Feline Fury Operation as Hacktivist Groups Target Israel with Cyber Attacks
The platform is accessible through the Kitten. The group serves as a private hub for managing attacks, sharing leaked data, and coordinating online propaganda.
According to recent analysis, Kitten is tightly connected to a cluster of Iranian-linked infrastructure. Its early development traces back to a subdomain of Zagrosguard. Ir, revealing a probable link to a network operated from inside Iran.
DNS and IP intelligence point to servers hosted on Iranian IP addresses 46.38.147.116 and 185.164.72.226, both associated with a platform known as Zagros IP, a pseudo-company claiming to “violate Iranian sanctions” while offering proxy services through domains such as zagros-ip—ir and zagros-ip.com.
Though Zagros promotes itself as a legitimate service for Iranian users seeking access to domestic or international systems, technical inspection shows inconsistencies. It lacks valid corporate registration and appears to act as a facade for cyber operations.
Source code analysis reveals that Kitten’s platform was partially built and tested within infrastructure owned by Zagrosguard, suggesting a familiar developer or a state-aligned contractor.
Further investigations uncovered a Telegram recruitment channel linked to Zagros IP (@zagros_ip), and two active WhatsApp numbers registered under Turkish providers, indicating cross-border coordination between Iranian and external operatives.
Job postings on Iranian employment sites also advertise positions for “programming trainees” in security-related tasks, aligning with the expansion of this online offensive unit.
Among the groups active on Kitten are Handala Hacking Group, KilledByIsrael, and CyberIsnaadFront factions that collectively support Iran’s cyber and information warfare operations.
While Handala is widely known for public doxing of Israeli soldiers, emerging groups like CyberIsnaadFront play key roles in managing the coordination platform and infrastructure.
The portal’s API modules, extracted from the platform’s backup, reveal endpoints for image and media handling, designed to distribute photos and videos from attack operations.
Scripts such as image.php and media.php demonstrate secure input validation but also a structure optimized for hosting large volumes of multimedia propaganda.
These APIs appear tailored for publishing visual leaks, suggesting a focus on psychological warfare alongside technical disruption.
The hacktivist coalition has targeted not only personal data leaks but also industrial control systems (ICS) and programmable logic controllers (PLC), expanding its reach into Israel’s critical infrastructure.
Analysts warn that the Kitten network could become a central coordination hub for groups like CyberAv3ngers or CyberToufan, intensifying Iran-linked hacktivism across the Middle East conflict landscape.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Feline Fury Operation as Hacktivist Groups Target Israel with Cyber Attacks appeared first on Cyber Security News.
A new weekend has arrived, and today, you can save big on the 4K Movies,…
Resident Evil Requiem fans believe next month’s mysterious content update will add a new version…
Wrestlemania 42 is finally here, and I’m here in Las Vegas at Allegiant Stadium to…
Game of Thrones alum Charles Dance has reportedly entered talks to join The Batman Part…
Tension: We crave sustainable food innovation yet recoil from eating anything that didn’t come from…
Tension: We perform intimacy online while starving for genuine connection offline. Noise: The algorithm rewards…
This website uses cookies.