy) is unlikely, although this situation may change over time depending on developments like potential US support of Israel. Once again, however, the limited scale and sophistication of Iran’s offensive cyber operations mean that even when intent is present, capability is limited.
SecAlliance assesses that cyber-enabled activity is unlikely to significantly alter either the conflict or the wider cyber threat landscape. This assessment is based on the following premises:
A comprehensive breakdown of the MITRE ATT&CK TTPs deployed by Iran state-linked advanced persistent threat (APT) groups is available to our clients on the ThreatMatch platform. Some broad themes are worth noting:
SecAlliance provides detailed and timely analysis to clients via our dedicated ThreatMatch platform and bespoke intelligence outputs. For more information, please contact info@secalliance.com
* ‘Significant’ is included here to discount the high-volume, low-impact DDoS activity conducted by hacktivist entities which are acting in support of Iran. The second part of this blog series will examine the nature and extent of pro-Iranian hacktivist activity over the past week.