You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Israel Cyber Defense

Israel Cyber Defense

ID: 415a6974cec2575e03136bae36f5146d
Hacktivist Group Hacktivism
Threat types: Hacking, DDoS, Propaganda, Information Channel, Coordination Node
Israel
Updated: 2026-01-13
Created: 2025-10-20
Progress: 49% Completeness: 49% Freshness: 50%
Operation zone:
Aliases Limited alias preview
ICD IsraelCyberDefense
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

Israel Cyber Defense (ICD) — pro-Israel hacktivist entity/channel cited in multiple 2023–2025 conflict roundups. Evidence shows a Telegram presence and inclusion in rosters of groups active around DDoS/defacement narratives; direct, independently verified operations specifically attributable to ICD are limited in OSINT. Treat primarily as an amplification/coordination node.


Technique Technique name Tactics Evidence
T1585 Establish Accounts TA0042
  • 2023-10-12 — ICD enumerated among pro-Israel actors; presence consistent with Telegram persona/channel use. · ref
  • 2023-10-18 — CYFIRMA lists ICD – Israel Cyber Defense in its pro-Israel group roster. · ref
  • 2023-12-05 — Trustwave SpiderLabs places ICD in catalog of groups engaged around the conflict (mostly DDoS context). · ref
T1102 Web Service TA0011
  • 2023–2025 — Third-party telemetry indexes a Telegram channel for ICD (e.g., @icyberdefence), indicative of web-service–based broadcasting. · ref
T1498 Network Denial of Service TA0040
  • 2023–2025 — Conflict-era reviews show pro-Israel groups engaging in DDoS; specific ICD-led DDoS not independently confirmed. INFERENCE. · ref
Strategic Intelligence
Limited preview
Last updated: 2025-10-20T21:05:01+00:00
Israel Cyber Defense (ICD) — Pro-Israel Hacktivist / Information Channel

CLASSIFICATION: Unclassified / Open Source


Executive Summary

Israel Cyber Defense (ICD) appears in multiple threat-intel roundups as a pro-Israel hacktivist entity / channel active since at least October 2023, cataloged alongside other pro-Israel banners that mobilized online during the Gaza/Israel war and subsequent Iran–Israel cyber escalations. Public evidence shows presence and activity as a Telegram channel and mentions in curated lists of groups engaged in DDoS/defacement narratives, but direct, independently verified operations specifically attributable to ICD are limited in open sources. ICD should therefore be treated primarily as an amplification and coordination node within the pro-Israel hacktivist ecosystem, with low demonstrated technical capability and media/propaganda value as its main impact vector. Confidence: medium-low (multi-source listings; sparse first-party forensics).

  • Positioning. Listed by DarkOwl, SOCRadar, Flashpoint, CYFIRMA and Trustwave/SpiderLabs among pro-Israel groups active in the 2023–2025 conflict period; ICD is specifically referenced by name (often as “ICD – Israel Cyber Defense”).
  • Footprint. A Telegram channel presence is observable in third-party indexing (handle variants like @icyberdefence), consistent with other pro-Israel banners that use Telegram for claims, “ops” broadcasts, and re-posts.
  • Objectives (observed ecosystem). Counter-messaging vs. pro-Hamas / pro-Iran hacktivists; visibility and morale for the pro-Israel audience; potential mobilization for nuisance-level actions (DDoS/defacement claims) typical of the broader milieu. INFERENCE (medium) based on comparative analyses of the Israel–Iran hacktivist front where only “4–5 pro-Israel groups” regularly responded.
  • Mode. Media-first posture (lists, threads, infographics, “ops” announcements) more than demonstrable deep intrusions, in line with most hacktivist campaigns during the period.
Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Empty Limited preview
No content yet.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Empty Limited preview
No content yet.
IOC Appendix now
Saved successfully.
OSINT Library
Empty Limited preview
No content yet.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/1

Address Verification SOCMINT
t.me/icy********** Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

No images found for this threat.