
The ongoing hostilities between Iran and Israel have dramatically expanded into the cyber
domain, with Iranian state-sponsored hackers and affiliated groups intensifying their efforts to
disrupt Israelʼs critical infrastructure, including its renowned anti-missile defense systems
. As conventional military options become less viable for Iran in the wake of devastating Israeli
strikes, cyber warfare has emerged as a primary tool for retaliation and strategic disruption .
Escalation in Cyber Operations
Following Israelʼs “Operation Rising Lion”—a coordinated campaign of airstrikes and sabotage
targeting Iranian military and nuclear assets—Iranian cyber activity surged, focusing on
espionage, distributed denial-of-service DDoS) attacks, ransomware, and destructive
malware . Intelligence reports indicate that these campaigns are not only aimed at causing
direct damage but also at undermining public confidence and amplifying geopolitical tensions
through coordinated disinformation and influence operations .
One notable incident involved Iranian-aligned threat actors targeting Israelʼs public address
system Tzofar , which is crucial for warning civilians of incoming missile attacks . Disruptions
to such systems could have severe consequences, potentially delaying or preventing timely
alerts during missile barrages.
Targeting Anti-Missile and Air Defense Systems
Reports suggest that Iranian cyber efforts have specifically targeted Israelʼs missile defense
infrastructure, including the Iron Dome and related command-and-control networks . The
goal of these attacks appears to be twofold:
Disruption of Detection and Response: By attempting to interfere with the digital
backbone of Israelʼs anti-missile systems, Iranian hackers seek to reduce the effectiveness
of missile interception and create vulnerabilities during periods of heightened conflict .
Psychological Impact: Successful disruption, even if temporary, can erode public trust in
Israelʼs ability to protect its citizens, amplifying the psychological effects of missile
attacks .
While the full extent of damage from these cyberattacks remains classified, there have been
reports of internal disruptions within Israeli defense applications and command systems .
Analysts note that these incidents coincide with periods of intense military activity, suggesting a
coordinated effort to synchronize cyber and kinetic operations.
Hybrid Warfare and the Broader Cyber Conflict
The Israel-Iran conflict exemplifies the modern reality of hybrid warfare, where cyberattacks are
used alongside traditional military strikes to achieve strategic objectives . Both nations
possess advanced cyber capabilities, and experts warn that as Iranʼs conventional military
assets are degraded, its reliance on cyber operations is likely to increase .
Historically, this cyber rivalry dates back to the discovery of Stuxnet in 2010—a joint U.S. Israeli
cyber operation that crippled Iranian nuclear centrifuges . Since then, Iran has significantly
expanded its cyber arsenal, frequently targeting Israeli banks, airlines, the Israel Defense Forces,
and critical infrastructure in an ongoing campaign of digital retaliation .
Conclusion
As Israel and Iran continue to clash, the cyber domain has become a central battleground.
Iranian cyberattacks targeting Israelʼs anti-missile systems represent a strategic attempt to
undermine the countryʼs defenses and sow chaos during periods of crisis . With both
sides investing heavily in offensive and defensive cyber capabilities, this digital arms race is
poised to remain a defining feature of their conflict for the foreseeable future.
https://industrialcyber.co/industrial-cyber-attacks/radware-warns-of-surge-in-iranian-cyber-activity-t
argeting-israeli-industrial-critical-systems/
https://socradar.io/reflections-of-israel-iran-conflict-cyber-world/
https://www.theregister.com/2025/06/13/cyber_weapons_israel_iran/
https://www.inss.org.il/wp-content/uploads/2019/07/Cyber3.1ENG_37396.pdf

Leave a comment