Listen to the article
Iranian Hackers Vow to Continue Cyberattacks Despite Ceasefire Agreement
Pro-Iranian hackers have warned that the fragile ceasefire between Iran, the United States, and Israel will not halt their digital warfare campaigns, raising concerns among American cybersecurity experts about the vulnerability of critical infrastructure.
One prominent hacking collective, Handala, announced it would temporarily suspend attacks against U.S. targets while continuing operations against Israel. The group made it clear, however, that it plans to resume targeting American interests when strategically advantageous.
“We did not begin this war, but we will be the ones to finish it,” the group stated on its X social media account. “And let it be clear: The cyber war did not begin with the military conflict, and it will not end with any military ceasefire.”
The two-week ceasefire appears increasingly unstable as significant disagreements emerge between the involved parties, with each claiming victory in the conflict. This political uncertainty has cybersecurity experts on high alert.
Handala, which operates independently of Tehran while supporting Iranian and Palestinian interests, has already demonstrated its capabilities by disrupting operations at U.S. medical manufacturer Stryker and allegedly breaching FBI Director Kash Patel’s personal email account. These actions represent just a fraction of the cyber operations conducted by Iran’s network of proxy hacking groups.
Last month, the group claimed responsibility for targeting Stryker, a Michigan-based medical equipment company, stating the attack was retaliation for strikes that killed Iranian schoolchildren. In response, the FBI seized four web domains used by the group to disseminate its messages. Handala subsequently leaked photographs of FBI Director Patel after claiming to have compromised his personal email.
U.S. federal agencies issued a joint warning on Tuesday about Iran-backed hackers infiltrating internet-connected programmable logic controllers (PLCs) used to automate critical technology across various industrial sectors. These controllers are essential components in ports, power plants, and water facilities—making them prime targets for foreign hackers seeking to disrupt American daily life.
The advisory from the FBI, National Security Agency, and Cybersecurity and Infrastructure Security Agency (CISA) urged organizations utilizing this technology to verify and update their security measures immediately. As of Wednesday, CISA had not provided any statements regarding how the ceasefire might affect cybersecurity postures.
Markus Mueller, a cybersecurity executive at Nozomi Networks, predicts that contrary to what might be expected, cyberattacks against American organizations will likely increase rather than decrease following the ceasefire agreement. He explained that periods of reduced conventional hostilities often allow hackers to pivot from regional targets directly involved in the conflict to U.S. organizations that supported the war effort, including data centers, technology companies, and defense contractors.
“With a ceasefire, we will likely see an expansion of cyber activity both in scale and scope,” Mueller said. “These groups will likely try to execute a high-profile attack such as what we saw with Stryker.”
Mueller also warned that some groups based in Iran or Russia might attempt to circumvent the truce by launching significant cyberattacks designed to capture American public attention.
Other pro-Iranian hackers have reportedly attempted to install malware on Israelis’ phones, infiltrate surveillance cameras in Middle Eastern countries to improve Iran’s missile targeting capabilities, and breach data centers and industrial facilities in Israel, Saudi Arabia, and Kuwait.
Cybersecurity experts note that while attacks attributed to pro-Iranian hackers have been numerous, their impact has thus far been relatively limited. These operations appear designed primarily to boost morale among Iran’s supporters while highlighting ongoing vulnerabilities in their opponents’ digital infrastructure, despite the military advantages held by the United States and its allies.
As the situation develops, critical infrastructure operators and cybersecurity professionals across the United States remain vigilant, recognizing that the digital battlefield knows no ceasefire.
Fact Checker
Verify the accuracy of this article using The Disinformation Commission analysis and real-time sources.


11 Comments
The statement from Handala is a stark reminder that ceasefires and diplomatic agreements may not be enough to rein in state-sponsored hackers. Maintaining vigilance and resilience in the face of these threats is crucial.
It’s worrying to see these hackers vowing to continue their attacks, even with a ceasefire in place. Their ability to adapt and find new targets is a testament to their sophistication and determination.
The cyber dimension of this conflict adds another layer of complexity and risk. With these hackers refusing to be deterred, it’s clear that cybersecurity will remain a top priority for the nations involved.
This situation underscores the challenges of navigating the evolving cyber landscape, where ideological motivations can override political agreements. Cybersecurity experts will need to stay one step ahead of these persistent threats.
Interesting, but not surprising. Iranian-backed hackers have proven to be stubborn and relentless in their cyberattacks. The ceasefire seems tenuous at best, and they’ve made it clear they’ll resume targeting U.S. interests when it suits them.
This highlights the difficulty in deterring state-sponsored hackers, even in the face of diplomatic efforts. The vulnerability of critical infrastructure is a major concern, and cybersecurity experts will need to stay vigilant.
Absolutely. Maintaining a strong cybersecurity posture is crucial, as these groups have shown they’re willing to ignore ceasefires and political agreements when it comes to their digital warfare campaigns.
This is a troubling development, as it suggests the cyber war between Iran and its adversaries may be far from over, despite any temporary lulls. The vulnerability of critical infrastructure remains a serious threat.
It’s concerning to see these hackers vowing to continue their attacks, even in the face of a ceasefire. The vulnerability of critical infrastructure is a serious concern, and the need for robust cybersecurity measures is clear.
The geopolitical uncertainty in the region is clearly fueling ongoing cyber conflicts. As long as the underlying tensions remain, it’s hard to see these hacking groups backing down, even temporarily.
You make a good point. The fragility of the ceasefire is a real concern, as it seems these hackers are more motivated by ideology than diplomacy.