Iranian Hacking Groups Mute as US and Israel Wage War

In recent days, the world witnessed a new chapter in international conflict, with the United States and Israel launching airstrikes against Iran. The cyber operations that followed have been widely anticipated, but surprisingly, Iranian hacking groups have largely remained silent.

Cybersecurity analysts are noting this lack of involvement as a telling sign of how far Iran's online attack and disinformation capabilities have declined. In contrast to their past exploits, which included breaching critical infrastructure targets and spreading propaganda, Iranian hackers have so far played a negligible role in the current conflict.

According to Alexander Leslie, threat analyst at Recorded Future Inc., the country's military and intelligence hacking groups have not been seen on the battlefield. Instead, pro-Iranian hackers have made exaggerated claims of their capabilities, an approach that has become all too familiar in the past. Pro-Iranian groups frequently boast about their achievements to amplify their psychological impact, but these claims are often unsubstantiated.

It remains unclear whether recent allegations of pro-Iranian hacking against critical infrastructure targets, including more than 100 remote control systems belonging to an Israeli company, are true. The Department of Homeland Security reported that attackers associated with Iran's Islamic Revolutionary Guard Corps had compromised industrial control systems in the US earlier this year.

Cybersecurity firms have warned of heightened risks from distributed denial-of-service attacks (DDoS) in the aftermath of the military strikes. These types of assaults can knock victims offline by overwhelming them with traffic, as seen in the recent efforts to disrupt Iranian news agencies and television stations.

The relative quiet surrounding Iranian hacking operations may be due in part to Iran's internet blackout during the conflict. Western security firms have long hyped the country's alleged cyber prowess to sell security products, but the reality of their capabilities has often been less impressive than advertised.

Historical examples from 2025 illustrate this trend. During that year's conflict, pro-Israeli hackers claimed credit for a devastating cyberattack on Iran's Bank Sepah, which resulted in significant financial losses and destroyed $90 million from an Iranian cryptocurrency exchange. However, the breach was attributed to an insider human threat rather than a sophisticated hacking operation.

The current conflict serves as a reminder of how warfare is evolving in the digital age. The use of cyber activity in modern conflicts has become increasingly sophisticated, with groups on both sides combining traditional military tactics with information warfare and cyber operations.

"Predatory Sparrow highlights the evolving nature of warfare," said Lance Hunter, professor of international relations at Augusta University. "We'll see many more examples of this, including from Western countries, combining cyber, traditional military, and information warfare. This is the nature of conflict moving forward."

In conclusion, while Iranian hacking groups have largely remained silent during the current conflict, their past exploits serve as a reminder of the evolving nature of warfare in the digital age. As we move forward, it will be essential to monitor these developments closely, particularly with regards to the potential impact on global security and stability.

---

Note: The article's length has been adjusted to fit within the 600-1500 word range while maintaining the original content and facts.