Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War
    Cybersecurity

    Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

    adminBy adminMarch 13, 2026No Comments6 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Iranian Hackers
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Pro-Iranian hackers are targeting sites in the Middle East and starting to stretch into the United States during the war, raising the risk of American defense contractors, power stations and water plants being swept into a wave of digital chaos that could expand if Tehran’s allies join the fray.

    Hackers supporting Iran claimed responsibility for a significant cyberattack Wednesday against U.S. medical device company Stryker. Since the war began Feb. 28, they also have tried to penetrate cameras in Middle Eastern countries to improve Iran’s missile targeting. They have targeted data centers in the region, as well as industrial facilities in Israel, a school in Saudi Arabia and an airport in Kuwait.

    Iran has invested heavily in its offensive cyber capabilities while cultivating ties to hacking groups. In recent years, groups working for Tehran have infiltrated the email system of President Donald Trump’s campaign, targeted U.S. water plants and tried to breach the networks used by the military and defense contractors.

    The goal is to wear down the American war effort, drive up the costs of energy, strain cyber resources and cause as much pain as possible for American companies that depend on the defense industry.

    “Something is going to happen because the gloves are off,” said Kevin Mandia, founder of the cybersecurity companies Mandiant and Armadin.

    Who is being targeted

    Pro-Iranian, pro-Palestinian hackers claimed credit for disrupting systems at Stryker, a Michigan-based medical technology company. A group known as Handala said the attack was in retaliation for suspected U.S. strikes that killed Iranian schoolchildren.

    Advertisement. Scroll to continue reading.

    Like other ideologically motivated hackers, profit is not Handala’s goal, according to Ismael Valenzuela, vice president of threat intelligence at the cybersecurity company Arctic Wolf.

    “What distinguishes this group is its clear focus on data destruction rather than financial extortion,” he said in an email.

    Polish authorities are investigating a recent cyberattack — on a nuclear research facility — that may have ties to Iran, though they acknowledge that another group could be behind the attack and using the Iran war to mask its identity.

    Going forward, U.S. defense contractors, government vendors and businesses that work with Israel are likely targets, as is critical infrastructure such as hospitals, ports, water plants, power stations and railways.

    Pro-Iranian hackers openly discuss their plans in Telegram and other online message boards.

    “The datacenters need to be taken out,” wrote one user, as uncovered by researchers at U.S.-based SITE Intelligence Group. “They host the brains of USAs military communication and targeting systems.”

    Cyber operations also gather intelligence — for example, Iran’s effort to hack into cameras in neighboring countries to aid its missile targeting. Infiltrating U.S. networks, meanwhile, would offer view into military planning or supply chains.

    Going after easy targets

    The strikes on Iran’s military as well as internet outages may have limited Iran’s cyberattacks in the short term. But experts say Iranian hackers and their allies will aim for quick victories by targeting the weakest links in American cybersecurity.

    Often, local water plants or health care facilities lack the funds and know-how to install the latest software patches or take other security steps. That has made them a favorite target, both because of the relative ease of penetrating them and because of the panic these disruptions can cause.

    This can include denial-of-service attacks, in which hackers try to jam a network so legitimate users cannot use it, and website defacements, which can prevent a company from communicating with customers. Hack-and-leak operations, where hackers threaten to release sensitive stolen material, are another possibility.

    The attacks are not that sophisticated, according to Shaun Williams, a former FBI and CIA officer who is now a senior director at the cybersecurity firm SentinelOne. But if a business or government agency has failed to keep up with its cybersecurity, it could pay a steep price, he said.

    “Patch your systems. Ensure your firewalls and security solutions are up to date,” Williams said. “Remove your stale accounts. All the cyber hygiene that you should be doing, it’s more critical now than ever. Prepare for disruption.”

    When it comes to cyber, Iran is considered a chaos agent

    Russia and China present the greatest cyber threats to the U.S., while North Korea is a growing concern. But what Iran has lacked in resources it has made up for in ingenuity, experts say.

    In recent years, Tehran’s digital warriors have impersonated American activists online to covertly encourage protests against Israel on college campuses. They have set up fake news websites and social media accounts primed to spread false and exaggerated claims before big U.S. elections.

    In 2024, Iranian hackers infiltrated the email system of the Trump campaign and later tried to disseminate files that the hackers said they stole. Hackers linked to Iran also tried to hack into the WhatsApp accounts of both Trump and his then-Democratic opponent, President Joe Biden.

    The activity prompted the Department of Homeland Security to issue a public warning last year about Iranian cyber threats.

    “Iran and especially the proxies don’t care how big or smart you are. This is about making an impact, about creating chaos,” said James Turgal, a cybersecurity expert who spent 22 years as an FBI agent and is now a vice president at Optiv, a Denver-based information security firm.

    Next moves from Russia and China

    Experts are watching closely to see if Russia, China or hacking groups allied with either country provide hacking assistance to Iran, mounting attacks intended to undermine American operations in Iran and make it harder for the U.S. to sustain its fight.

    While China has so far taken a cautious approach, there is evidence that pro-Iranian hackers in Russia are already at work. Researchers at the cybersecurity firm CrowdStrike detected a surge of activity from Russian hackers in support of Tehran since the war began.

    One group known as Z-Pentest claimed responsibility for disrupting several U.S. networks, including some involved in closed-circuit video cameras.

    The timing of the attack suggests the hackers were targeting U.S. interests because of the war in Iran, according to Adam Meyers, head of counter adversary operations at CrowdStrike.

    “Western organizations should continue to remain on high-alert,” Meyers said.

    Aim Cyberattacks hackers IranLinked Raising risk Targets war
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleI turned on these 3 Android settings, and stealing my phone became almost pointless
    Next Article PDFs must die, but what can replace them?
    admin
    • Website

    Related Posts

    Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

    March 14, 2026

    Red Access firewall-native SSE adds GenAI security and browser protection to existing firewalls

    March 14, 2026

    FBI seeks victims of Steam games used to spread malware

    March 14, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    New Qualcomm GBL exploit brings bootloader unlocking to flagship Androids

    March 14, 2026

    Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

    March 14, 2026

    ‘Current’ Fixes My Biggest Issues With RSS Readers

    March 14, 2026

    Red Access firewall-native SSE adds GenAI security and browser protection to existing firewalls

    March 14, 2026
    Categories
    • Blogging (40)
    • Cybersecurity (770)
    • Privacy & Online Earning (120)
    • SEO & Digital Marketing (484)
    • Tech Tools & Mobile / Apps (942)
    • WiFi / Internet & Networking (129)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    New Qualcomm GBL exploit brings bootloader unlocking to flagship Androids

    March 14, 2026

    Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

    March 14, 2026

    ‘Current’ Fixes My Biggest Issues With RSS Readers

    March 14, 2026
    Most Popular
    • New Qualcomm GBL exploit brings bootloader unlocking to flagship Androids
    • Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
    • ‘Current’ Fixes My Biggest Issues With RSS Readers
    • Red Access firewall-native SSE adds GenAI security and browser protection to existing firewalls
    • FBI seeks victims of Steam games used to spread malware
    • Why surface-level SEO tactics won’t build lasting AI search visibility
    • This Supreme Court decision is bad news for Hollywood’s AI ambitions
    • Arista targets AI data centers with new liquid cooled pluggable optic module
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.