Hacktivist campaigns increase as United States, Iran, and Israel conflict intensifies
Following coordinated military strikes by the U.S. and Israel against Iran, there has been a significant surge in hacktivist activity. Pro-Iran groups are conducting website defacements, DDoS attacks, doxxing, and claiming unverified attacks on critical infrastructure, while pro-Israel groups are retaliating, elevating the cyber threat landscape for organizations in the U.S., Israel, and the Middle East.
Authors: Sophos Counter Threat Unit Research Team
Source:Sophos
- urlhxxp://handala-redwanted[.]toHandala Hack Team 'RedWanted' doxxing and leak site
Key Takeaways
- Elevated hacktivist activity observed following U.S. and Israeli military strikes on Iran in February 2026.
- Pro-Iran groups like Handala Hack Team and APTIran are claiming unverified attacks on Israeli critical infrastructure and doxxing individuals.
- BaqiyatLock (BQTlock) RaaS is offering free affiliate memberships to hacktivists targeting Israel.
- Pro-Israel groups like Troll Hacker Team are conducting counter-operations, claiming to take down Iranian hacktivist infrastructure.
- Organizations in the U.S., Israel, and GCC states face an elevated risk of retaliatory cyberattacks.
Affected Systems
- Israeli government and military networks
- Israeli critical infrastructure (water control, oil and gas)
- U.S. organizations
- Gulf Cooperation Council (GCC) States organizations
Attack Chain
Hacktivist groups are leveraging the geopolitical conflict to launch retaliatory cyber operations. Initial activities primarily involve low-sophistication attacks such as website defacements, DDoS, and doxxing campaigns against targeted individuals. Some groups are amplifying their impact by offering Ransomware-as-a-Service (RaaS) tools to affiliates for targeted disruption, while others claim unverified access to Operational Technology (OT) layers in critical infrastructure.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
No specific detection rules or queries are provided in the article.
Detection Engineering Assessment
EDR Visibility: Medium — EDR solutions can detect ransomware payloads like BaqiyatLock, but DDoS and website defacements occur primarily at the network and web-tier levels. Network Visibility: High — DDoS attacks and web defacements are highly visible at the network edge and through Web Application Firewalls (WAF). Detection Difficulty: Moderate — While the impact of DDoS and defacements is easily detected, attributing these attacks to specific hacktivist groups amid geopolitical noise can be challenging.
Required Log Sources
- Web Application Firewall (WAF) logs
- Network flow logs
- Endpoint EDR telemetry
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Monitor for sudden, sustained spikes in inbound network traffic targeting public-facing web applications, indicating potential DDoS activity. | Network flow logs, WAF logs | Impact | Medium |
| Search for unauthorized modifications to external-facing web server directories or unexpected changes to index files, which may indicate website defacement. | Web server logs, File Integrity Monitoring (FIM) | Impact | Low |
| Look for execution of known ransomware payloads or unauthorized mass encryption of files, particularly linked to the BaqiyatLock RaaS. | EDR, Windows Event Logs | Impact | Low |
Control Gaps
- Lack of robust DDoS mitigation services
- Unpatched internet-facing vulnerabilities
Key Behavioral Indicators
- High volume of traffic from unexpected geolocations
- Unexpected changes to web root files
- Spikes in failed authentication attempts (password spraying)
False Positive Assessment
- Low
Recommendations
Immediate Mitigation
- Expedite patching of internet-facing systems, prioritizing vulnerabilities listed in CISA's Known Exploited Vulnerabilities (KEV) Catalog.
- Minimize internet-facing services to reduce the available attack surface.
Infrastructure Hardening
- Implement and maintain robust DDoS mitigation services.
- Ensure Web Application Firewalls (WAF) are properly configured and updated.
User Protection
- Maintain awareness for topical phishing campaigns and password-spraying activity.
- Implement and monitor Endpoint Detection and Response (EDR) and Antivirus solutions.
Security Awareness
- Review and update business continuity plans and restoration processes to address potential ransomware or wiper malware attacks.
MITRE ATT&CK Mapping
- T1498 - Network Denial of Service
- T1491.002 - Defacement: External Defacement
- T1486 - Data Encrypted for Impact
- T1583.006 - Acquire Infrastructure: Web Services
Additional IOCs
- Domains:
handala-redwanted[.]to- Domain for Handala Hack Team 'RedWanted' site
- Urls:
hxxp://handala-redwanted[.]to- URL for Handala Hack Team 'RedWanted' site
- Other:
@HANDALA_RSS- X (Twitter) handle for Handala Hack Team@ZeroDayX1- Telegram contact for BaqiyatLock RaaS