Blog

Escalation in the Middle East: Tracking the Israel–Iran Conflict Across Military and Cyber Domains

This post explores the convergence of physical warfare and cyber operations in the escalating confrontation between Israel and Iran.

Default Author Image
June 18, 2025

Tensions between Iran and Israel have sharply intensified following Israel’s launch of “Operation Rising Lion” on June 13, 2025—a large-scale military campaign targeting Iranian nuclear facilities, military bases, command centers, and strategic sites across various Iranian provinces. Within 24 hours, Israel claimed to have eliminated senior Iranian military and nuclear personnel, while inflicting significant damage on Iranian nuclear infrastructure and anti-air defense systems.

In direct response, Iran launched “Operation True Promise 3,” fully transforming the long-standing shadow war between the two nations into a full-blown conflict. The world has watched with bated breath as Iran launches waves of ballistic missiles at Tel Aviv, while the IAF (Israeli Air Force) carries out additional airstrikes deep within Iranian territory.

“There’s no clear calculus for what happens next—‘If Israel does X, Iran will do Y.’  Geopolitical risk in the Middle East is perpetually in a gray zone between war and peace. What’s most likely now is further escalation, both on the ground and in the darkest corners of the web, before any calm.”

Andrew Borene, Flashpoint Executive Director of Global Security

As this crisis intensifies, understanding the geopolitical implications and broader consequences becomes increasingly essential. Flashpoint recently held a community call to provide a comprehensive analysis of the conflict’s latest developments, military actions, cyber risks, political responses, and the potential ripple effects across the region. Missed it? Flashpoint customers can watch the recording via our Customer Help Center.

Timeline of the Israel-Iran Conflict

Flashpoint analysts are closely monitoring the situation across physical, geopolitical, and cyber domains to assess ongoing risks and potential or emerging threats. The following timeline outlines the latest developments in the Israel-Iran conflict since the launch of Operation Rising Lion on June 13, 2025.

2025
June 13
Israel softens Iranian air defenses using UAVs and anti-tank guided missiles staged inside Iran.
Israel launches “Operation Rising Lion,” targeting Iran’s nuclear program, air defenses, missile capabilities, and military leadership.
Iran announces “Operation True Promise 3,” launching ballistic missiles at Tel Aviv.
June 14
IAF conducts over 150 strikes on more than 400 Iranian targets, including nuclear and military infrastructure.
Iran fires approximately 200 ballistic missiles and over 200 drones toward Israeli territory.
IAF conducts more than 80 targets in Tehran. IAF simultaneously carries out airstrikes in Tabriz and Shiraz.
June 15
Iran fires a new barrage of ballistic missiles towards Tel Aviv and Haifa.
Israel conducts extensive airstrikes deep within Iran.
June 16
Iran announces it is preparing for a very large strike against Israel.
Israeli airstrike hits the Iranian state TV headquarters and targets underground infrastructure at the Shahid Baqeri base.
Iran launches approximately 10 ballistic missiles targeting Israel.

The Escalating Cyber Front

“This marks the opening of yet another rapidly expanding flashpoint within the global context of a new hybrid Cold War, one that will be fought both on the ground and in the darkest corners of the web.”

Andrew Borene, Flashpoint Executive Director of Global Security

In parallel with the ongoing military operations, Flashpoint has observed a sharp escalation in cyber activity. Since the onset of the conflict, cyberattacks targeting Israel have surged by 700%—spanning from destructive cyber operations to disinformation campaigns. As Iran’s supply of ballistic missiles dwindles, Flashpoint assesses that cyber operations will become Iran’s primary asymmetric tool in the continuing conflict.

State-Sponsored Threat Actor Groups and Hacktivists

The following state-sponsored Advanced Persistent Threat (APT) groups have been observed in the Israel-Iran conflict:

  1. APT34 (AKA OilRig)
  2. APT39 (AKA Remix Kitten / Chafer)
  3. APT404
  4. Handala Hack for Iran
  5. Al-Qassam Cyber Brigades

These groups are notorious for cyber-espionage, particularly for their destructive cyber operations and psychological-warfare capabilities. Flashpoint has observed that these groups heavily favor wiper malware—which focuses on maximum destruction of data and systems. Leveraging them, these groups have reportedly disrupted Israeli systems serving both military and civilian applications.

At the same time time, a wide array of hacktivist groups have declared support for Iran:

  • Mysterious Team Bangladesh
  • Arabian Ghost
  • OpIsrael
  • Killnet
  • CyberJihad Movement
  • DieNet
  • LulzSec Black 
  • Golden Falcon

In contrast, several hacktivist groups have either announced their support for Israel or have denounced Iran:

  • Predatory Sparrow
  • Anonymous OpIran
  • Syrian Electronic Army
  • Edalate Ali
  • GhostSec

Flashpoint continues to monitor these actors for coordinated campaigns, disinformation efforts, and potential spillover into allied or adjacent geopolitical regions.

What to Expect from the Israel-Iran Conflict

This latest conflict has been marked by widespread military strikes, sophisticated cyberattacks, and intensifying rhetoric and political tensions. The situation remains highly volatile, with potential for further regional destabilization, rising casualties on both sides, and broader international involvement.

Flashpoint will continue to monitor the ongoing conflict. For any new updates, bookmark this page to stay informed of upcoming developments. Customers can view the community call’s recording, summary, and additional resources through Flashpoint’s Customer Help Center.

Learn More Today.