Iran’s Cyber Strategy and the Israel-Iran Conflict

Published by:
Riam Kim-McLeod
Published on:
June 13, 2025

Iran’s Cyber Strategy and the Israel-Iran Conflict

In the early hours of 13 June 2025, Israel launched a series of military strikes on Iran, targeting nuclear facilities and resulting in the deaths of several high-ranking leaders within Iran’s military. This escalation marked a pivotal moment in the longstanding rivalry between the two nations, further pushing the conflict from proxy confrontation and covert destabilisation into open and highly visible hostilities. While the physical consequences of the Israeli strikes have dominated headlines, these events also signal the imminent possibility of Iranian cyber operations, both as a tool for Iranian retaliation and as a front for wider strategic competition.

Cyber conflict between Iran and Israel is not new; both states have spent the past decade engaging in cyber espionage, sabotage, influence campaigns, and attacks on critical infrastructure. However, by raising the stakes in the conflict, these strikes intensify Iran’s motivation to respond not just militarily, but digitally—since cyberattacks offer Tehran a means to strike back without risking further direct military escalation. As international attention remains fixed on the fallout from the airstrikes, the cyber domain is poised to become an even more prominent battleground, raising concerns for governments, enterprises, and ordinary citizens far beyond the region.

Against this backdrop, understanding Iran’s cyber strategy allows us to unpack possible responses to conflict. Below, we examine the key drivers of Iranian cyber operations, the structure of its state-sponsored cyber apparatus, and the broader global implications for the escalation of both a physical and cyber conflict between Israel and Iran.

Key Strategic Drivers Behind Iran’s Cyber Operations

1. Preserving the Regime

Since the 1979 Islamic Revolution, the Iranian state has aimed to safeguard the ruling regime. This defence extends to countering perceived threats from Western governments, regional adversaries, domestic dissidents, and the Iranian diaspora (many of whom oppose the regime). As a result, Iranian cyber efforts frequently target opposition groups and foreign states to collect strategic intelligence. This motivation also underpins the regime’s pursuit of a nuclear programme, which has made it both a target of cyber attacks and a perpetrator of retaliatory cyber operations.

2. Promoting Economic Growth

Iran’s economic development faces considerable obstacles due to Western sanctions, which restrict trade and international cooperation. In response, Iranian cyber actors have engaged in stealing data, intellectual property, and technological know-how to advance the country’s scientific and industrial sectors.

3. Ensuring Ideological Security

Preserving the principles of the Islamic Revolution remains central to the regime. Thus, Tehran uses cyber tools—such as surveillance, spyware, and data theft—to monitor and suppress internal dissent, as well as to target activities it views as culturally or morally subversive, as witnessed during widespread protests in 2022.

4. Countering Israel

Relations between Iran and Israel have become especially hostile since 1979. This conflict is rooted in ideological, religious, and geopolitical factors, as well as issues connected to Israel’s nuclear capabilities and the ongoing Israel-Hamas conflict. Both countries engage in ongoing cyber and proxy warfare, which escalated into direct confrontation following the exchange of airstrikes in April 2024. Iranian cyber campaigns against Israeli entities focus on espionage, infrastructure disruption, and attempts to influence both Israeli and global public opinion.

5. Expanding Regional Influence

Iran, as a Shi’a theocracy, competes with Sunni-majority states such as Saudi Arabia for influence across the Middle East. Iranian cyber activities have targeted Sunni rivals and supported political proxies in countries with significant Shi’a populations (including Iraq, Syria, Lebanon, Bahrain, Yemen, and to some extent Azerbaijan). This extends to cooperation with cyber actors associated with these groups.

Organisational Structure of Iran’s Cyber Apparatus

Iran’s cyber activities are conducted by several interconnected agencies and councils, which report to varying government offices, including the president, the supreme leader, and the Secretary of the Supreme National Security Council (SNSC). Most notable are the Ministry of Intelligence and Security (MOIS) and the Islamic Revolutionary Guard Corps (IRGC). Cyber activity conducted by Iran in response to the escalating conflict is most likely to be associated with one or both of these organisations.

Ministry of Intelligence and Security (MOIS)

The MOIS is Iran’s civilian intelligence agency charged with intelligence collection both domestically and abroad, counterintelligence, and surveillance of domestic opponents. Notable associated cyber threat groups include:

  • MuddyWater: Focuses on cyberespionage, primarily in the Middle East and Africa, but has been linked to ransomware deployment by the Israeli government.
  • APT34: Noted for use of destructive wiper malware.
  • Agrius: Known for the deployment of ransomware and wiper malware, particularly against Israeli entities.
  • Void Manticore: Often masquerading as hacktivist groups, they have targeted Israeli entities with destructive wiper malware and participated in amplifying attack narratives.

Islamic Revolutionary Guard Corps (IRGC)

The IRGC is tasked with the broad remit of defending the revolution from foreign and domestic threats. It frequently engages in more globally reaching operations than MOIS-linked actors. Its noteworthy cyber divisions include the following:

  • Charming Kitten (APT35, APT42): Specialises in long-term intelligence gathering and targeted phishing campaigns, respectively.
  • APT33: Engages in cyberespionage campaigns against critical infrastructure and is positioned to conduct election-related influence campaigns.  
  • Fox Kitten: Noted for espionage, hack-and-leak schemes, and ransomware deployment.
  • Storm-0784 (CyberAv3ngers/Soldiers of Solomon): Actors that masquerade as hacktivists, they have been linked to disruptive attacks and attacks on operational technology (OT) systems.  
  • Emennet Pasargad: Runs influence operations, aiming to affect foreign perceptions and possibly conduct election interference.  

Implications of Israel’s Recent Attack

The Israeli airstrikes mark a significant escalation in the ongoing conflict. In the cyber domain, such acts may trigger an intensified cycle of retaliation. Iran’s use of cyber attacks has at times been disruptive or destructive, but it generally follows a “tit-for-tat” logic—it often retaliates in response to perceived aggression rather than acting purely pre-emptively.  

Iran is therefore expected to ramp up its cyber operations, especially against Israeli critical infrastructure, government entities, private sector organisations, and public opinion. These operations may also extend to Israeli allies or Western interests perceived as supporting Israel. Although the direct targeting of Western organisations is highly unlikely, organisations globally may also feel knock-on effects if Israel’s national state of emergency and subsequent mobilisation of military reservists impact cybersecurity services provided by Israeli companies.

While Iran does not have access to the same level of technological resources as Russia and China, it has consistently demonstrated a commitment to leveraging cyber operations to counterbalance its military, diplomatic and economic isolation. As digital threats become ever more entwined with geopolitical tensions, understanding Iran’s cyber strategy is essential for governments, organisations, and individuals alike to protect and respond to politically motivated cyber threats.  

SecAlliance produces monthly Geopolitical analysis and bi-annual PESTLE-M Horizon Scanning for the cyber domain that is released to its ‘ThreatMatch Access’ clients. For details on ThreatMatch subscriptions please contact info@secalliance.com