Escalating the Digital Battlefield: Iran and Israel's Online Confrontation

Amidst escalating geopolitical tensions, a new frontier of conflict is unfolding between Iran and Israel, waged not with conventional arms, but with bits and bytes. As missile alerts sounded across Israel, thousands of its citizens received text messages, purportedly from the IDF, luring them to download a fake anti-missile shelter app. This was later exposed as a ruse designed to pilfer vast amounts of personal data.

The messages did not stop there, evolving into mass intimidation campaigns, described by some as "cyber terror messages." One chilling missive declared: "Netanyahu is dead. Death is upon you, and the gates of hell are opening for you. Leave Palestine before Iran's missile fire consumes you." According to cybersecurity experts, these tactics represent merely the tip of the iceberg in the large-scale cyber war Iran, Israel, the United States, and their digital proxies are engaged in, deep within the internet.

Iran's Cyber Army: A Potent Force in the Digital Shadows

While Iran's hackers may operate keyboards rather than rifles, they constitute one of Tehran's most battle-hardened operational forces. For years, they have engaged in repeated clashes with Israel in the digital dark. "The Iranians are going all out," stated Chris Krebs, former Director of the Cybersecurity and Infrastructure Security Agency (CISA) and one of the top US civilian cybersecurity officials. "Everyone is on deck. As long as these cyber warriors are breathing, they will be at their keyboards."

The objectives of these attacks are diverse, encompassing the creation of panic, sowing chaos, mass intelligence gathering, and pinpointing missile strike coordinates. In the murky realm of cyber warfare, it's often difficult to ascertain who holds the upper hand. However, victories in cyberspace are crucial for shaping public opinion and demoralizing the enemy. This drives Iran's substantial investment in attempting to breach American and Israeli firewalls.

The Iranian Cyber Apparatus: A Complex Network of Actors

Analysts and former officials indicate that Iran's most elite cyber units operate under the direct command of the Islamic Revolutionary Guard Corps (IRGC) and Iran's Ministry of Intelligence. These entities manage numerous front organizations, providing plausible deniability for cyber operations and issuing public threats. Furthermore, Iran employs semi-independent hacker proxies, cybercriminals, and outsourced personnel. Volunteer hacker activists are also frequently mobilized to support Tehran's campaigns.

Multiple governments and cybersecurity experts believe Iranian operatives have exposed the personal information of employees of a major US defense contractor working in Israel, infiltrated the emails of politicians in Albania (which hosts an Iranian opposition group), and penetrated a Polish nuclear research center. The majority of their highly sensitive espionage activities likely remain undisclosed.

Among Iran's most destructive attacks to date was the targeting of Stryker, a multi-billion dollar American medical technology firm serving clients like the UK's National Health Service (NHS). Earlier this month, thousands of the company's employees were forced to halt work due to locked computers, disrupting the supply of critical medical equipment and causing surgeries to be postponed. Cybersecurity research firms and the US government have identified Handala, a hacking group linked to Iranian intelligence, as claiming to have wiped approximately 200,000 devices. Krebs described this as the most impactful wartime cyber attack against the US.

Handala also claimed to have breached the private email of FBI Director Kash Patel and released his personal photos. The FBI confirmed its email had been attacked by "malicious actors" but stated the leaked information consisted of "historical data."

US and Israeli Cyber Offensives: Strategic Attacks

The current military conflict has further intensified the multi-year cyber offense-defense tug-of-war between the three nations. The US and Israel possess formidable cyber attack capabilities, often delivering more significant strategic blows than Iran, such as the Stuxnet worm revealed in 2009, which severely crippled Iran's nuclear program.

Gen. Dan Caine, Chairman of the US Joint Chiefs of Staff, stated that on the eve of the first airstrikes against Iran last month, the US launched cyber attacks "to disrupt, degrade, and disable Iran's reconnaissance, communications, and counterattack capabilities."

In the war, Israel delivered a critical blow: years prior, it had hacked into nearly all of Tehran's traffic cameras, laying the groundwork for a large-scale intelligence operation aimed at assassinating Supreme Leader Ali Khamenei. According to media reports, Israel also utilized a popular Iranian religious app to push surrender notifications to millions of users, with one message stating: "Only in this way can you save the lives of the Iranian people."

Iran's Asymmetric Approach: Overcoming Technological Gaps

Compared to Russia, Iran's technological sophistication is relatively limited, often relying on phishing attacks and crude, "wiper" malware to delete target data. However, Iran has long leveraged cyber attacks as a low-cost means of asymmetric warfare against more powerful adversaries, aiming to create disruption and paralyze operations. In 2022, parts of the Israeli media accused Iranian hackers of infiltrating the old mobile phone of the wife of Mossad chief David Barnea and leaking his alleged personal information on Telegram.

Alexander Leslie of Recorded Future, a cybersecurity firm, stated that Iran is fighting a two-front war in this conflict. On one hand, it utilizes high-profile hacker organizations and proxies to attack soft targets and wage psychological warfare. On the other hand, its more threatening core organizations maintain a low profile. Analysts suggest top operatives are systematically searching for vulnerabilities, seeking entry points, and infiltrating target networks.

"The loudest operations are not necessarily the most important," Leslie remarked. Symantec data indicates that Seedworm, an organization identified by the US and UK as being linked to Iranian intelligence, has been persistently attempting to infiltrate US networks since early February, having been repelled by a US bank, an airport, and a defense software supplier. However, Iran appears to be concentrating its efforts on breaching Israel's defenses, which are more robust than those of the US.

Israeli authorities claim Iran has launched thousands of "wiper" attacks against Israeli businesses, with approximately 50 successful incursions. Gil Messing of Israeli cybersecurity firm Check Point stated that Iranian hackers have compromised security cameras in Israel and Gulf states, providing target guidance for drone and missile strikes. Tehran is also integrating its cyber capabilities with conventional military operations. Messing noted that Iranian hackers are combining cyber attacks with mass intimidation texts, demonstrating a new level of "scale, effect, and sophistication.""

Why Not Strike Critical Infrastructure? An In-Depth Analysis

Despite considerable disruption, some analysts have surprisingly noted Iran's absence of attacks on more decisive strategic targets. Tehran has previously targeted critical infrastructure like US and Israeli water treatment plants but has not undertaken similar actions in the current conflict. Several reasons might explain this: Early Israeli strikes could have degraded Iran's cyber capabilities; Iran's domestic internet censorship may have constrained its own hackers; and the development of complex malware required for large-scale attacks is time-consuming.

It is also possible that Iran has secretly infiltrated sensitive economic or military targets, patiently exfiltrating information. "They may have long-term access they don't want to reveal easily," commented Andy Piazza of cybersecurity firm Palo Alto Networks.

However, experts caution that US defense systems are not uniformly robust. "Given time and space to regroup, Iran is absolutely capable of developing more decisive attack vectors," stated Matthew Ferren of the Council on Foreign Relations.


Risk Warning: this article represents only the author’s views and is for reference only. It does not constitute investment advice or financial guidance, nor does it represent the stance of the Markets.com platform.When considering shares, indices, forex (foreign exchange) and commodities for trading and price predictions, remember that trading CFDs involves a significant degree of risk and could result in capital loss.Past performance is not indicative of any future results. This information is provided for informative purposes only and should not be construed to be investment advice. Trading cryptocurrency CFDs and spread bets is restricted for all UK retail clients. 

Latest news

Wednesday, 1 April 2026

Indices

Gold Price Today, April 2: XAU/USD Drops Over 1.5% to $4,686 After Hitting Recent Highs

Wednesday, 1 April 2026

Indices

Stock Market Today: Dow, S&P 500 & Nasdaq Futures Rise as Trump Issues Strong Iran Warning

Tuesday, 31 March 2026

Indices

Forex Market Today: Japanese Yen Recovers, USD/JPY Drops to 158.70 as Middle East Tensions Ease

Tuesday, 31 March 2026

Indices

Gold Price Today, April 1: XAU/USD Surges to $4,718 as Momentum Builds

Monday, 30 March 2026

Indices

Gold price today, March 31: Gold price (XAU/USD) climbs to $4,558 amid market rally

Monday, 30 March 2026

Indices

XRP news today: XRP price hovers at $1.32, Ripple reports record Q1 growth

Sunday, 29 March 2026

Indices

BTC News Today: Bitcoin Recovers to $67,400 After Sharp Dip Below $65,000

Sunday, 29 March 2026

Indices

Gold price today, March 30: Gold market is currently in a corrective phase, XAU/USD rises to $4,568.50

Tuesday, 24 March 2026

Indices

NVIDIA GTC 2026 Keynote Highlights: Jensen Huang Predicts $1 Trillion AI Demand Through 2027

Tuesday, 24 March 2026

Indices

Top performing cryptos today: Siren (SIREN), Bittensor (TAO), Stellar (XLM)