Global cybersecurity landscape is undergoing a significant transformation, as state-sponsored hacktivism gains traction amid ongoing conflicts. In 2024, Forescout Technologies Inc. documented 780 hacktivist attacks, predominantly conducted by four groups operating on opposite sides of the Russia-Ukraine and Israel-Palestine conflicts:
BlackJack, Handala Group, Indian Cyber Force, and NoName057(16). Critical infrastructure, including government, military, transportation, logistics, and financial services, has emerged as a prime target, with Distributed Denial of Service (DDoS) attacks on websites being the most prevalent method.
Recent reports indicate an uptick in attacks on U.S. operational technology (OT) and industrial control systems (ICS), especially within water utilities, healthcare, energy, and manufacturing sectors.
Notably, hacktivist groups such as CyberAv3ngers and the Cyber Army of Russia have intensified efforts to compromise U.S. infrastructure, further blurring the line between independent activism and proxy operations on behalf of nation-states.
Modern hacktivism has shifted focus from ideological advocacy to directly targeting adversaries’ critical infrastructure and manipulating public opinion. This evolution amplifies the strategic impact of these campaigns, making it difficult to distinguish between genuine activists and government-aligned threat actors.
The escalation of cyber conflict following geopolitical flashpoints, such as the wars in Ukraine and Gaza, has created fertile ground for these groups to expand their influence and reach.
Operational Tactics and Prime Targets
Analysis of the most active hacktivist groups reveals a sophisticated approach to cyber operations, with groups leveraging both technical and psychological tactics. Over 90 percent of attacks in 2024 targeted websites, primarily through DDoS, rendering critical services inaccessible and eroding public confidence in institutional resilience.
Website defacement and sensitive data theft were also frequently reported, with a small but notable percentage of attacks resulting in data wiping or targeting IoT devices through malware, encryption, and manipulation.
The regional focus of these attacks mirrors the strategic objectives of the groups involved. Europe accounted for 82 percent of incidents, with Asia (primarily the Middle East) representing most of the remainder.
Ukraine, Israel, and Spain were the most targeted countries, reflecting the geopolitical alignment of hacktivist entities. Government and military organizations were subjected to 44 percent of the attacks, followed by the transportation and logistics sector (21 percent), where ports, airports, and transit systems were repeatedly disrupted.
Financial services, telecommunications, and energy were also highly targeted, underscoring the strategic intent to destabilize critical infrastructure.
Group methodologies varied by region and objective. BlackJack, a Ukrainian group, focused on Russian sectors with operations ranging from data breaches to public leaks. The Handala Group, emerging from Iran, launched ransomware and data leak attacks exclusively against Israeli targets.
Indian Cyber Force directed defacement and data theft campaigns towards countries perceived as hostile, while NoName057(16), with ties to Russian interests, led the DDoSia project to coordinate large-scale DDoS attacks against Ukraine and its allies.
Future Outlook and Defense Strategies
Forecasts for 2025 suggest DDoS will remain the dominant attack vector, largely due to the proliferation of accessible tools that enable low-skill actors to participate in high-impact operations.
Experts predict an increase in attacks targeting IoT and OT systems, amplifying risks to sectors crucial to daily life such as utilities, government, and financial services. Hacktivist groups are expected to continue shifting focus to active conflict zones, rapidly adapting to geopolitical changes, and adopting new identities or splitting to evade detection.
Defending against these evolving threats requires a multi-layered security approach. Organizations are advised to follow established guidelines for mitigating DDoS attacks, including infrastructure hardening, capacity scaling, and robust response planning.
IoT and OT systems must be secured through regular vulnerability patching, strong password management, and minimizing direct internet exposure, with best practices for remote access in place.
Network segmentation between IT, IoT, and OT components is critical for containing breaches. Enhanced monitoring and anomaly detection on network traffic enable early identification of compromised devices, improving response times to potential attacks.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!