CyberCX Hack Report: Insights from a year of offensive security testing

Middle East conflict: Cyber impacts of Iran-Israel military escalation

Intelligence Update

conflict

Published by Cyber Intelligence 16 April 2024

 

Recent direct conflict between Iran and Israel is a significant escalation in Middle East hostilities and a material change in Iran-Israel conflict. This development has cyber implications for organisations globally, including in Australia, New Zealand, the UK and US. This Intelligence Update updates CyberCX Intelligence Update: Hamas-Israel conflict, issued on 10 October 2023.

 

Key Points

 

Background

 

Figure 1: Timeline of Iran-Israel confrontation, April 2024

 

 

Heightened disruptive and destructive cyber threat in Israel, Iran and surrounding region

 

Changes to cyber threat for organisations outside the conflict region


Organisations outside of the conflict region face the following heightened cyber risks:


 

Ideologically motivated threats persist

 

Figure 2. Geographic breakdown of anti-Israel channels tracked by CyberCX Intelligence

 

 

Figure 3. Sample targeting of western organisations by groups motivated by the Hamas-Israel conflict in 2024

 

 


[1] This assessment is made with moderate confidence.

[2] This assessment is made with moderate confidence.

[3] In February 2024, Google reported that Iranian nation-state actors conducted cyber-enabled espionage and pre-positioning in Israeli networks for years in the lead up to the breakout of the October 2023 Hamas-Israel war. See: https://blog.google/technology/safety-security/tool-of-first-resort-israel-hamas-war-in-cyber/

[4] As recently as February 2024, the Albanian government, supported by NATO, the UK and US, attributed cyber attacks on government organisations to Iran, following longstanding diplomatic conflict.

[5] https://www.sentinelone.com/labs/acidpour-new-embedded-wiper-variant-of-acidrain-appears-in-ukraine/

[6] See: A bear in wolf’s clothing: Insights into the infrastructure used by Anonymous Sudan to attack Australian organisations | CyberCX



Guide to CyberCX Intelligence reporting language

CyberCX Cyber Intelligence uses probability estimates and confidence indicators to enable readers to take appropriate action based on our intelligence and assessments.  

Probability estimates – reflect our estimate of the likelihood an event or development occurs
Remote chance Highly unlikely Unlikely Real chance Likely Highly likely Almost certain 
Less than 5%  5-20%  20-40%  40-55%  55-80%  80-95%  95% or higher 

Note, if we are unable to fully assess the likelihood of an event (for example, where information does not exist or is low-quality) we may use language like “may be” or “suggest”.  

Confidence levels – reflect the validity and accuracy of our assessments
Low confidence Moderate confidence High confidence
Assessment based on information that is not from a trusted source and/or that our analysts are unable to corroborate.  Assessment based on credible information that is not sufficiently corroborated, or that could be interpreted in various ways.  Assessment based on high-quality information that our analysts can corroborate from multiple, different sources. 

 

Other Cyber Security Resources

CycberCx CTA Background

Ready to get started?

Find out how CyberCX can help your organisation manage risk, respond to incidents and build cyber resilience.