Amid Israel-Iran War, Iran’s State TV was Hacked Mid-Broadcast; A Cryptocurrency Heist Worth $90 M.

Israel-Iran War, Iran’s State TV was Hacked Mid-Broadcast; A Cryptocurrency Heist Worth $90 M.
According to several sources, Iran’s state-owned television network was breached Wednesday night in order to snuff out regular programming and broadcast films advocating for anti-government demonstrations in the streets.
Although Iran blamed Israel for the incident, the identity of the perpetrator is still unknown, according to Iran International.
The broadcaster was cited as saying, “If you encounter interruptions or irrelevant messages while watching different TV channels, it is due to enemy interference with satellite signals.”
The state television hack is the most recent in a series of cyberattacks inside Iran that have been traced to people with ties to Israel. It also occurred at the same time as Iran’s biggest cryptocurrency exchange, Nobitex, and Bank Sepah were hacked.
More than $90 million was stolen as a result of the Nobitex hack, marking a blatant intensification of the cyberwar that has been simmering between Iran and Israel for more than ten years.
“Iranian entities have experimented with virtual assets as both a financial workaround and as a strategic asset to support broader geopolitical ambitions — including the proliferation of advanced weapons technology,” stated TRM Labs. “This latest incident highlights how crypto exchanges, once peripheral to conflict, are increasingly becoming strategic targets for geopolitical actors.”
The most recent development also comes as Israeli officials disclosed that Iran is using private security cameras placed throughout Israel to obtain real-time intelligence, a strategy that Russia employed following its 2022 invasion of Ukraine.
Refael Franco, the former deputy director general of the Israel National Cyber Directorate, stated, “We know that in the past two or three days, the Iranians have been trying to connect to cameras to understand what happened and where their missiles hit to improve their precision.”
Since the start of the most recent flare-up, Israel has been the target of roughly 40% of all hacktivist DDoS activity, according to cybersecurity firm Radware. DieNet, a hacker collective, threatened to start cyberattacks against the United States on June 17 if it joined the war against Iran.
Since then, additional groups, including Arabian Ghosts, Sylhet Gang, and Team Fearless, have spread the message, indicating that although the fight continues on the ground, these entities may be establishing a possible cyber-collaboration.
“Businesses are advised to exercise the utmost caution. The warning indicators are obvious. If the cyber crossfire becomes worse, supply chains, critical infrastructure, and even multinational corporations might end up as collateral targets,” according to Pascal Geenens, director of threat intelligence at Radware.
“The Israel-Iran conflict of 2025 is a stark illustration of modern hybrid warfare, where bytes and narratives are as much a part of the fight as bombs and missiles.”
According to a two-part analysis by CloudSEK, compared to less than half a dozen pro-Israeli groups participating in hacktivist activities, over 35 different pro-Iranian groups have coordinated operations against Israeli infrastructure.
According to security expert Pagilla Manohar Reddy, “the attacks primarily consisted of DDoS assaults, website defacements, and claimed data breaches targeting government sites, military systems, and critical infrastructure.”
“Most considerably, these latest assaults uphold the same style of overstatement and misinformation that has defined the broader hacktivist ecosystem, with groups going on to take credit for unrelated service outages, recycle old data leaks, and expand damage claims for media attention rather than attaining substantial operational impact.”
About The Author:
Yogesh Naager is a content marketer who specializes in the cybersecurity and B2B space. Besides writing for blogs, he also writes for brands such as Craw Security, Bytecode Security, and NASSCOM.
Read More:
APT36 Phishing Campaign Aims at Indian Defense with Credential-Stealing Malware