Building on our previous analysis of Iranian cyber capabilities and our assessment of likely Iranian cyber responses to the conflict, this blog turns its focus to the role of hacktivist groups: ideologically driven actors that conduct cyber operations to advance political, religious, or social agendas. In this piece, we examine the hacktivist groups on both the Iranian and Israeli sides, examining their targeting patterns, operational methods, and the potential impact of their activities. We also consider how these trends might evolve in the coming weeks as the wider conflict continues to unfold, concluding that:
While its impact remains limited, hacktivist activity is one of the most common forms of cyber activity seen so far in the Israel-Iran conflict—a position it will likely retain. These groups are often categorised as pro-Iranian or pro-Israeli, with pro-Iranian groups outnumbering pro-Israeli ones by roughly 10 to 1 at the time of writing.
In practice, however, many active entities—including Keymous+, Mr Hamza, Dark Storm Team, and RootSec—have participated in a range of conflicts, supporting pro-Palestinian, pro-Pakistani, and at times pro-Russian agendas. Their current positioning against Israel does not necessarily indicate alignment with Iranian state interests; in many cases, they have targeted Israeli infrastructure regardless, due to separate affiliations or broader ideological motivations. For the purposes of this blog, the actors involved will therefore be referred to as either pro-Israeli or anti-Israeli.
A review of Telegram channels used by these groups shows that the vast majority of activity consists of short-lived DDoS campaigns with limited real-world impact, along with occasional website defacements and data breaches claims. There are also reports of CCTV intrusions, doxxing, and ransomware; however, many of these claims are unsubstantiated and may be claimed as part of information operations.
Some actors, while masquerading as hacktivist groups, are also more likely attributable to state interests: notable examples include Moses Staff and Cyber Av3engers, both linked to Iran’s Islamic Revolutionary Guard Corps (IRGC), and Predatory Sparrow (Gonjeshke Darande), which is widely assessed to be backed by the Israeli state. Their operations reflect a more strategic, intelligence-driven approach, blurring the line between hacktivism and state-directed cyber activity.
Following Israel’s strikes on Iran on 13 June 2025, the majority of anti-Israeli hacktivist activity remained concentrated within the region, with targeting patterns closely mirroring those observed over the past two years:
A limited number of incidents have been reported beyond the region. Mr Hamza, for example, carried out a coordinated campaign against defence companies in both the UK and the US. Targets included Raytheon Technologies, CACI, and Ultra Electronics—all linked to military or intelligence operations supporting Israel. The 13 June post suggests the targeting is likely a response to Israel’s wider military actions, including those against Iran, although Mr Hamza and others have previously targeted US and Western entities prior to the escalation of hostilities between Israel and Iran.
There have also been claims of targeting government departments abroad. Team Fearless, for instance, claimed an attack on the UK Foreign, Commonwealth & Development Office.
On 14 June, R3V0XAn0nymous launched a campaign under the #OpIsrael banner, naming several German domains, linking the activity to ‘military or political support for Israel’ and ‘censorship and digital repression’. The group also listed Polish domains, although their stated motivations were more in line with general rights advocacy than direct support for Israel. Meanwhile, the Cyber Jihad Movement launched ‘Operation Storm’, with vague claims of targeting European governments, adult sites, and universities—although no concrete evidence of impact on government or education sectors has surfaced so far.
Pro-Israeli hacktivist activity remains limited, with only a small number of identified groups and few maintaining an active public presence. Those that do, such as Predatory Sparrow and Lefaroll, focus primarily on sharing military updates and challenging narratives from opposing groups, rather than claiming frequent compromises.
Predatory Sparrow has, however, engaged in some cyber operations, as evidenced by the release of what it described as classified documents from the Iranian Parliament, allegedly revealing plans to strengthen the IRGC against the US. This leak is likely to heighten tensions between Tehran and Washington, especially following the recent breakdown of nuclear negotiations.
The group also claimed responsibility for a wiper attack on Bank Sepah in Iran, which reportedly disrupted basic banking services, including withdrawals and account access. The group also claimed to have compromised the cryptocurrency exchange Nobitex, which, like Bank Sepah, is assessed to play a role in helping Iran evade international sanctions. These incidents stand out due to their relatively high impact compared to typical hacktivist operations. Predatory Sparrow also drew attention to the Wikipedia page of the Tehran Stock Exchange, indicating a realistic possibility for targeting occurring in the short term.
As of 18 June, there has been no evidence of pro-Israeli hacktivist attacks outside the region.
Hacktivist activity is almost certain to continue as the conflict between Israel and Iran unfolds. While pro-Israeli groups have demonstrated the capability to conduct more advanced and disruptive operations due to their assessed state backing, most operations are expected to remain symbolic, with low-impact campaigns such as DDoS attacks dominating the landscape.
SecAlliance provides detailed and timely analysis to clients via our dedicated ThreatMatch platform and bespoke intelligence outputs. For more information, please contact info@secalliance.com