- Mr. Hamza claimed over half of the strikes in a coordinated wave of digital retaliation
- Hacktivists redirected Fury from Israel to America in a fantastic 48-hour escalation
- US military -bound producers became primary targets in a pointed cyber warning shot
A sudden and massive increase in distributed denial of service (DDOS) attacks against US companies has coincided with Washington’s commitment to the Israel-Iran conflict.
According to Radware’s director of threat information, Pascal Geenens, between June 21 and 22, 2025, Hacktivist-led DDOS requirements rose by 800%.
This dramatic increase was parallel to a decrease of 900% in attack against Israel, suggesting a conscious redirection of the focus away from Israel and against its most prominent allies.
Key groups behind the DDOS scaling
The tip of cyber -hostility is largely attributed to the actions of a few specific threat groups.
Mr. Hamza, a hacktivist group known for its cyberattacks, was responsible for more than half of the alleged attacks in the United States, while the mysterious Team Bangladesh and Keynous+ each assumed responsibility for over 17%.
The presence of other smaller groups, such as Team Fearless (PS), indicates another broad if loosely organized, coalition acting on a shared political motivation.
Radware’s data suggests that this adjustment stems more from Anti-usa’s mood over its attitude in Middle Eastern conflict than from any centralized coordination.
Of crucial importance included the sectors targeted during the escalation on June 22, manufacture, finance and government.
Preparation was not only in terms of volume, but also in its specificity, with many of the victims tied to military and aerospace production.
This pattern points to more than random disturbance, it reflects a calculated effort to destabilize core defense and financial infrastructures.
“In particular, many of the manufacturing goals were associated with military and defense production, especially companies involved in air defense and aerospace systems,” Geenens emphasized.
The nature of DDOS attacks makes it difficult to determine long-term strategic intentions, but their use as a disturbing tool is clear.
Hacktivist-driven campaigns have historically served as early warnings of more sustained or harmful attacks.
These assaults are therefore more than digital noise, they may well shade deeper penetration.
Companies that depend on online operations from government contractors to sellers using E -trading platforms must strengthen their cyber resistance.
For those who build new online stores using E -trading site builders, security protocols now require as much attention as ease of use or design.
As a result, it is no longer a matter of caution, but a necessity to choose providers that offer the best DDOS protection but a necessity.



