Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

We Red Evils – Threat Actor

February 10, 2025
Reading Time: 4 mins read
in Threat Actors
We Red Evils – Threat Actor

We Red Evils

Date of initial activity

2022

Other Names

Red Evil

Location

Israel

Suspected Attribution 

Hacktivists

Motivation

Cyberwarfare
Hacktivism

Software

Servers
Network

Overview

The We Red Evils is a nascent yet increasingly prominent Israeli hacker collective that emerged in October 2023. The group has swiftly garnered attention for its cyber operations targeting nations and organizations perceived as aligned with pro-Palestinian and pro-Hamas agendas. Demonstrating a clear ideological stance, We Red Evils has carried out disruptive cyberattacks, including breaching systems tied to the Iranian Revolutionary Guards Corps and impacting critical infrastructure such as power grids in Iran. These actions signal a focused effort to leverage cyber capabilities in the broader geopolitical and ideological conflict in the Middle East. Operating across multiple platforms, We Red Evils utilizes a blend of public-facing propaganda channels and clandestine methods to coordinate and publicize their activities. Their campaigns have included defacing websites, compromising sensitive data, and executing denial-of-service attacks designed to disrupt essential services. While their tactics and techniques are not considered highly advanced compared to sophisticated nation-state actors, their operations effectively exploit vulnerabilities in targeted systems, causing significant disruptions and amplifying psychological and infrastructural impacts on their adversaries. The emergence of We Red Evils is emblematic of the growing intersection between cyberterrorism and modern geopolitical conflicts. Cyberattacks, such as those conducted by this group, serve as both a strategic and symbolic weapon, undermining confidence in critical institutions and spreading fear among civilian populations. This cyber activity also reflects a broader trend in the ongoing conflict between Israel and Hamas, where cyber warfare has become an integral tool in a multifaceted battle for control and influence.

Common targets

  • Information
  • Public Administration
  • Individuals 
  • Lebanon
  • Iran

Attack Vectors

Software Vulnerabilities

Web Browsing

How they operate

We Red Evils primarily employs a suite of techniques that target known vulnerabilities in web applications and network infrastructures. The group uses reconnaissance tools to identify misconfigured servers, outdated software, and insecure endpoints within their target networks. Exploiting these weaknesses, they deploy web defacement scripts, ransomware payloads, or denial-of-service (DoS) attacks. Notably, their attacks lack the sophistication of advanced persistent threats (APTs); instead, they rely on readily available tools and frameworks, often modifying open-source hacking kits to suit their purposes. This approach minimizes their operational complexity while maximizing the reach and impact of their campaigns. Phishing remains another key tactic in We Red Evils’ arsenal. The group creates phishing campaigns tailored to exploit geopolitical tensions, using themes designed to elicit emotional responses or manipulate victims into divulging sensitive information. These campaigns often target email accounts of government officials, media personnel, and key figures in organizations aligned with pro-Palestinian efforts. Once access is gained, the attackers leverage stolen credentials to infiltrate larger systems or spread misinformation. On the infrastructural front, We Red Evils has demonstrated a particular interest in critical systems such as energy grids, telecommunications networks, and media outlets. The group employs basic penetration testing tools like Metasploit and Burp Suite to identify exploitable vulnerabilities in industrial control systems (ICS) and supervisory control and data acquisition (SCADA) environments. While these attacks have been disruptive, they appear to focus more on causing immediate chaos rather than achieving sustained control over systems. The group’s communication and coordination heavily rely on encrypted messaging platforms such as Telegram and Signal, where they share operational updates, recruit new members, and disseminate propaganda. Public channels are also used to amplify the psychological impact of their operations, with announcements and visual evidence of successful breaches designed to spread fear among their adversaries. Furthermore, We Red Evils actively monitors pro-Hamas social media channels to identify potential targets and shape their attack narratives. We Red Evils’ operations highlight the growing accessibility of cyber tools and the rising influence of ideologically driven threat actors in global conflicts. By combining opportunistic tactics with strategic targeting, the group has demonstrated the potential for relatively unsophisticated actors to create significant disruption. Understanding their technical methods is critical for designing defenses against the evolving threat landscape they represent. Robust cybersecurity measures, enhanced monitoring of critical infrastructure, and proactive threat intelligence sharing are essential to mitigating the risks posed by groups like We Red Evils.  
References:
  • The use of CYBERTERRORISM in the Israel-Hamas War
Tags: HacktivistsHamasIranIsraelLebanonPalestineRansomwareRed EvilThreat ActorsVulnerabilitiesWe Red Evils
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Subscribe to our newsletter

    Latest Incidents

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial