cybersecurity researchers have reported a significant spike in retaliatory cyberattacks following recent military actions in the Middle East. Between February 28 and March 2, a series of 149 distributed denial-of-service (DDoS) attacks were launched against 110 organizations across 16 countries. The activity has been attributed to politically motivated hacktivist groups responding to the U.S. and Israel’s coordinated military campaigns against Iran, known as Epic Fury and Roaring Lion.
Dominant Groups Drive Attack Volume
According to a report from cybersecurity firm Radware, the threat landscape is heavily concentrated. Two specific groups, identified as Keymous+ and DieNet, were responsible for nearly 70% of all attack activity during the three-day period. This lopsided dynamic highlights how a small number of highly active collectives can drive global cyber threat trends during periods of geopolitical tension.
DDoS attacks work by flooding a target’s online services, such as websites or networks, with a massive volume of fake traffic. This renders the services inaccessible to legitimate users, causing disruption and potential financial or reputational damage.
Global Impact and Targeted Sectors
The attacks had a wide geographical footprint, affecting entities in 16 different nations. While organizations in the Middle East were primary targets, the incident demonstrates the borderless nature of cyber conflict, where digital retaliation can impact countries globally. Targeted sectors are believed to include government agencies, financial institutions, and media organizations, though specific victim names were not detailed in the initial advisory.
This pattern aligns with historical hacktivist behavior, where groups often choose targets symbolically linked to nations involved in a physical conflict. The goal is typically to cause public disruption and draw attention to their political cause.
Cybersecurity Industry Response
Radware’s warning serves as an alert for organizations worldwide, particularly those with operations or perceived affiliations in conflict regions. The firm emphasized the need for heightened vigilance and robust DDoS mitigation strategies. Other security vendors and national computer emergency response teams (CERTs) are likely monitoring the situation and may issue their own guidance.
For potential targets, standard recommendations include ensuring DDoS protection services are active, reviewing incident response plans, and monitoring network traffic for unusual patterns that could indicate an impending attack.
Looking Ahead: An Elevated Threat Environment
The cybersecurity community anticipates that hacktivist activity will remain elevated as long as geopolitical tensions persist. Groups like Keymous+ and DieNet may continue their campaigns or inspire imitation by other collectives. Security analysts will be tracking the evolution of attack techniques and any expansion in the list of targeted countries or industries.
Organizations are advised to treat the current climate as one of increased risk. The convergence of real-world events and digital retaliation underscores the importance of proactive cybersecurity measures as a standard component of operational resilience for modern enterprises and institutions.
Source: Radware