
The platform is accessible through the Kitten. The group serves as a private hub for managing attacks, sharing leaked data, and coordinating online propaganda.
The “Kitten” Network and its Iranian Roots
According to recent analysis, Kitten is tightly connected to a cluster of Iranian-linked infrastructure. Its early development traces back to a subdomain of Zagrosguard. Ir, revealing a probable link to a network operated from inside Iran.
DNS and IP intelligence point to servers hosted on Iranian IP addresses 46.38.147.116 and 185.164.72.226, both associated with a platform known as Zagros IP, a pseudo-company claiming to “violate Iranian sanctions” while offering proxy services through domains such as zagros-ip—ir and zagros-ip.com.

Though Zagros promotes itself as a legitimate service for Iranian users seeking access to domestic or international systems, technical inspection shows inconsistencies. It lacks valid corporate registration and appears to act as a facade for cyber operations.
Source code analysis reveals that Kitten’s platform was partially built and tested within infrastructure owned by Zagrosguard, suggesting a familiar developer or a state-aligned contractor.
Further investigations uncovered a Telegram recruitment channel linked to Zagros IP (@zagros_ip), and two active WhatsApp numbers registered under Turkish providers, indicating cross-border coordination between Iranian and external operatives.
Job postings on Iranian employment sites also advertise positions for “programming trainees” in security-related tasks, aligning with the expansion of this online offensive unit.
Coordinated Hacktivist Front
Among the groups active on Kitten are Handala Hacking Group, KilledByIsrael, and CyberIsnaadFront factions that collectively support Iran’s cyber and information warfare operations.
While Handala is widely known for public doxing of Israeli soldiers, emerging groups like CyberIsnaadFront play key roles in managing the coordination platform and infrastructure.
The portal’s API modules, extracted from the platform’s backup, reveal endpoints for image and media handling, designed to distribute photos and videos from attack operations.
Scripts such as image.php and media.php demonstrate secure input validation but also a structure optimized for hosting large volumes of multimedia propaganda.
These APIs appear tailored for publishing visual leaks, suggesting a focus on psychological warfare alongside technical disruption.
The hacktivist coalition has targeted not only personal data leaks but also industrial control systems (ICS) and programmable logic controllers (PLC), expanding its reach into Israel’s critical infrastructure.
Analysts warn that the Kitten network could become a central coordination hub for groups like CyberAv3ngers or CyberToufan, intensifying Iran-linked hacktivism across the Middle East conflict landscape.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Feline Fury Operation as Hacktivist Groups Target Israel with Cyber Attacks appeared first on Cyber Security News.
Discover more from RSS Feeds Cloud
Subscribe to get the latest posts sent to your email.
