YemenEXtra
YemenExtra

 Iranian Cyberattack Shakes the Nerve Center of Israel’s Tech Security

0

In a major escalation of the shadow war between the Islamic Republic of Iran and the Zionist entity, the hacker groups “Hanzala” and “Hashashin” launched a series of complex cyber operations targeting highly sensitive sites within the entity. Hanzala, the first to strike at the onset of the Zionist aggression against Iran, exposed the fragility of Israel’s digital and intelligence infrastructure, penetrating institutions considered to be pillars of the state’s security and technology sectors.

Within Just 48 Hours: Hybrid Operations Breach Strategic Sites
In just 48 hours, the Hanzala group claimed responsibility for what it described as “hybrid and coordinated” cyberattacks that successfully breached strategic sites and led to the extraction of over 4 terabytes of highly classified data and documents. These included nuclear research files, surveillance system details, and sensitive records from logistics and tech companies.

Breaching the Weizmann Institute—The Heart of Israeli Technology
One of the most high-profile targets was the Weizmann Institute of Science, one of Israel’s premier research centers and a cornerstone of its military, industrial, and nuclear advancement. The group referred to the institute as “a central node in their system,” declaring that they had seized internal documents and sensitive research exposing its role in developing tools of domination and warfare.

The breach resulted in the exfiltration of more than 4 terabytes of data, including detailed research in genomics and biotechnology.

Targeting Israel’s Logistical & Security Infrastructure
The second operation hit Mor Logistics, a company responsible for transporting sensitive cargo under classified cover for security agencies. The group claimed to have obtained over 20,000 documents, including files on critical shipments and materials related to Israel’s Population and Immigration Authority.

Penetrating Financial Tech Firms
The third operation focused on Agora BC, a company specializing in portfolio management and trading tools. An analysis of the files revealed the company’s use of YouTrack for tracking technical issues, along with detailed documentation on billing systems and technical glitches.

Disabling the “Silent Horizon” Surveillance Network
In a particularly damaging fourth attack, the group breached Saban Systems, a company expanding Israel’s surveillance infrastructure and working directly with the internal intelligence service (Shin Bet). They claimed to have seized 21,703 documents, including engineering schematics, electrical diagrams, facial recognition specs, and behavioral tracking technologies.

Infiltrating Kibbutz Almog and Safeem
In the fifth operation, Kibbutz Almog’s digital infrastructure was breached. Hackers extracted internal and financial correspondence, surveillance camera footage, and cloud-stored content.

The sixth operation targeted Safeem, a cybersecurity firm providing digital protection for critical infrastructure. In a mocking statement, the group declared:

“The fortress you built with pride fell with a few keystrokes… we entered, we saw, and now everything is exposed.”

The Most Striking Breach: Israel’s Internet Backbone
Perhaps the most critical breach was the penetration of internet service providers “099 Israel” and “Primo”, responsible for a significant portion of Israel’s internet backbone. The group used the companies’ servers to send out over 150,000 official emails.

The Hashashin Group Hits Back
Separately, the Hashashin group breached a server belonging to the International Atomic Energy Agency (IAEA) and made a direct IP address from the server publicly accessible via their Telegram group.

Conclusion: The Battlefield Has Expanded
These cyberattacks prove that the battlefield between Iran and the Zionist entity is no longer limited to military clashes or maritime operations. It has evolved into a fierce cyberwar. The Hanzala group, in particular, has demonstrated that Israel’s digital security is an illusion—and that software, in the right hands, can be more devastating than bombs.