07 March, 2026

Geopolitical tensions invariably influence cyberspace, leading to an evolution in the threat landscape. The current escalation in the Middle East, which began on February 28, 2026, is anticipated to follow this pattern across the UAE. Historically, threat actors have exploited such periods to amplify influence operations, conduct opportunistic intrusion attempts, and circulate disinformation narratives.
CPX Threat Intelligence Center actively monitoring the evolving geopolitical situation and its wider cyber implications across the region, noting an increase in hacktivist activities and targeted disruptions across allied Gulf states.
(06 March 2026, 1700 hours): CPX Threat Intelligence Center has been closely monitoring the escalating cyber landscape amid the ongoing US-Israel-Iran conflict.
In the last 72 hours, CPX-TIC have identified a surge in activities attributed to Iran-aligned personas and collectives, including hacktivists and state-linked groups, also joined forces by pro-Russian hacktivists, and old silent hacktivist groups became active.
Overall, hacktivist groups continue to lead the charge, particularly pro-Iranian, pro-Palestinian, and pro-Russian collectives, which continue to conduct DDoS attacks, website defacements, data exfiltration, and disinformation campaigns. These activities are largely targeting Israeli, US, and allied Gulf state critical infrastructure across the government, energy, finance, transportation, and healthcare sectors.
In addition to hacktivist activity, indications of potential targeting attempts by the Iran‑nexus APT group ‘Peach Sandstorm’ against entities in the UAE. Concurrently, cybercriminal exploitation of regional uncertainty persists, with increase of fraudulent emails and smishing campaign requesting personal identifiable information (PII), financial data under the pretext of emergency registration or compensation.
The combination of continued hacktivist operations, coordinated narratives, emerging state-sponsored activity, and opportunistic scam campaigns reflects an elevated threat environment for regional entities, including within the UAE.

CPX Threat Intelligence Center (CPX-TIC) assesses that the current regional geopolitical environment has resulted in an elevated cyber threat posture for the UAE, consistent with historical patterns observed during periods of heightened tension involving Iran and its regional proxies.
Historically, Iranian state‑aligned cyber units have escalated cyber activity in parallel with kinetic or political developments, leveraging a mix of state APT operations and proxy actors. Below are some key plausible activities that can be seen during this ongoing conflict.
In the last 72 hours, CPX‑TIC observed increased activity from several pro-Iranian & pro-Palestinian hacktivist collectives including Handala Hack Team, 313 Team, DieNet, and RuskiNet Group, CONQUERORS ELECTRONIC ARMY targeting entities in Israel, Jordan, and Kuwait. Additionally, pro-Russian affiliates such as NoName057(16) and the Z-PENTEST ALLIANCE have intensified their contributions to the #OpIsrael campaign by leaking data and defacing Israeli government and defense-related platforms.
On the ransomware front, the group BaqiyatLock (BQTlock) has begun recruiting hacktivist partners, offering complimentary RaaS (Ransomware‑as‑a‑Service) access specifically for operations targeting Israeli organizations, followed by cybercriminal exploitation of regional uncertainty persists with fraudulent emails and smishing messages targeting netizens in the UAE. Moreover, there have been few activities identified for state sponsored actors like Peach Sandstorm.
Below is the timeline of the cyber escalation from 28-February to 06-March 2026:

|
Date |
Threat Actor |
Origin |
Motivation |
Activity Type |
Target Region |
|
28-Feb-2026 |
Handala Hack Team |
Iran |
Ideological, Anti-Israel/ US |
Announcement of the attack against Middle East Countries |
Middle East |
|
Fatimion Cyber Team |
Unknown |
Ideological, Anti-Israel/ Zionist |
Compromise of UAE based Government NGO’s website |
UAE |
|
|
DieNet |
Unknown |
Ideological, Anti-Western/Pro-Middle Eastern |
DDOS Attack on UAE Based Entities (Government Enabled Services, Telecom) |
UAE |
|
|
Sylhet Gang-SG |
Bangladesh |
Religious, Political |
Call for hackers or hacktivist groups to launch collective cyber operations against America and Israel Endorsed UAE Related Claims |
UAE |
|
|
Cyber Islamic Resistance |
Unknown |
Religious, Political, Pro-Iran, Pro‑Palestinian |
Announcement: Calling for hackers and cyber‑warfare experts to participate via the group’s official account |
Announcement |
|
|
01-Mar-2026 |
MAD GHOST/ Arabian Ghosts |
Unknown |
Pro-Palestinian, Anti‑Israel |
Announcement: Calling for hackers to target Israel, the USA, Saudi Arabia, and UAE |
Middle East, US, Israel |
|
Sylhet Gang-SG |
Bangladesh |
Religious, Political |
Amplified the DieNet messaging related to UAE targets |
UAE |
|
|
APT Iran |
Unknown |
Religious, Political, Pro-Iran, Anti-Israel |
Announcement: posted a list of target countries including Israel, US, Jordan, Saudi Arabia, and United Arab Emirates (UAE) |
Middle East, US, Israel |
|
|
313 Team |
Unknown |
Ideological, Anti-Israeli, Anti-Western, Pro-Palestinian |
Call‑to‑Action / Threat Declaration |
Middle East, US, Israel |
|
|
DieNet |
Unknown |
Ideological, Anti-Western/Pro-Middle Eastern |
DDoS Attack on UAE Critical Infrastructure |
UAE |
|
|
Handala Hack Team |
Iran |
Ideological, Anti-Israel/ US |
Threat Declaration / Warning Advisory |
Middle East |
|
|
02-Mar-2026 |
BD Anonymous Team |
Bangladesh |
Religious, Political, Pro-Palestinian |
Operation Announcement / Call‑to‑Action |
Middle East |
|
313 Team |
Unknown |
Ideological, Anti-Israeli, Anti-Western, Pro-Palestinian |
Threat Statement / Target Declaration against the countries supporting US and Israel |
Middle East, US, Israel |
|
|
APT Iran |
Unknown |
Religious, Political, Pro-Iran, Anti-Israel |
ICS/SCADA Intrusion & Access Demonstration |
Israel |
|
|
FAD Team |
Iraq |
Religious, Political, Pro-Palestinian |
SCADA/PLC Compromise (Wind Turbine Infrastructure) - Israel |
Israel |
|
|
03-Mar-2026 |
DIENET |
Unknown |
Ideological, Anti-Western/Pro-Middle Eastern |
DDoS attack on Omani Government Portal |
Oman |
|
FAD TEAM |
Iraq |
Religious, Political, Pro-Palestinian |
Coordinated Cyber Operation / ICS Targeting - Saudi Arabia |
Saudi Arabia |
|
|
313 Team |
Iraq |
Ideological, Anti-Israeli, Anti-Western, Pro-Palestinian |
DDoS Attacks on Critical Infrastructure - Kuwait |
Kuwait |
|
|
ANONYMOUS SANA'A |
Yemen |
Religious, Political, Pro-Palestinian |
Data Breach & Data Destruction (Hack-and-Leak) - Israel |
Israel |
|
|
WeAreUst |
Yemen |
Religious, Political, Pro-Palestinian |
Data Breach & Data Destruction (Hack-and-Leak) - Israel |
Israel |
|
|
NONAME057(16) |
Russia |
pro‑Russian hacktivist collective |
DDoS attacks on Israel entities |
Israel |
|
|
BLACKMASKERS ARMY |
Tunisia |
Religious, Political, Pro-Palestinian |
Announcement: Support Statement on cyber warfare |
Israel |
|
|
KEYMOUS |
North Africa |
North Africa–linked hacktivist group |
Targeted Attacks on Critical Infrastructure - Kuwait, Jordan, Saudi Arabia |
Kuwait, Jordan, Saudi Arabia |
|
|
DARK STORM TEAM |
Unknown |
Religious, Political, Pro-Palestinian |
DDoS attack against Israeli Bank |
Israel |
|
|
MOROCCAN BLACK CYBER ARMY |
Morocco |
Religious, Political, Pro-Palestinian |
Data Breach & Data Destruction (Hack-and-Leak) - US & Israel |
US, Israel |
|
|
MUHAMMAD BRIGADE |
Unknown |
Religious, Political, Pro-Palestinian |
Data Leak (Military & Intelligence Files) |
Israel |
|
|
CYBER RESISTANCE OF PALESTINE |
Unknown |
Religious, Political, Pro-Palestinian |
Announcement: Calling for hackers to join cyber warfare |
Israel |
|
|
BLACKCAT |
Unknown |
Ideological |
Support Statement / Threat Messaging |
Middle East, US, Israel |
|
|
HANDALA HACK TEAM |
Iran |
Ideological, Anti-Israel/ US |
Compromise of UAE Energy Sector Infrastructure |
UAE |
|
|
04-Mar-2026 |
RUSKINET GROUP |
Unknown |
political and ideological |
DDoS Attack on Israeli Corporate Website |
Israel |
|
Z-PENTEST ALLIANCE |
Russia |
pro-Russian |
Full ICS/Water Infrastructure Compromise Claim - Israel |
Israel |
|
|
DieNet |
Unknown |
Ideological, Anti-Western/Pro-Middle Eastern |
Data Compromise - Jordan |
Jordan |
|
|
HANDALA HACK TEAM |
Iran |
Ideological, Anti-Israel/ US |
Service Disruption Attack (UAE Banking Sector) |
UAE |
|
|
313 Team |
Iraq |
Ideological, Anti-Israeli, Anti-Western, Pro-Palestinian |
DDoS Attack on UAE Government Media Portal |
UAE |
|
|
05-Mar-2026 |
RUSKINET GROUP |
Unknown |
Political, Ideological |
DDoS Attack on Financial Technology Platform - Israel |
Israel |
|
DIENET |
Unknown |
Ideological, Anti-Western/Pro-Middle Eastern |
DDoS Attack on NSO Group - Israel and USA |
Israel, US |
|
|
HANDALA HACK TEAM |
Iran |
Ideological, Anti-Israel/ US |
Data Leak and Attack on Insurance Provider - Israel |
Israel |
|
|
FAD TEAM |
Iraq |
Religious, Political, Pro-Palestinian |
Targeted Data Leak and Credential Exposure - Israel, Saudi Arabia |
Israel, Saudi Arabia |
|
|
313 TEAM |
Iraq |
Ideological, Anti-Israeli, Anti-Western, Pro-Palestinian |
DDoS Attacks on Government Servers - Bahrain |
Bahrain |
|
|
CYBER ISLAMIC RESISTANCE |
Unknown |
Religious, Political, Pro-Iran, Pro‑Palestinian |
Leadership Message / Psychological Ops |
Israel |
|
|
CONQUERORS ELECTRONIC ARMY |
Unknown |
Pro-Iran |
Multi‑Sector Compromise (Healthcare, Education, Water) - Israel |
Israel |
|
|
06-Mar-2026 |
Conqueror Electronics Army |
Unknown |
Pro-Iran |
Cyberattack on Financial Institution - Israel |
Israel |
|
FAD Team |
Iraq |
Religious, Political, Pro-Palestinian |
DDoS Attack on Government Website - Jordan |
Jordan |
|
|
313 Team |
Iraq |
Ideological, Anti-Israeli, Anti-Western, Pro-Palestinian |
Sustained DDoS Campaign Against Government Portal - Kuwait |
Kuwait |
|
|
Moroccan Black Cyber Army |
Morocco |
Religious, Political, Pro-Palestinian |
Announcement: Operation Warning / Pre‑Attack Declaration |
Israel, US |
|
|
DieNet |
Unknown |
Ideological, Anti-Western/Pro-Middle Eastern |
DDoS Attacks on Gov Services Across Israel & Qatar |
Israel, Qatar |
|
|
Team Bangladesh Cyber Squad |
Bangladesh |
Religious, Political, Pro-Palestinian |
Unauthorized CCTV Access + DDoS + ICS Access - UAE and Israel |
UAE, Israel |
|
|
Handala Hack Team |
Iran |
Ideological, Anti-Israel/ US |
Data Theft + Server Wipe (Hack‑and‑Destroy) - Israel |
Israel |
|
|
RuskiNet Group |
Unknown |
Political, Ideological |
DDoS Attack (Corporate Target) - Israel |
Israel |
|
|
Cardinal |
Russia |
pro‑Russian |
Cyber Intrusion Claim / Military System Breach - Israel |
Israel |
|
|
NoName057(16) |
Russia |
pro‑Russian hacktivist collective |
DDoS Attacks on Municipal Government Websites - Israel |
Israel |
CPX Threat Intelligence Center has identified multiple cybercriminals campaigns targeting netizens actively during the current escalation to collect personally identifiable information (PII) and financial data.
First Campaign: An ongoing smishing campaign targeting netizens by impersonating officials from Dubai Customs. The fraudulent messages claim that a parcel has been placed on hold due to the regional security situation and tightened border control measures, prompting recipients to “update their information” to meet compliance requirements and resume parcel processing.

Figure 1: Smishing message and website
Upon examining the URL included in the smishing message, CPX Threat Intelligence Center confirmed that the website is designed to harvest personally identifiable information (PII) as well as financial details, indicating a clear intention to commit fraud.

Figure 2: Analyzed website
Second Campaign: A fraudulent email campaigns circulating, in which recipients are instructed to complete an alleged “emergency registration form” and submit personal information under the guise of receiving support, compensation, or insurance coverage.
The UAE Ministry of Interior (MOI) issued a public warning regarding emphasized that these messages are malicious and urged the public not to respond, not to share any personal data, and to remain vigilant against unsolicited communications leveraging the current security situation. This aligns with previously observed patterns of opportunistic social engineering campaigns that surge during periods of heightened geopolitical unrest.

Figure 3: MOI UAE post from X
Third Campaign: Cybercriminals specifically scammers have been actively exploiting the heightened regional uncertainty. Netizens in the UAE are receiving calls from scammer claims to be from the Ministry of Interior (MOI), asking them to confirm receipt of the national alert and requesting that they share their Emirates ID (EID) number for verification purposes.
Official warning from MOI UAE
On March 1, 2026, the Ministry of Interior, UAE (MOI UAE) issued a warning to netizens against fraudulent calls that may originate from the number (70614213) or any other numbers, confirming that these fall under the practices of electronic fraud and impersonation.

Figure 4: MOI UAE post from X
CPX Threat Intelligence Center also identified indications of activity linked to the Iran nexus adversary ‘Peach Sandstorm’ aka. APT33, suggesting potential targeting of entities within the UAE. Peach Sandstorm is a long standing and sophisticated adversary aligned with Iranian state interests and known for espionage, cyber sabotage, and strategic intelligence collection. The group has historically focused on environments involving sensitive technologies and critical infrastructure and is previously associated with destructive operations including the Shamoon attacks.
Peach Sandstorm activity typically involves password spray attempts across multiple accounts using common passwords often supported by reconnaissance of personnel profiles. The group also conducts spear phishing operations using job vacancy or role specific lures delivered through staged payloads involving HTML files and PowerShell scripts. Their operations may include deployment of custom malware such as the Tickler backdoor observed against UAE satellite operators as well as wiper and backdoor tools including Shamoon and TURNEDUP or FalseFont.
CPX TIC assesses that potential targeting may include critical infrastructure operators such as oil, gas, power generation, and industrial facilities along with government ministries and entities holding economic, energy, financial, and civil registry information.
The ransomware developed by the group shares the same name ‘BQTLock’ and serves as the central tool of their operations. The group’s main representative is Karim Fayad (known online as ZeroDayX or ZeroDayX1), supported by Fuch0u, who frequently appears on the group’s public communication channels. BQTLock also appears to maintain close ties with pro‑Palestinian hacktivist groups, including Liwaa Mohammed, with both sides demonstrating mutual engagement across social media platforms.
Last month, the group offered free RaaS memberships to any hacktivists who could “target the Zionist entity”.

Figure 5: INC Ransom claim from its DLS
INC Ransom group remains highly active in the region. The group claimed several compromises affecting entities in Saudi Arabia and Bahrain throughout February 2026, and previously claimed attacks on multiple UAE based organizations in January 2026, as well as in November and September 2025.
CPX Threat Intelligence Center also observed that Amazon Web Services (AWS) experienced outages affecting data centers in the United Arab Emirates, primarily impacting at least one Availability Zone (mec1-az2) in the me-central-1 (UAE) region. This resulted in loss of power, connectivity issues, and widespread service degradation across critical cloud offerings, such as EC2, RDS, EBS, Lambda, EKS, and networking APIs.
The disruptions were caused by physical debris from a successful UAE interception of incoming projectiles amid the escalating Iran-U.S. and Israel conflict, which inadvertently damaged infrastructure supporting the AWS facilities.
AWS response and ongoing risks
AWS confirmed that restoration efforts were underway, with no confirmed data loss. However, AWS also warned customers that full restoration would take hours, underscoring the risks that physical attacks pose to cloud infrastructure in conflict zones.
The CPX-TIC recommends the following measures:
Defense against DDoS
Defense against ransomware and wiper
Defense against web defacement
Defense with IOCs and TTPs
Defense against cybercriminals
Defense against cloud infrastructure
Monitor AWS Service Health Updates
Defense against Hacktivist Claims on access to ICS/SCADA Devices
Defense against Peach Sandstorm
Hunting Queries for Peach Sandstorm
Hunting for Malicious Signed File
DeviceFileCertificateInfo | where Signer in~ ("Panzhihua Bada Technology Co., Ltd.")
Suspicious DLL Side-Loading
DeviceImageLoadEvents
| where FileName in~ ("dxgi.dll", "umpdc.dll", "dwrite.dll", "feclient.dll", "iumbase.dll", "wininet.dll","dui70.dll","secur32.dll","winhttp.dll","wtsapi32.dll","userenv.dll","xmllite.dll","iviewers.dll","sspicli.dll","manifest.dll","LockHostingFramework.dll","dwmapi.dll","unbcl.dll","cabinet.dll")
| where FolderPath !contains "System32" and FolderPath !contains "syswow64" and FolderPath !contains "WinSxS" and FolderPath !contains "SoftwareDistribution"
Suspicious DLL File Creation
DeviceFileEvents
| where FileName in~ ("dxgi.dll", "umpdc.dll", "dwrite.dll", "feclient.dll", "iumbase.dll", "wininet.dll","dui70.dll","secur32.dll","winhttp.dll","wtsapi32.dll","userenv.dll","xmllite.dll","iviewers.dll","sspicli.dll","manifest.dll","LockHostingFramework.dll","dwmapi.dll","unbcl.dll","cabinet.dll")
| where FolderPath !contains "System32" and FolderPath !contains "syswow64" and FolderPath !contains "WinSxS" and FolderPath !contains "SoftwareDistribution"
Suspicious RDP and SSH Connections
DeviceNetworkEvents
| where RemotePort in ("3389", "22")
| where InitiatingProcessFileName in~ ("DataExchangeHost.exe", "LockAppHost.exe", "efsui.exe", "BioIso.exe", "presentationhost.exe", "setup.exe","CameraSettingsUIHost.exe","miiserver.exe","VGAuthService.exe","MigAutoPlay.exe")