You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Hezbollah Cyber Group

Hezbollah Cyber Group

ID: 03334cb4ca6bc8cc196742d5901bda2e26640
Hacktivist Group CyberTerrorism Hacktivism State-Sponsored
Threat types: Cyber Unit, Propaganda, State-Sponsored
Indonesia IND, IDN, ESP, USA
Updated: 2026-03-21
Created: 2026-03-21
Progress: 71% Completeness: 63% Freshness: 90%
Operation zone: India, Indonesia, Spain, United States
Aliases Limited alias preview
HCG HCT Hi****************** Hi*******************
HI****************** HI****************** hi********************* Hi****************
Showing 2 of 8 aliases in free preview.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

No techniques mapped yet.
Strategic Intelligence
Limited preview
Last updated: 2026-03-21T20:27:14+00:00
Hezbollah Cyber Group — Lebanon-Based Ecosystem (APT & Propaganda Fronts)

CLASSIFICATION: Unclassified / Open Source


Executive Summary

“Hezbollah Cyber Group” is best understood not as a single monolithic unit but as a cluster of Lebanon-based or Hezbollah-aligned cyber entities that span espionage APTs (e.g., Volatile/Lebanese Cedar; POLONIUM / Plaid Rain) and propaganda/ops fronts seen during the 2023–2025 Israel war cycle (e.g., Radwan Cyber Pal, NetHunt3r). Public technical reporting attributes telecom/ISP intrusions and custom tooling (e.g., Caterpillar web shell, Explosive RAT) to Lebanese Cedar since at least 2012, and documents POLONIUM’s 2022–2023 campaigns against Israeli sectors. Microsoft further assessed in 2024–2025 that Iran–Hezbollah collaboration in cyber/influence operations intensified, while 2024–2025 narratives describe Hezbollah-aligned fronts claiming compromises of Israeli ministries and information assets. Overall: capability varies from low-soph hacktivism to persistent espionage; intent focuses on collection, psychological impact, and pressure on Israel. Confidence: medium (primary vendor reports + think-tank corroboration).

  • Ecosystem construct. Credible sources describe Lebanese Cedar (Volatile Cedar; MITRE G0123) as a Lebanese threat group linked in open sources to Hezbollah and active since ~2012 (worldwide victims; heavy focus on Israel and telecoms/hosting).
  • Additional node (POLONIUM / Plaid Rain). Microsoft (2022) exposed POLONIUM (now Plaid Rain) as Lebanon-based, primarily targeting Israeli organizations; assessed coordination with Iran MOIS-affiliated actors.
  • Propaganda fronts. 2024–2025 analyses cite Hezbollah-aligned “fronts” (e.g., Radwan Cyber Pal, NetHunt3r) claiming ministry-level compromises and document dumps—high propaganda value; varying technical depth.
  • Iran link. Microsoft (Feb 2024) described increasing Iran–Hezbollah collaboration in cyber/influence ops during the Gaza war, suggesting tighter operational proximity.
Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Empty Limited preview
No content yet.
IOC Appendix now
Saved successfully.
OSINT Library
Empty Limited preview
No content yet.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/2

Address Verification SOCMINT
www.youtube.com/@HI****************** Restricted Not integrated
www.tiktok.com/@hi********************* Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–2 of 2 images
Reference image Free Preview
Reference image
Reference image Free Preview
Reference image