ThreatCluster
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Cluster #1763

IRGC-Linked Hackers Target Financial, Government, and Media Organizations

Threat Score:
74
3 articles
81.0% similarity
5 hours ago
JSON CSV Text STIX IoCs
Splunk Elastic Sentinel Sigma YARA All Queries

Activity Timeline

3 articles
Click to navigate
Aug 05
Aug 07
Aug 07
Oldest
Latest

Key Insights

1
A coordinated cyber offensive by IRGC-linked hackers targeted financial institutions, government agencies, and media organizations during the 12-day conflict between Israel and Iran in June 2025, with operations spanning multiple countries.
2
Analysis by SecurityScorecard revealed over 250,000 messages exchanged among 178 active hacker groups, indicating a high level of organization and strategic focus on exploiting vulnerabilities.
3
The cyber operations utilized advanced techniques, including reconnaissance, vulnerability scanning for zero-day exploits, and deployment of custom malware timed with military actions, demonstrating a fusion of cyber and kinetic warfare.
4
Attacks employed weaponized phishing campaigns and social engineering tactics to manipulate emotional responses related to the conflict, amplifying ideological narratives and undermining adversaries.
5
Three categories of threat actors were identified: loosely affiliated hacktivists, structured IRGC-aligned cyber units, and independent operatives, each contributing to the coordinated attacks.
6
The campaign's integration of cyber tactics with military strategies represents a new paradigm in warfare, with implications for future conflicts and the security of critical infrastructure globally.

Threat Overview

In June 2025, a sophisticated network of hackers linked to Iran's Islamic Revolutionary Guard Corps (IRGC) launched a series of coordinated cyber attacks against financial, government, and media organizations worldwide. This campaign coincided with military operations during a 12-day conflict between Israel and Iran, marking a significant escalation in the use of cyber warfare alongside traditional military tactics. 'The integration of cyber operations with military actions represents a new form of warfare,' stated a cybersecurity analyst from SecurityScorecard. The offensive involved over 250,000 messages exchanged among 178 active groups, showcasing unprecedented coordination and strategic focus.

The attacks utilized advanced reconnaissance techniques, vulnerability scanning for zero-day exploits, and deployment of custom malware scripts, all timed to coincide with military airstrikes and border incursions. 'These operations reflect a new paradigm where cyber tactics are not just supplementary but integral to military strategy,' noted a researcher involved in the analysis. The attackers employed weaponized phishing domains and social engineering tactics designed to exploit emotional vulnerabilities associated with the conflict, effectively propagating ideological narratives and intimidating adversaries.

SecurityScorecard identified three categories of threat actors involved in the campaign: loosely affiliated hacktivists acting independently but aligned with IRGC objectives, structured cyber units directly operating under IRGC oversight, and independent operatives motivated by ideological beliefs. The hackers utilized platforms like Telegram for coordination, enabling rapid responses to the evolving conflict dynamics. This approach allowed them to synchronize cyber operations with military movements, disrupting adversarial communications and stealing sensitive data.

The technical analysis highlighted the use of various tactics, including reconnaissance and exploitation of vulnerabilities in critical infrastructure. 'The coordinated nature of these attacks underscores the necessity for heightened vigilance across sectors,' said a cybersecurity expert. Specific vulnerabilities targeted included weaknesses in financial systems and government platforms, with attackers employing custom malware that exploited these gaps.

In response to the ongoing threat, the cybersecurity community has begun to implement defensive measures, including enhanced monitoring of network traffic and the deployment of updated security protocols. Security vendors are advising organizations to bolster their defenses against such coordinated attacks. 'Organizations must remain proactive in their cybersecurity measures, particularly during periods of geopolitical tension,' emphasized a senior cybersecurity official.

Moving forward, organizations are encouraged to patch known vulnerabilities and enhance their incident response strategies. SecurityScorecard's findings serve as a critical reminder for entities to remain vigilant and prepared against cyber threats that may arise in conjunction with global conflicts.

Tactics, Techniques & Procedures (TTPs)

T1071.001
Application Layer Protocol - Attackers utilized Telegram for command and control, facilitating coordination among various hacking groups [2][3]
T1566.001
Spearphishing Attachment - Phishing campaigns embedded malicious files targeting financial and government sectors [1][2]
T1592
Gathering Information - Reconnaissance techniques were employed to identify vulnerabilities in critical infrastructure [2][3]
T1190
Exploit Public-Facing Application - Attackers exploited vulnerabilities in online platforms to gain unauthorized access [1]
T1070.001
Indicator Removal on Host - Custom malware designed to erase traces post-exploitation [2]
T1563
Network Denial of Service - Coordinated attacks aimed at disrupting communications and services [2][4]
T1086
PowerShell - Custom scripts deployed via PowerShell for lateral movement within compromised networks [1]

Timeline of Events

2025-06-01
Tensions escalate between Israel and Iran, leading to increased military presence [1]
2025-06-10
IRGC-linked hackers begin reconnaissance efforts on financial and government systems [2]
2025-06-15
Cyber offensive launches, coinciding with military airstrikes [1]
2025-06-20
SecurityScorecard detects unusual patterns of communication among hacker groups [2]
2025-06-25
Coordinated attacks result in significant data breaches and disruption of services [3]
2025-06-30
Analysis of the attacks reveals over 250,000 messages exchanged among active groups [2]
2025-07-05
Cybersecurity community issues alerts regarding ongoing threats and vulnerabilities [4]

Source Citations

expert_quotes: {'Cybersecurity expert': 'Article 2', 'SecurityScorecard analyst': 'Article 1', 'Senior cybersecurity official': 'Article 4'}
primary_findings: {'Threat actor analysis': 'Articles 2, 3', 'Coordinated cyber attacks': 'Articles 1, 2', 'Impact on critical infrastructure': 'Articles 1, 4'}
technical_details: {'Attack methods': 'Articles 1, 2, 3', 'Vulnerabilities exploited': 'Articles 2, 3, 1'}
Powered by ThreatCluster AI
Generated 5 hours ago
Recent Analysis
AI analysis may contain inaccuracies

Related Articles

3 articles
1

IRGC-Linked Hackers Target Financial, Government, and Media Organizations

GB Hackers • 7 hours ago

IRGC-Linked Hackers Target Financial, Government, and Media Organizations A sophisticated network of hackers with ties to Iran’s Islamic Revolutionary Guard Corps (IRGC) unleashed a barrage of cyber-operations designed to disrupt adversaries, steal sensitive data, and propagate ideological narratives. SecurityScorecard’s STRIKE threat intelligence team analyzed over 250,000 messages from 178 active groups, revealing a highly coordinated digital campaign that mirrored military actions on the grou

Score
79
94.0% similarity
Read more
2

IRGC Hacker Groups Attacking Targeted Financial, Government, and Media Organizations

Cybersecurity News • 7 hours ago

During the 12-day conflict between Israel and Iran in June 2025, a sophisticated network of Iranian-linked cyber threat actors launched coordinated digital operations against critical infrastructure sectors worldwide. The campaign demonstrated unprecedented coordination between military operations and state- cyberattacks, targeting financial institutions, government agencies, and media organizations across multiple countries. The cyber offensive involved a […]

Score
76
95.0% similarity
Read more
3

Pro-Iran Hackers Aligned Cyber with Kinetic War Aims

Infosecurity Magazine • 2 days ago

SecurityScorecard analysis highlights wide variety of Iranian threat actors and coordination with military activity

Score
57
91.0% similarity
Read more

Save to Folder

Choose a folder to save this cluster:

Cluster Intelligence

Key entities and indicators for this cluster

INDUSTRIES
Financial Services
Government
APT GROUPS
IRGC
MITRE ATT&CK
T1071
T1070
T1566
T1592
T1563
ATTACK TYPES
Data Breach
Cyber Operations
Phishing
COMPANIES
SecurityScorecard
COUNTRIES
Israel
CLUSTER INFORMATION
Cluster #1763
Created 5 hours ago
Semantic Algorithm

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration