Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

March 4, 2026

AI and Deepfakes Supercharge Sophisticated Cyber-Attacks: Cloudflare

March 3, 2026

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

March 3, 2026
Facebook X (Twitter) Instagram
Wednesday, March 4
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity
News

Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity

Team-CWDBy Team-CWDMarch 3, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A sharp escalation in the Middle East has entered a hybrid phase blending military strikes with large-scale cyber operations, creating spillover risks for organizations in the region and globally.

The developments follow joint Israeli-US strikes on Iran on February 28, 2026, which were accompanied by what has been described as one of the largest cyber campaigns in history.

Cyber Escalation Follows Military Strikes

Coordinated strikes by Israel and the US targeted Iranian leadership, military and nuclear-linked sites over the last few days. According to CloudSek, in parallel, a sweeping cyber operation disrupted Iran’s digital infrastructure, with internet connectivity reportedly dropping to around 4% of normal levels.  However, the reason for this shutdown remains unconfirmed at the time of publication.

Government services, official media outlets and parts of the energy and aviation sectors were severely affected. The disruption coincided with retaliatory missile and drone attacks by Iran against Israeli territory and US regional bases.

Security experts expect cyber retaliation to intensify. Cynthia Kaiser, SVP at Halcyon and former FBI cyber executive, said, “Iran will likely respond in cyberspace. It will probably look like cybercrime and ransomware.”

She added, “Our Halcyon intel team is already seeing increased activity in the Middle East and calls to action from the distributed denial-of-service (DDoS) botnet HydraC2, hacktivist group Handala, and ransomware group Sicarii.”

Between February 28  and March 1, more than 150 hacktivist incidents were recorded across open channels. These operations largely involved DDoS attacks, website defacements and unverified data breach claims, targeting government, banking, aviation and telecom sectors.

Read more on Middle East cyber operations: SIM Swapping Fraud Surges in the Middle East

Ransomware and Obfuscation Tactics in Focus

Kaiser pointed to Iran’s previous campaigns as evidence of an established pattern. “Iran has a long track record of using cyber operations to retaliate against perceived political slights. From disabling US financial websites between 2011 and 2013, to erasing data from the Las Vegas Sands Casino in 2014, to defacing websites after the death of Iranian military commander Qasem Soleimani and issuing online death threats to US election officials in 2020 and 2021, Tehran’s cyber playbook has been aggressive and evolving.”

These actions highlight the ways that Iran could use attempted obfuscation, multiple actors and destructive tools against US networks in the coming weeks:

  • Deploying ransomware before wiping an organization’s data

  • Leveraging long-term espionage access and data exfiltration from different threat actors for destructive attacks

  • Hiding behind fictitious cybercriminal groups

  • Engaging in online harassment of victims, including the release of stolen data

Guidance For Organizations

The UK’s National Cyber Security Centre (NCSC) said there is currently no significant change in the direct cyber threat from Iran to the UK at present, though the situation remains fluid. It warned of a heightened indirect risk for organizations with offices or supply chains in the Middle East.

Organizations are urged to review their risk posture, increase monitoring, enforce multi-factor authentication (MFA) and ensure offline backups are in place.

Critical national infrastructure operators are also advised to revisit contingency plans and follow established guidance for severe cyber threats.

“Organizations are advised to review their risk posture, take proportionate action and report any concerning activity to the NCSC’s Incident Management team using Report a cyber incident,” the agency concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
Next Article Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
Team-CWD
  • Website

Related Posts

News

AI and Deepfakes Supercharge Sophisticated Cyber-Attacks: Cloudflare

March 3, 2026
News

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

March 3, 2026
News

RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App

March 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

2025’s most common passwords were as predictable as ever

January 21, 2026

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Why you should never pay to get paid

September 15, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.