This post is also available in:
עברית (Hebrew)
As the anniversary of OpIsrael approaches, cybersecurity experts are warning that this notorious hacktivist campaign may expand its scope to include not only Israel but also its allies, including the United States and the United Kingdom. The campaign, typically focused on disruptive cyberattacks, including ransomware and Distributed Denial-of-Service (DDoS) attacks, could see an escalation in its targets and tactics this year.
OpIsrael is a cyber assault that occurs nearly annually on April 7th by anti-Israel hacker groups. The event coincides with Holocaust Remembrance Day, and is supposedly a response to the Israel-Palestine conflict. Similarly, OpJerusalem, another campaign, is timed to align with Iran’s Al-Quds Day, which this year was on March 28th. These campaigns have grown in both frequency and intensity since their inception, with a broader coalition of global hacktivists involved. Historically, these annual cyberattacks have led to temporary disruptions of Israeli websites across various sectors, including government, military, and private industries.
According to a recent report by cybersecurity company Radware, there has been an uptick in communications and coordination among hacktivist groups in anticipation of these campaigns. Notably, a private Telegram channel, ‘#OpIsrael’, has been used to rally over 50 hacktivist groups to take action.
While the main focus remains on Israeli targets, Radware’s analysis suggests that this year’s campaigns may also extend to other countries, particularly the US and the UK. Hacktivist groups are increasingly collaborating across borders, with some joining forces with like-minded collectives to amplify their impact. According to the report, the groups’ motivations range from opposition to Israeli policies to broader anti-Western sentiments.
Experts have also observed that the typical preparatory actions for these attacks—vulnerability scanning and reconnaissance—typically begin in late March, ramping up as the anniversary dates approach. Propaganda efforts and operational coordination are expected to intensify in the coming days, with hacktivist groups using platforms such as Telegram and X (formerly Twitter) to recruit members and organize attacks.
As these campaigns continue to evolve, the cybersecurity community remains vigilant, monitoring for any signs of escalation and preparing to defend against potential disruptions.