{"id":344327,"date":"2025-08-06T09:45:00","date_gmt":"2025-08-06T16:45:00","guid":{"rendered":"https:\/\/cms-articles.softonic.io\/es\/?p=392324"},"modified":"2025-08-06T09:53:14","modified_gmt":"2025-08-06T16:53:14","slug":"iran-could-be-much-more-active-in-the-hacker-sphere-than-we-assumed","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/iran-could-be-much-more-active-in-the-hacker-sphere-than-we-assumed\/","title":{"rendered":"Iran could be much more active in the hacker sphere than we assumed"},"content":{"rendered":"\n<p>A comprehensive analysis of 250,000 active messages among Iranian hacktivist groups during a recent 12-day conflict with Israel has revealed a remarkable level of coordination and agility in their operations. According to the report by SecurityScorecard, <strong>more than 178 groups that encompassed a wide range of tactics, from propaganda to cyberattacks, managed to articulate their efforts quickly and strategically<\/strong>.<\/p>\n\n\n<h2 class=\"wp-block-heading\">Israel has taken many things for granted<\/h2>\n\n\n<p>The analyst Nima Khorrami, from NSSG Global, highlighted that this conflict marked a turning point in Iran&#8217;s cyber strategy, <strong>showcasing a greater integration of digital tools across military, political, and psychological domains<\/strong>. The harmonized response of these groups not only had offensive purposes but also aimed to shape the informational environment amid the conflict.<\/p>\n\n\n<p>Despite this cyber deployment, some experts have questioned the real effectiveness of the operations. <strong>Nikita Shah, from the Atlantic Council, argued that<\/strong> cyber activity, while significant<strong>, did not generate decisive advantages in the military realm<\/strong>. Instead, the most notable impact of these actions has been on the civilian population, where the collateral effects were more visible than any change in the balance of power in the conflict.<\/p>\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Examining Russia\u2019s assault on Ukraine\u2019s cultural heritage\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/MnZMcNcdbvo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<p>One of the most active groups, known as Imperial Kitten (or Tortoiseshell), adjusted its cyberattack tactics as physical combat intensified, incorporating phishing techniques developed in response to the situation. <strong>This indicates that these organizations have planning cycles that quickly adapt to changes on the ground<\/strong>.<\/p>\n\n\n<p>As tensions continue, the U.S. government has issued warnings about the possible consequences of these cyber operations, suggesting that espionage and digital attacks could escalate in the future. However, <strong>the real effectiveness and impact of these actions remain a subject of debate among analysts<\/strong>.<\/p>\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Avast Free Antivirus\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/2d9f9134-96d0-11e6-bf8f-00163ec9f5fa\/1408299994\/avast-Avast_Symbol_V2_Positive_Orange_256x256.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Avast Free Antivirus<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/avast.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/avast.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A comprehensive analysis of 250,000 active messages among Iranian hacktivist groups during a recent 12-day conflict with Israel has revealed a remarkable level of coordination and agility in their operations. According to the SecurityScorecard report, more than 178 groups encompassing a wide range of tactics, from propaganda to cyberattacks, managed to articulate their efforts quickly and strategically. Israel has taken many things for granted. Analyst Nima Khorrami from NSSG Global highlighted that this conflict marked a turning point in Iran&#8217;s cyber strategy, evidencing greater integration of digital tools to [&#8230;]<\/p>\n","protected":false},"author":9318,"featured_media":344328,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015,11143],"tags":[14718,5605,14719,14720,12298,14721],"usertag":[],"vertical":[],"content-category":[7176],"class_list":["post-344327","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-softwaresecurity","tag-analisis-2","tag-ciberseguridad","tag-combate-fisico","tag-imperial-kitten","tag-iran","tag-securityscorecard","content-category-seguridad-privacidad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/344327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9318"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=344327"}],"version-history":[{"count":2,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/344327\/revisions"}],"predecessor-version":[{"id":344332,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/344327\/revisions\/344332"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/344328"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=344327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=344327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=344327"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=344327"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=344327"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=344327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}