Monitoring Cyberattacks Directly Linked to the US-Israel-Iran Military Conflict

April 04, 2026

This brief catalogues confirmed and credibly reported cyber operations directly linked to the escalating US-Israel-Iran military conflict spanning June 2025 through March 2026. The conflict has generated one of the most intensive periods of state-linked cyber warfare since the Russia-Ukraine war, with operations conducted by both sides across multiple domains including critical infrastructure, financial systems, communications networks, and social media platforms.

We will continue to update this timeline with the most recent information as the situation develops.

Key Findings – April 4, 2026

Key Findings

Updated April 4th, 2026

Check Point Research publishes Handala/Void Manticore TTP analysis; confirms NetBird tunnelling and AI-assisted wipers; Check Point Research published a detailed technical report on April 2 documenting Handala/Void Manticore tradecraft across multiple intrusions from 2024 to 2026. The report confirms the group now deploys NetBird to tunnel traffic into compromised networks, uses AI-assisted PowerShell scripts for wiping operations, and relies on sustained VPN brute-force for initial access. Hundreds of logon attempts against organisational VPN infrastructure were linked to Handala-associated infrastructure. The report also confirms that Void Manticore leadership figure Seyed Yahya Hosseini Panjaki, who supervised operations under the MOIS Counter-Terrorism Division, was killed during the opening phase of Israeli strikes in early March 2026. The Irish Examiner reported that the group was forced to reorganise after two prominent figures were killed.

Check Point Research, Apr 2; Irish Examiner; Wikipedia

313 Team claims four-hour DDoS shutdown of Amazon Saudi Arabia, timed to IRGC tech company deadline; 313 Team claimed a complete four-hour shutdown of Amazon Saudi Arabia (amazon.sa) on April 1, with Check-Host verification confirming full downtime during the claimed window. The attack coincided directly with the IRGC’s declared 8:00 pm Tehran time deadline against 18 US tech companies, including Amazon. The targeting represents a direct alignment between hacktivist operations and stated IRGC threat timelines.

Conflict dashboard monitoring, Apr 1; Check-Host verification; Telegram OSINT

Handala claims wiper attack on St. Joseph County, Indiana; 12TB allegedly erased; unverified; Handala claimed full control of St. Joseph County’s centralised IT infrastructure in Indiana on April 1, alleging extraction of 2TB of data from the Prosecutor’s Office, health centres, and police departments, and wiping of 12TB from main servers. Over 2,000 documents were published as alleged proof. The claim was posted on April 1. No independent confirmation has been issued by St. Joseph County or US federal agencies. The claim follows Handala’s established pattern of combining real intrusions with inflated impact statements.

Conflict dashboard monitoring, Apr 1; Telegram OSINT; ransomware.live

Hacktivist channels launch coordinated information operations around F-15E shoot-down; Iranian state media, Handala channels, and allied hacktivist Telegram groups amplified the F-15E Strike Eagle shoot-down on April 3 within hours of the event. The shoot-down was framed as evidence that Iranian air defences remain operational and was paired with earlier cyber breach claims to project a unified narrative of Iranian military and cyber capability. Videos of Iranian civilians firing on US rescue helicopters circulated across hacktivist networks. The information operation spanned at least a dozen established conflict-linked Telegram channels. The Pentagon confirmed 365 US service members wounded in action, with the death toll at 13.

NBC News, Apr 3; Military Times, Apr 3; CBS News, Apr 3; Telegram OSINT

Iran internet blackout enters Day 36; 816+ consecutive hours offline; connectivity at 1%; The internet blackout entered its 36th day on April 4 with connectivity at approximately 1% of normal levels. NetBlocks data indicates the blackout has now surpassed 816 hours. Iranians have spent roughly one third of 2026 in complete digital darkness. Only high-ranking officials and state media retain access through a whitelist system. The blackout continues to have no measurable impact on externally based proxy groups.

NetBlocks; The National; Iran International; Wikipedia

For customers seeking further details, please reach out to your Customer Success Manager, and for non-customers please reach out here.

US-Israel-Iran Conflict Timeline & Cyber Context

The cyber operations documented in this brief are responses to three major kinetic escalations:

Date Kinetic Event Cyber Response Pattern
June 13–25, 2025 Israel launches surprise attack on Iranian nuclear/military facilities; US strikes three nuclear sites on June 22 Immediate hacktivist surge with 120+ groups active; DDoS, wiper malware, financial theft, and website defacement
January 20–26, 2026 Pre-conflict escalation; large-scale scanning and credential harvesting reported by intelligence monitors Attacks on Iranian ports, power substations; Shamoon 4.0 variant strikes Saudi infrastructure
February 28, 2026 US-Israel Operation Epic Fury/Roar of the Lion targeting IRGC, missile sites, and leadership Largest cyberattack in conflict history; near-total Iranian internet blackout; retaliatory cyber operations active and escalating

Confirmed & Credibly Reported Cyber Attacks

We are updating this section to include only the newest incidents. For customers seeking further details of past incidents, please reach out to your Customer Success Manager, and for non-customers please reach out here.

Check Point Research Publishes Handala/Void Manticore Technical TTP Analysis (Apr 2, 2026)

  • Threat Actor: Handala Hack (Iran MOIS / Void Manticore)
  • Target: Defensive community; organisations at risk of Handala targeting
  • Attack Type: Threat intelligence publication; TTP disclosure

Check Point Research published a detailed technical analysis of Handala/Void Manticore tradecraft on April 2, covering intrusions from 2024 through 2026. The report documents that Handala continues to rely on manual, hands-on operations, off-the-shelf wipers, and publicly available deletion and encryption tools. Newly observed TTPs include the deployment of NetBird to tunnel traffic into compromised networks and the use of an AI-assisted PowerShell script for wiping activity. The group’s initial access relies heavily on compromised VPN accounts, with Check Point identifying hundreds of logon and brute-force attempts against organisational VPN infrastructure linked to Handala-associated infrastructure. The report confirms that Void Manticore overlaps with activity linked to the MOIS Internal Security Deputy’s Counter-Terrorism Division, operating under the supervision of Seyed Yahya Hosseini Panjaki. Panjaki was killed during the opening phase of Israeli strikes on Iran in early March 2026. The Irish Examiner reported that the group was forced to reorganise after two of its most prominent figures were killed. The analysis provides IOCs, MITRE ATT&CK mappings, and specific detection guidance for VPN brute-force patterns, NetBird tunnelling, and Intune abuse.

Sources: Check Point Research (Apr 2, 2026); Irish Examiner; Wikipedia; Handala Hack Team article

313 Team Claims Four-Hour DDoS Shutdown of Amazon Saudi Arabia; IRGC Deadline Alignment (Apr 1, 2026)

  • Threat Actor: 313 Team (Islamic Cyber Resistance in Iraq / Cyber Islamic Resistance)
  • Target: Amazon Saudi Arabia (amazon.sa)
  • Attack Type: Distributed denial-of-service (DDoS)

313 Team claimed a complete four-hour shutdown of Amazon Saudi Arabia’s official e-commerce platform on April 1, with Check-Host verification confirming full downtime during the claimed window. The attack coincided directly with the IRGC’s declared deadline of 8:00 pm Tehran time against 18 named US tech companies, including Amazon. The timing represents the first confirmed hacktivist operation to directly align with a stated IRGC threat timeline during the current conflict. 313 Team has been among the most active hacktivist groups throughout the conflict, previously claiming 26 Kuwaiti government domains in a single operation on March 6 and taking down the Internet Archive on March 19. The group operates as part of the broader Cyber Islamic Resistance coalition coordinated through the Electronic Operations Room established on February 28.

Sources: Conflict dashboard monitoring (Apr 1, 2026); Check-Host verification; Telegram OSINT

Handala Claims Wiper Attack on St. Joseph County, Indiana; 12TB Allegedly Erased (Apr 1, 2026)

  • Threat Actor: Handala Hack (Iran MOIS / Void Manticore)
  • Targets: St. Joseph County, Indiana; Prosecutor’s Office; health centres; police departments
  • Attack Type: Claimed wiper attack; data exfiltration; unverified

Handala claimed full control of St. Joseph County’s centralised IT infrastructure in Indiana on April 1, alleging extraction of 2TB of data from the Prosecutor’s Office, health centres, and police departments, and the wiping of 12TB from main servers. Over 2,000 documents were published on Handala’s website as alleged proof. The claim was posted on April 1. No independent confirmation has been issued by St. Joseph County, Indiana state agencies, or US federal agencies. The claim follows Handala’s documented pattern of targeting US local government infrastructure following the Stryker wiper attack on March 11. The FDD assessed on April 1 that Handala’s attacks have not relied on sophisticated capabilities, and that the group frequently takes advantage of exposed organisations rather than pursuing strategic targets. If confirmed, the attack would represent continued expansion of Handala’s US targeting beyond the healthcare sector.

Sources: Conflict dashboard monitoring (Apr 1, 2026); Telegram OSINT; ransomware.live; FDD (Apr 1)

Coordinated Information Operations Amplify F-15E Shoot-Down Across Hacktivist Channels (Apr 3, 2026)

  • Threat Actor: Pro-Iranian hacktivist ecosystem; Iranian state media
  • Target: US and allied public perception; US military credibility
  • Attack Type: Coordinated information operation; psychological amplification

Iranian state media, Handala Telegram channels, and at least a dozen allied hacktivist groups amplified the F-15E Strike Eagle shoot-down on April 3 within hours of the event. The shoot-down was framed as direct evidence that Iranian air defences remain operational, contradicting President Trump’s claim days earlier that Iranian radar was “100% annihilated.” Hacktivist channels paired shoot-down imagery with earlier cyber breach claims against PSK WIND Technologies and the 14-company wiper operation, building a unified narrative of Iranian military and cyber resilience. Videos showing Iranian civilians firing automatic weapons at US rescue helicopters were amplified across conflict-linked Telegram channels and pro-Iranian accounts on X. The information operation followed the established pattern documented by SecurityScorecard’s STRIKE team, which found that attack timings, target selection, and messaging across hacktivist groups during the June 2025 conflict suggested institutional IRGC orchestration rather than organic activity. Organisations in the F-15 supply chain should anticipate increased reconnaissance and targeting by Iranian cyber actors seeking symbolic or retaliatory impact.

Sources: NBC News (Apr 3, 2026); Military Times (Apr 3); CBS News (Apr 3); Washington Post (Apr 3); The War Zone (Apr 3); Telegram OSINT; SecurityScorecard STRIKE (prior reporting)

Iran Internet Blackout Enters Day 36; 816+ Consecutive Hours Offline; Connectivity at 1% (Apr 4, 2026)

  • Target: Iranian civilian population (90+ million)
  • Attack Type: State-imposed internet shutdown; National Information Network whitelist enforcement

The internet blackout entered its 36th day on April 4 with connectivity remaining at approximately 1% of normal levels. NetBlocks data indicates the blackout has surpassed 816 consecutive hours. The National reported that Iranians have spent roughly one third of 2026 in complete digital darkness. Only high-ranking officials and state-run media outlets retain access to the global internet through a whitelist system. NetBlocks director Alp Toker noted that no other country has shut off internet access at such scale in so many instances and for such duration. The domestic intranet remains operational, supporting local messaging apps, banking platforms, and state-controlled services. Access to the global internet remains cut off for 90 million civilians. The blackout continues to have no measurable impact on externally based proxy groups, who continue operating from Starlink and other circumvention infrastructure. A Tehran resident described April 3 as the most terrifying night of the conflict, with heavy strikes nearby while civilians remained isolated from outside communication.

Sources: NetBlocks; The National (Mar 10, 2026); Iran International; Wikipedia (Apr 4); NBC News (Apr 3-4)

Key Threat Actor Summaries

Actor Tracker – April 4, 2026
Actor Affiliation Primary TTPs Key Targets Confirmation
Handala Hack Iran MOIS / Void Manticore Server breach; wiper attacks; hack-and-leak; Intune MDM abuse; NetBird tunnelling; AI-assisted PowerShell wipers; VPN brute-force; doxxing; psychological operations PSK WIND Technologies (claimed); St. Joseph County IN (claimed, unverified); 14 Israeli companies (claimed wiper); FBI Director Patel (breached); Stryker (Day 25 recovery); 60+ Israeli companies (wiped) Check Point Research; bne IntelliNews; NBC News; Foreign Policy; Israeli INCD; FDD
IRGC Iran Armed Forces Kinetic-cyber hybrid targeting; tech company designation; infrastructure threats 18 US tech companies designated as targets; Middle East tech facilities Time; CNBC; The Hill; Euronews; Tasnim
313 Team Cyber Islamic Resistance / Iraq DDoS; coordinated multi-target sweeps; IRGC deadline alignment Amazon Saudi Arabia (confirmed DDoS); Kuwait government (26 domains); Internet Archive; Austrian Federal Police; Romanian government Conflict dashboard; Check-Host verification; Telegram OSINT
Cyber Av3ngers Iran IRGC ICS/OT targeting; PLC exploitation; siren/warning system disruption claims; psychological operations Israeli civilian warning infrastructure; US water systems; regional ICS/SCADA Intel 471; Industrial Cyber; Arctic Wolf; BeyondTrust; Trellix; CISA
Pro-Iranian hacktivist ecosystem (60+ groups) Mixed; Iran-aligned and pro-Russian DDoS; defacement; hack-and-leak; credential harvesting; info ops US infrastructure; Israeli defense; Gulf states; NATO allies Unit 42; CrowdStrike; Akamai; DigiCert; Radware
RuskiNet Pro-Russian, Iran-aligned DDoS; data leak re-publication Israeli government infrastructure; Ministry of Energy; Speeddeal.co.il Conflict dashboard; check-host verification
Pay2Key / Pay2Key.I2P Iran MOIS / Fox Kitten / Lemon Sandstorm Pseudo-ransomware; destructive encryption; RaaS with 80% affiliate profit share US healthcare; Western critical infrastructure; 170+ victims since Jul 2025 Dark Reading; KELA; Halcyon; Beazley Security; FBI/CISA/DoD
Houthi-aligned cyber groups Iran-aligned / Yemen DDoS; information operations; coordinated with kinetic strikes Israeli defense; Gulf state infrastructure; commercial shipping CGTN; Al Jazeera; CNN; Haaretz; International Crisis Group

Relevant Government Advisories

New advisories issued since previous report (April 3):

Government Advisories – Iran Cyber Threats
Date
Source
Summary

April 2, 2026

Check Point Research

Published detailed technical analysis of Handala/Void Manticore TTPs covering 2024–2026 intrusions. Confirms NetBird tunnelling, AI-assisted PowerShell wipers, VPN brute-force for initial access. Notes Panjaki killed in opening strikes. Provides IOCs, MITRE ATT&CK mappings, and detection guidance.

April 2, 2026

Infosecurity Magazine / FBI

FBI reveals Handala group tied to Iranian hack-and-leak operations targeting dissidents, journalists, and opposition groups since autumn 2023. Multi-stage malware uses Telegram C2 bots. Masquerades as Pictory, KeePass, WhatsApp, and Telegram software.

April 1, 2026

FDD

Published six-point assessment of Handala operations. Concludes attacks rely on credential reuse and exposed organisations rather than sophisticated capabilities. Notes DOJ domain seizures had limited lasting impact as Handala rebuilt infrastructure within days.

April 1, 2026

IT Brew / Sophos / RunSafe Security

Experts assess Handala as the most significant cyber threat actor emerging from the conflict. Sophos notes the Stryker attack lends credibility to other claims. ProArch reports up to 95% of devices in some Stryker departments were erased before defenders reacted.

April 3, 2026

Financial Times

Reports Iran deploying a layered network of digital actors across three tiers: elite IRGC/MOIS units, state-aligned proxies, and hacktivist groups. CISA and Israeli INCD confirmed escalation in Iranian cyber operations.

April 3, 2026

Pentagon / CENTCOM

Pentagon adds Operation Epic Fury to casualty database. 365 wounded in action; 13 killed. F-15E shoot-down confirmed. Drives information operations surge across hacktivist channels.

For historical advisories, please reach out to your Customer Success Manager if you are a customer, and reach out here if you are not a customer.

Assessment & Outlook

The conflict has entered its 36th day. As of April 4, the following assessment reflects developments from the previous 24 hours.


Near-Term Threat (1-4 weeks): CRITICAL & DETERIORATING

Cyber reporting volume from the conflict has dropped noticeably over the past 48 hours compared to the sustained tempo observed from late February through late March. This reduction does not indicate a decrease in threat level. Several factors account for the drop: the Passover and post-Eid period has historically correlated with reduced hacktivist operational tempo; multiple conflict dashboard sources have not updated beyond April 2; and the fog of war around the F-15E shoot-down and stalled ceasefire negotiations has shifted media and analyst attention to the kinetic domain. Defenders should not interpret reduced public reporting as reduced risk. Halcyon previously noted that Handala’s periods of reduced public blog activity are historically consistent with active operational tempo rather than dormancy. The quiet may precede the next wave of operations, particularly as the April 6 energy strike deadline approaches.

The Check Point Research report published on April 2 provides the most detailed public documentation of Handala’s current tradecraft. The confirmation that the group uses NetBird for tunnelling, AI-assisted PowerShell for wiping, and sustained VPN brute-force for initial access gives defenders actionable detection priorities. The report’s finding that Handala relied on compromised VPN credentials for initial access in recent intrusions aligns with the FDD’s April 1 assessment that the group exploits credential reuse and exposed organisations rather than developing novel exploitation capabilities.

The 313 Team DDoS against Amazon Saudi Arabia on April 1, timed to the IRGC deadline, represents the first confirmed hacktivist operation to directly align with a stated IRGC threat timeline. This alignment warrants monitoring for similar coordination around the April 6 energy deadline. The Handala claim against St. Joseph County, Indiana, if verified, would represent continued expansion of US local government targeting following the Stryker wiper attack.

The F-15E shoot-down on April 3 generated a rapid information operations response across hacktivist channels. The event provides renewed narrative material for pro-Iranian cyber actors and is likely to increase both motivation and recruitment across the hacktivist coalition. Organisations in the F-15 supply chain should anticipate increased reconnaissance.

Priority Targets (Updated April 4)

  • Maritime, energy, and financial sectors (CRITICAL, ESCALATED): The April 6 energy strike deadline approaches with no diplomatic progress. Dual chokepoint risk continues with Houthi operations ongoing.
  • US technology companies with Middle East operations (CRITICAL, ESCALATED): The IRGC designation of 18 companies remains active despite the April 1 deadline passing without confirmed kinetic follow-through. The 313 Team DDoS against Amazon Saudi Arabia demonstrates hacktivist willingness to align operations with IRGC timelines. Named companies should maintain elevated defensive posture through at least the April 6 energy strike deadline.
  • Organizations with exposed VPN infrastructure (CRITICAL, NEW): Check Point Research confirmed that Handala’s primary initial access vector is VPN brute-force using compromised credentials. Block inbound connections from Iran at the perimeter and on remote access services unless there is a verified business need. Monitor for brute-force patterns documented in the Check Point IOCs.
  • US local government (CRITICAL, ESCALATED): The unverified Handala claim against St. Joseph County follows the group’s established pattern of targeting exposed organizations. US local government entities should review access controls, validate offline backups, and ensure Intune multi-admin approval is enabled.
  • Israeli defense industrial base and air defence infrastructure (CRITICAL, ONGOING): The Handala claims against PSK WIND Technologies and 14 Israeli companies from April 2 remain unverified but consistent with confirmed patterns.
  • US healthcare organizations (CRITICAL, ONGOING): Stryker entered Day 25 of recovery. Pay2Key ransomware variants remain active against healthcare targets.

At Flare, we will continue to monitor this conflict and update this article as we learn more information. 

Threat Intelligence

Monitor State-Linked Cyber Threats as They Emerge

The US-Israel-Iran conflict has unleashed a wave of cyber operations spanning hacktivist groups, nation-state APTs, and ransomware affiliates. Flare continuously monitors the dark web, illicit Telegram channels, and threat actor infrastructure so your team can detect and respond to emerging threats before they reach your organization.

Continuous dark web & Telegram channel monitoring
Real-time threat actor tracking & alerting
Start Free Trial

Share article

Related Content

View All
04.02.2026

Code Names, Fake Personas, and Iranian Recruits: New Details from Inside the NKITW Operation

03.26.2026

Infostealers Doesn’t Discriminate: 10,000 Logs Show Who’s Getting Hit

03.25.2026

Leak Bazaar: Inside the New Criminal Platform Turning Stolen Data Into a Structured Marketplace