The Department of Homeland Security (DHS) has issued a critical advisory highlighting an escalating cyber threat from pro-Iranian hacktivist groups targeting United States networks. This development follows recent military confrontations between Iran and the U.S., notably Iran’s Islamic Revolutionary Guard Corps launching missiles at U.S. military bases in Qatar and Iraq on June 23, 2025. These actions were in direct retaliation for American strikes on Iranian nuclear facilities the previous day. The intensifying conflict has now extended into cyberspace, with state-aligned cybercrime groups amplifying their digital offensive operations against American infrastructure.
Escalation of Cyber Threats
The DHS advisory underscores a coordinated effort by multiple Iranian-affiliated groups employing sophisticated attack vectors, including distributed denial-of-service (DDoS) attacks, exploitation of operational technology (OT) devices, and targeted espionage operations against defense sectors. Analysts from ReliaQuest have observed that while the cyber conflict had previously been confined to the nations directly involved, the recent U.S. military actions have likely provoked cyber retaliations against American targets within the next one to four weeks. These retaliatory operations are expected to focus on organizations conducting business with Israel or utilizing Israeli equipment, particularly programmable logic controllers and other OT devices.
Active Threat Groups
Among the active threat actors, Team 313 has emerged as a particularly aggressive entity. The group claimed responsibility for a DDoS attack against the Truth Social platform, citing the missile attacks on Iranian nuclear facilities as motivation for their digital assault. This group joins other active entities, including the pro-Palestinian group Handala, which has claimed to have stolen over 2 terabytes of data from multiple Israeli organizations, and the pro-Israel group Predatory Sparrow, which has targeted Iranian banking and cryptocurrency infrastructure. Intelligence assessments suggest these groups are likely affiliated with the Iranian government and represent a strategic deployment of cyber warfare tactics designed to gather intelligence and disrupt critical infrastructure operations.
Operational Technology Exploitation
A particularly concerning aspect of the current threat landscape involves the targeting of OT systems through internet-connected devices. Iranian groups, notably CyberAv3ngers, have demonstrated sophisticated capabilities in exploiting programmable logic controllers and human-machine interfaces connected to the internet. The group’s successful attack on multiple U.S. water and wastewater facilities in November 2023 exemplifies their methodology, where attackers employed scanning tools to identify accessible internet-connected devices before launching their attacks.
Historical Context and Implications
Iranian cyber operations have a history of causing significant economic damage. For instance, a 2014 attack on a Las Vegas casino reportedly resulted in $40 million in damages after its CEO expressed support for stronger action against Iran. The current threat landscape suggests a continuation of such tactics, with high-impact cyberattacks designed to cause destruction expected to coincide with kinetic operations. The DHS advisory serves as a stark reminder of the evolving nature of cyber threats and the need for heightened vigilance and robust cybersecurity measures to protect critical infrastructure and sensitive information.