Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Citrix releases emergency patches for actively exploited CVE-2025-6543 in ADC NetsCale

June 25, 2025

Citrix bleeding 2 defects provides tokens theft; Disadvantages SAP GUI Risk sensitive to data, impact of data

June 25, 2025

Praisian Khactivist Group traces Personal Records from Saudi Games 2024

June 25, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Praisian Khactivist Group traces Personal Records from Saudi Games 2024
Global Security

Praisian Khactivist Group traces Personal Records from Saudi Games 2024

AdminBy AdminJune 25, 2025No Comments5 Mins Read
Pro-Iranian Hacktivist Group
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Praisian Khactivist Group

Thousands of personal records that are allegedly linked to athletes and visitors to the Saudi Games were published on the Internet by the Praisian Khactivist group called Cyber ​​Fattah.

Cybersecurity company said the violation was announced on Telegram on June 22, 2025 in the form of a SQL database, characterizing it as an information operation “conducted by Iran and its trusted persons.”

“Actors have received unauthorized access to PHPMYADMIN (Backend) and explicit records,” renewable security – Note. “This is an example of Iran, which uses data violations within a major anti-American, anti-Israel and anti-Saudi propaganda activity in cyberspace, focusing on major sports and social events.”

Believed that data is probably Dark formThe cybercrime forum, which caught the attention after repeated grips of violations. The information was published by a forum user called Zerodayx, a vodka profile that was probably created to promote this violation.

Subburnt data include IT -peers accounting; state official e -mail addresses; information of athletes and visitors; Passports and IDs; bank statements; medical forms; and scanned copies of sensitive documents.

“Cyber ​​-fat activity coincides with the broader tendency of hattivism in the Middle East, where groups often participate in cyber -will as a form of activity,” said the respect.

Cybersecurity

The leak is unfolding against the background Throwing tensions Between Iran and Israel, with as many as 119 hactivist groups claiming that they had carried out cyber -napades either made declarations to match or act against the two countries, for Cyber.

Cyber ​​Fattah, who calls itself “Iranian Cyber ​​-Command”, has a history of targeting Israeli and Western web -resources and government agencies.

As you know, it also cooperates with other threats operating in the region, for example, 313 teams that have claimed a common attack for the Social Media Platform Social Platform for US airfields at Iran’s nuclear facilities.

“This Cyber ​​Fattah incident may indicate an interesting transition from the harmful activity of Israel, to wider attention to anti-Zash and anti-Saudi,” the reboot said.

Last week, the pro -Israeli group, known as a predatory sparrow (aka Adalat Ali, Gongeshka Darananda, Indra or Meteoroxpress), claimed that the data received from the Iran’s Ministry of Communications. Typically, this is too crackling The largest exchange of cryptocurrencies in Iran, Nobitex, and burned more than $ 90 million in cryptocurrency, sending digital assets to invalid wallets.

The Outpost24 cybersecurity campaign said the attackers may have had “access to internal documentation, which in detail about internal work of exchange and perhaps even authentication accounts” to remove the robbery or that it was an insider that worked with the group.

“It was not a financially motivated theft, but a strategic, ideological and psychological operation,” Lydia Lopez Sanz Sanz Sanz Researcher Lydia Lopez – Note. “Destroying, not allocating the funds, the threatening actor emphasized his goals: the dismantling of public confidence in the regime -related institutions, and signaled its technical advantage.”

Subsequently, on June 18, Iran’s television stream (short for Islamic Republic of Iran) was abducted to show pro -Israel and anti -Iranian government images. Irib claimed that Israel was behind the incident.

Image Source: Cyberknow

Israel, on its part, has also been the goal of hacking Pro-palestine as Left commandlisted Several Israeli organizations On its site leakage databases, starting on June 14, 2025. They consisted of Delek Group, Yg New Idan and Aerodreams.

Another tendency observed in cyber -worm between Iran and Israel is the union of smaller hutors for umbrella formation, such as cyber -Islamic resistance or united cyber -Front for Palestine and Iran.

Cybersecurity

“These fluid -related cyber are shared resources and synchronize companies, enhancing their influence despite limited technical sophistication,” “Trustwave Spiderlabs” – Note In a report published last week.

The company also nominated another pro -Iranian group named Eat It is assumed that, despite the Praisn and Gommodnaya position, Russian members and communication with other Eastern European cyber communities include.

“What distinguishes Dienet from many other pro-Iri-actors is his hybrid identity,” the report said. “Linguistic analysis of Dienet messages, as well as temporary tags, metadata and a model of interaction, suggests that at least part of the group reports internally in Russian or uses Slavic resources.”

“This indicates a broader phenomenon of inter-regional cyber-creativity, where ideological alignment abolishes geographical or national boundaries.”

Group-IB, in analysis After June 13, after June 13, based on the telegram, Donets said the most reference that was cited 79 times during the period of time. Overall, more than 5800 messages were recorded through different Khactivist channels between June 13 and 20.

Deployment Cyber ​​is the ability In the context of the Iran-Israel war, as well as other recent geopolitical events concerning Hamas-Israel and Russia-Ukraine, they demonstrate how digital operations are increasingly integrating kinetic actions, affect the perception of the public and violation of critical infrastructure.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Citrix releases emergency patches for actively exploited CVE-2025-6543 in ADC NetsCale

June 25, 2025

Citrix bleeding 2 defects provides tokens theft; Disadvantages SAP GUI Risk sensitive to data, impact of data

June 25, 2025

Sonicwall Netextender Trojan and Connectwise Explois

June 25, 2025

North Korea related to supply networks is focused on developers with 35 malicious NPM packages

June 25, 2025

Microsoft extends Windows 10 security updates on one year with new enrollment options

June 25, 2025

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Citrix releases emergency patches for actively exploited CVE-2025-6543 in ADC NetsCale

June 25, 2025

Citrix bleeding 2 defects provides tokens theft; Disadvantages SAP GUI Risk sensitive to data, impact of data

June 25, 2025

Praisian Khactivist Group traces Personal Records from Saudi Games 2024

June 25, 2025

Sonicwall Netextender Trojan and Connectwise Explois

June 25, 2025

North Korea related to supply networks is focused on developers with 35 malicious NPM packages

June 25, 2025

Microsoft extends Windows 10 security updates on one year with new enrollment options

June 25, 2025

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Citrix releases emergency patches for actively exploited CVE-2025-6543 in ADC NetsCale

June 25, 2025

Citrix bleeding 2 defects provides tokens theft; Disadvantages SAP GUI Risk sensitive to data, impact of data

June 25, 2025

Praisian Khactivist Group traces Personal Records from Saudi Games 2024

June 25, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.