Daily Briefing is a curated listicle made available by The Readable. We select a handful of significant stories worth sharing with our readers and present them in an easy-to-read, accessible format.
As military tensions escalate between the United States, Iran, and Israel, cyberspace has emerged as a critical battleground alongside airstrikes and missile exchanges. In the wake of U.S. bombing raids on Iranian nuclear facilities, cybersecurity experts and federal agencies are warning of potential Iranian cyber retaliation, while pro-Iranian groups have already claimed responsibility for digital attacks. Simultaneously, Israel-linked hackers have launched aggressive cyber operations targeting Iranian financial institutions, prompting Iran to impose a near-total internet blackout. These developments underscore the growing role of cyber capabilities in modern conflict, where attacks on digital infrastructure can inflict strategic damage and psychological impact without a single shot being fired. Here’s what you need to know today.
1. After Iran uses missiles, US braces for cyberattacks – CNN
Following recent U.S. airstrikes on Iranian nuclear sites, critical infrastructure across the United States—such as hospitals, water facilities, and power plants—is on high alert for potential Iranian cyberattacks. While no confirmed breaches have occurred, officials report that Iranian-linked hackers have been actively scanning for vulnerabilities and discussing retaliation online. Given Iran’s limited ability to strike physically, experts suggest cyberspace offers a more practical and deniable means of response, especially after Iran’s missile launch targeting a U.S. base in Qatar.
U.S. intelligence agencies, including the Department of Homeland Security and the Cybersecurity and Infrastructure Security Agency (CISA), are working with private sector partners to monitor threats and reinforce defenses. Although there is currently no specific credible threat, federal advisories note that low-level cyberattacks by Iranian “hacktivists” or government-linked actors are likely. These attacks, even if limited in technical impact, can have psychological effects—particularly when hackers overstate their success for propaganda purposes.
Iran has a track record of targeting vulnerable U.S. infrastructure, including past incidents where hackers disrupted water systems and hospitals. Despite not being as advanced as Russia or China in cyber capabilities, Iran is seen as more unpredictable and increasingly aggressive. Authorities urge heightened vigilance across public and private sectors, emphasizing the importance of preparing for both cyber and physical threats while avoiding panic or exaggeration.
2. Tech in the Iran-Israel conflict: internet blackout, crypto burning and home camera spying – The Guardian
The ongoing conflict between Israel and Iran has expanded into cyberspace, intensifying digital warfare alongside traditional military operations. Iran, fearing Israeli cyber intrusions, imposed a near-total internet blackout last week, reducing national traffic by about 97%, according to Cloudflare. This move followed claims from anti-Iranian hackers, possibly linked to Israel, that they had breached Iran’s state-owned Bank Sepah. Iranian officials later confirmed the blackout was a defensive measure to prevent further attacks.
Iran’s fears materialized when the Israeli-linked hacking group “Predatory Sparrow” claimed responsibility for a major breach of the Nobitex cryptocurrency exchange, reportedly transferring and effectively destroying over $90 million in digital assets by moving them into inaccessible “vanity addresses.” The group also claimed to have wiped data at Bank Sepah, signaling a series of damaging strikes on critical Iranian financial infrastructure.
In contrast, Iran’s retaliatory efforts appear less impactful. Israeli authorities have warned of Iranian attempts to hijack internet-connected home security cameras for intelligence gathering, a tactic also used by groups linked to Hamas and Russia. While these surveillance hacks are concerning, experts suggest they lack the disruptive power of Israel’s attacks on Iran’s financial systems. By late Friday, Iran had begun restoring partial internet access, though residents remained wary of the connection’s stability.
3. Cyber Command supports strikes on Iran’s nuclear facilities, but officials keep details under wraps – Defense Scoop
U.S. Cyber Command (Cybercom) played a supporting role in “Operation Midnight Hammer,” the recent American military strikes on Iranian nuclear facilities, though the exact nature of its involvement has not been officially disclosed. Pentagon officials confirmed Cybercom’s participation alongside other major military commands, and experts suggest its role likely included cyber intelligence gathering, communications support, and possibly offensive cyber actions to assist in disabling Iranian defenses.
While there is no public confirmation of specific actions taken by Cybercom, experts outlined several ways it may have contributed. These include providing real-time threat monitoring, helping maintain secure communication across military branches, and potentially targeting Iran’s integrated air defense systems (IADS) to protect U.S. aircraft, especially stealth bombers like the B-2s. Cyber operations might have also involved deception tactics—such as disrupting or spoofing Iranian sensors—and monitoring Iranian reactions in near real-time, either through Cybercom or the NSA, which shares leadership and resources with Cybercom.
Looking ahead, Cybercom is expected to play a defensive role against possible Iranian cyber retaliation. Experts warn that Iran’s cyber forces, while less sophisticated than those of major powers like China or Russia, remain unpredictable and motivated. U.S. cyber units are likely preparing to counter any such attacks, including potential strikes on critical infrastructure, and may already be conducting preemptive actions to reduce Iran’s offensive cyber capabilities.
4. Iranian-aligned hackers claim responsibility for Truth Social cyberattack – News Nation
An Iranian-aligned hacking group called the 313 Team has claimed responsibility for a cyberattack on President Donald Trump’s Truth Social platform. According to the Center for Internet Security, the group launched a distributed denial-of-service (DDoS) attack shortly after the U.S. bombed several Iranian nuclear facilities on Saturday. Users began reporting problems with the platform just after Trump posted about the strikes, which targeted key Iranian sites including Fordow, Natanz, and Esfahan.
This incident is part of a broader cyber escalation tied to rising tensions among Iran, Israel, and the United States. In recent weeks, Iranian and Israeli-affiliated hacker groups have exchanged attacks. One Israeli-linked group, Predatory Sparrow, claimed responsibility for a cyberattack on Iran’s largest cryptocurrency exchange, Nobitex, transferring over $90 million in funds. However, analysts suggest the group likely did not possess the private keys to the destination wallets, meaning the funds may have been rendered inaccessible.
The same group also recently targeted an Iranian state-owned bank. These incidents illustrate how cyberattacks are increasingly being used as tools of retaliation and disruption in geopolitical conflicts, with consequences that span both symbolic platforms and major financial institutions.
5. Iran’s cyber forces have many ways to attack US, experts warn – The Washington Post
U.S. government officials and cybersecurity experts warn that Iran may retaliate against recent American airstrikes on its nuclear facilities through cyberattacks. Although no such attacks have been confirmed yet, Iran has previously demonstrated its cyber capabilities against high-profile targets, including Saudi Aramco and U.S.-linked entities like the Sands casino. These past operations reflect Tehran’s longstanding investment in developing offensive cyber tools since the Stuxnet worm disrupted its nuclear program over a decade ago.
Analysts believe Iran is likely to pursue calculated cyber operations that avoid provoking a direct and severe U.S. military response. This may include defacing websites or launching denial-of-service attacks, often through pro-Iranian hacktivist groups that provide Iran plausible deniability. These groups have already issued threats on platforms like Telegram and X following the latest U.S. strikes, and Iranian operatives may exaggerate the impact of low-level attacks for propaganda purposes.
While a large-scale cyberattack remains a possibility, experts suggest that cyber retaliation could primarily serve symbolic purposes, much like Iran’s limited missile strike in Qatar. Given its limited conventional military reach, Iran sees cyber warfare as a strategic means to target the U.S. homeland without triggering red lines. Past incidents also suggest Iran may quietly pursue longer-term espionage or assassination plots that become evident only much later.
Editor’s note: Each item in this briefing was initially summarized or translated by ChatGPT-4o based on the author’s specific instructions, which included news judgment, fact-checking, and thorough editing before publication.