149 Hacktivist DDoS Attacks Hit 110 Organizations Across 16 Countries

Feb 28 - Mar 2, 2026 · 149 attacks

HIGH

By Karim El Labban · ZERO|TOLERANCE

Between February 28 and March 6, 2026, twelve pro-Iranian hacktivist groups launched 149 distributed denial-of-service attacks against 110 distinct organizations across 16 countries. The campaign was triggered by the February 28 US-Israeli military strikes on Iran.

Two groups - DieNet (59 claims) and Keymous+ (51 claims) - drove nearly 70% of all activity.

Targets included major banks (Riyad Bank, Al Rajhi Bank), airports (Kuwait International Airport), telecoms (Batelco, du), electricity and water authorities, and government ministries across Kuwait, Saudi Arabia, Bahrain, UAE, Qatar, and Jordan.

01

KEY FACTS

  • .What: 149 DDoS attacks by 12 pro-Iranian hacktivist groups in 3 days.
  • .Who: 110 organizations across 16 countries - banks, airports, telecoms, government.
  • .Top Groups: DieNet (59 claims), Keymous+ (51 claims), NoName057(16).
  • .Most Targeted: Kuwait (28%), Israel (27.1%), Jordan (21.5%).
02

WHAT HAPPENED

On February 28, 2026, the United States and Israel launched coordinated military strikes on Iran - Operation Epic Fury and Operation Roaring Lion.

Within hours, twelve pro-Iranian hacktivist groups activated a pre-planned DDoS campaign against civilian infrastructure across the Gulf and broader Middle East.

The first wave of attacks struck financial institutions and government portals in Kuwait, which absorbed 28% of total targeting.

DieNet, the most active group, published structured target lists on Telegram before launching attacks - indicating that targeting packages had been prepared in advance of the kinetic escalation.

Between February 28 and March 6, the groups executed 149 DDoS attacks against 110 distinct organizations in 16 countries.

DieNet led with 59 attack claims, followed by Keymous+ with 51. The attacks used volumetric flooding (UDP/TCP amplification), application-layer HTTP/HTTPS floods, and DNS query floods to overwhelm targets.

The UAE Cybersecurity Council confirmed intercepting between 90,000 and 200,000 attacks per day at peak volume.

Notably, NoName057(16) - a Russian-linked hacktivist group typically focused on European and Ukrainian targets - participated in the campaign, indicating cross-pollination between pro-Russian and pro-Iranian hacktivist ecosystems.

Targets spanned critical infrastructure sectors: Riyad Bank and Al Rajhi Bank in Saudi Arabia, Kuwait International Airport, Batelco in Bahrain, du in the UAE, and electricity and water authorities across multiple GCC states.

Of 21 threat groups tracked by researchers, 15 (71.4%) were identified as state-sponsored. The campaign represented the most intense period of hacktivist cyber operations the Gulf region has experienced.

03

WHAT WAS TARGETED

  • .Riyad Bank and Al Rajhi Bank (Saudi Arabia) - two of the Kingdom's largest financial institutions
  • .Kuwait International Airport - primary international gateway handling 15+ million passengers annually
  • .Batelco (Bahrain) - the country's incumbent telecommunications provider
  • .du (UAE) - one of two major telecoms serving the Emirates
  • .Government ministries across Qatar, Bahrain, UAE, Kuwait, Saudi Arabia, and Jordan
  • .Electricity and water authorities in multiple GCC states

The targeting was not random. DieNet published structured target lists on Telegram before launching attacks, indicating pre-planned targeting rather than opportunistic attacks. Kuwait absorbed the highest share (28%), followed by Israel (27.1%) and Jordan (21.5%).

04

THE GROUPS BEHIND THE CAMPAIGN

DieNet (59 attack claims): The most active group. Published structured target lists on Telegram prior to attacks. Operational tempo of nearly 10 attacks per day suggests significant botnet resources.

Keymous+ (51 attack claims): The second most active group, with documented history of targeting Middle Eastern infrastructure in alignment with Iranian geopolitical interests.

NoName057(16): A Russian-linked hacktivist group that pivoted from its typical focus on European and Ukrainian targets - indicating coordination between pro-Russian and pro-Iranian hacktivist ecosystems.

05

ATTACK METHODOLOGY

The DDoS attacks used a combination of volumetric flooding (UDP/TCP amplification), application-layer attacks (HTTP/HTTPS floods), and DNS query floods. The UAE Cybersecurity Council confirmed intercepting 90,000 to 200,000 attacks per day at peak.

71.4% of tracked threat actors (15 of 21 groups) were identified as state-sponsored.

06

INDICATORS OF COMPROMISE

Threat Actor Groups (12 total):

  • .DieNet (59 claims), Keymous+ (51 claims), NoName057(16) (pro-Russian)
  • .Nation of Saviors, Conquerors Electronic Army, Sylhet Gang, 313 Team
  • .Handala Hack, APT Iran, Cyber Islamic Resistance, Dark Storm Team, FAD Team

Campaign Statistics:

  • .149 DDoS attacks in ~72 hours (Feb 28 - Mar 6, 2026)
  • .110 organizations across 16 countries
  • .90,000-200,000 attacks per day intercepted (UAE Cybersecurity Council)
  • .71.4% of tracked actors identified as state-sponsored

Geographic Distribution:

  • .Kuwait: 28%, Israel: 27.1%, Jordan: 21.5%

Coordination:

  • .Telegram (primary operational channel and target list distribution)
07

ZERO|TOLERANCE Advisory

1. Always-On DDoS Protection - not on-demand scrubbing

2. Geographic Traffic Filtering during elevated geopolitical tension

3. Cross-Sector Threat Sharing between banks, telecoms, airports, and government

4. Redundant DNS and CDN with automatic failover

08

SOURCES

The Hacker News, Palo Alto Unit 42, SOCRadar, AGBI, UAE Cybersecurity Council

RELATED ANALYSIS

Cisco Systems: ShinyHunters Claim 3M Salesforce Records, 300+ GitHub Repos, and AWS Data in Triple-Vector Extortion
Mar 31, 2026 · 3M+ records claimed · 300+ repos · April 3 deadline
Oracle's Dual Breach: 6M Cloud SSO Records Stolen, 80 Hospitals Compromised - and a Denial That Collapsed Under Evidence
Mar 21, 2025 · 6M records · 140K tenants · 80 hospitals
TriZetto/Cognizant: 3.4M Patient Records Stolen in 11-Month Healthcare Supply Chain Breach
Feb 6, 2026 · 3.4M patients · 11-month dwell · ~24 lawsuits
Infinite Campus: ShinyHunters Breach K-12 Platform Serving 11M Students via 10-Minute Vishing Attack
Mar 18, 2026 · 11M students · 3,200+ districts · 46 states
Crunchyroll: 6.8M Users Exposed After Infostealer Malware Compromises TELUS Support Agent's Okta Credentials
Mar 12, 2026 · 6.8M users · 100GB stolen · $5M ransom
MORE DATA BREACHES →