Executive Summary
- Predatory Sparrow destroys $90M in Iranian crypto (June 2025), signaling shift to destructive cyber ops.
- Blue Locker ransomware cripples Pakistan Petroleum and targets 39 ministries (August 2025).
- Malaysia’s KLIA disrupted by $10M ransom demand (March 2025).
- Iranian retaliation drives 700% attack surge post–June 2025 strikes, spilling into Muslim states.
- India–Pakistan cyber war continues post–May 2025 conflict with >1.5M intrusion attempts.
- Historic but relevant: HeartSender dismantled (Jan 2025), deepfake phishing surge (H1 2025), Syrian refugee data breach (July 2024), ISKP expansion (2024–early 2025).
Situation Report
August’s threat picture reflects both current escalations and ongoing risks rooted in earlier campaigns. Destructive warfare, ransomware, and APT operations are hitting Muslim-majority states directly, while older but still active vectors (refugee data exposure, fraud kits, deepfakes) continue shaping the threat environment.
Cyber warfare targeting Muslim communities and institutions is escalating — and most organizations in this space have no threat intelligence program calibrated to their specific risk profile.
Noorstream delivers threat intelligence, vulnerability management, and offensive security assessments for high-risk environments.
Technical Breakdown
- Predatory Sparrow (Israeli-linked) – June 18, 2025: ~$90M destroyed at Iran’s Nobitex exchange via vanity blockchain addresses (“F***iRGCTerrorists”).
- Blue Locker (Pakistan) – August 2025: NCERT warned 39 ministries; Pakistan Petroleum crippled; files encrypted with
.blueextension. - KLIA (Malaysia) – March 23, 2025: $10M ransom demanded; PM rejected; NACSA confirmed major disruption.
- Iranian APTs – post–June 12, 2025: MuddyWater, APT33, OilRig, CyberAv3ngers attacked Israeli grids, hospitals, emergency systems; GPS spoofing disrupted Egypt, Jordan, UAE, Pakistan, Saudi Arabia.
- India–Pakistan conflict – May 2025 onward: 1.5M intrusion attempts; malware (
tasksche.exe, “Dance of the Hillary”); DDoS and power outages in India. - HeartSender (Pakistan) – January 29, 2025: 39 domains seized by US/Dutch; $3M+ US losses; phishing kits + YouTube tutorials.
- Deepfakes – H1 2025: 580 incidents (4x 2024); 26.8% finance fraud; impersonations of Muslim leaders.
- Syrian refugee breach (Turkey) – July 4, 2024: 3M+ refugees’ PII leaked amid anti-Syrian violence; still fueling harassment.
- ISKP digital expansion – 2024–early 2025: Building cyber-guided cells across Europe and Central Asia.
Impact Analysis
Short-term:
- Pakistan’s ministries and Malaysia’s aviation disrupted.
- Iranian crypto destruction destabilized financial trust.
- Muslim states exposed to GPS spoofing collateral.
- Refugee populations vulnerable from historic data leaks.
Long-term:
- Cyber war strategy has pivoted to destruction-first.
- India–Pakistan rivalry locked into cyber confrontation cycle.
- AI deepfakes will increasingly target Muslim leaders/donors.
- Refugees and NGOs remain chronic digital weak points.
Operational Takeaways
- Harden for destructive attacks: offline backups, segmentation.
- Implement callback verification for financial and leadership comms.
- Track APT campaigns from Iranian, Indian, and Israeli-linked operators for spillover.
- Enforce PII minimization and encryption at NGOs and refugee-facing systems.
Timeline of Key Cyber Incidents
- July 4, 2024 – Syrian refugee data breach in Turkey exposes 3M+ records
- 2024–Early 2025 – ISKP expands digital operations across Europe & Central Asia
- January 29, 2025 – HeartSender cybercrime network dismantled (39 domains seized)
- March 23, 2025 – Malaysia’s KLIA airport hit with $10M ransom demand
- May 2025 – India–Pakistan cyber conflict triggers >1.5M intrusion attempts
- June 18, 2025 – Predatory Sparrow destroys $90M at Iran’s Nobitex exchange
- June 2025 onward – Iranian APTs escalate 700% in response to strikes; GPS spoofing hits Muslim states
- August 2025 – Blue Locker ransomware cripples Pakistan Petroleum & targets ministries

