Resecurity IranLinked Threat Actors Leak Visitors and Athletes Data from Saudi Games

pCyber Threat Intelligenceppdata leak data breach dark web digital identity sport Iran IsraelppToday June 22 2025 the threat actors associated with the Cyber Fattah movement leaked thousands of records containing information about visitors and athletes from past Saudi Games one of the major sports events in the Kingdom The stolen data has been leaked in the form of SQL dumps  the actors gained unauthorized access to phpMyAdmin backend and exfiltrated stored records Resecurity views this incident as part of a broader information operation IO carried out by Iran and its proxies for various objectives ppBased on our assessment this is an example of Iran using data breaches as part of a larger antiUS antiIsrael and antiSaudi propaganda activity in cyberspace targeting major sports and social events Due to the significant scale of the data breach and the precedent set by Iranian proxies attacking major sporting event Resecurity is sharing the collected intelligence to raise awareness within the cybersecurity community and to equip stakeholders with actionable insights and risk mitigation strategiesppThe leak was announced at 627 PM PST on Cyber Fattahs official Telegram channel following the DDoS attacks on Truth Social a popular social media network after the US conducted airstrikes on Irans nuclear sitesppAccording to the official website of the event ppthe Saudi Games is the largest national sporting event held annually in the Kingdom It is a multisport combined tournament featuring more than 53 sports with over 6000 athletes participating The event contributes to achieving several goals of the Kingdoms Vision 2030 including raising the quality of life through sports excellence inspiring Saudi youth and creating an emerging sports generation capable of representing the Kingdom in international sports forums by revealing and developing talents and providing spaces and opportunities to practice all sports activitiesppNotably this incident is significant due to increasing IsraelIran tensions with threat actors aiming to capitalize on the important role of the Kingdom of Saudi Arabia and the United States in regional relationships and security Several Hezbollahlinked Hamaslinked and proIranian groups in Iraq also amplified the incident by integrating it with targeted propaganda activities via digital media channelsppThe data originates from a database presumably related to the Saudi Games 2024 official website where visitors athletes and their teams register and share their personal information for further validation and activation of their profiles The actors described the event as one of the largest in the region massively followed locally and officially launched by the Government of the Kingdom of Saudi Arabia to promote sports nationwide It is likely that the choice of target was not random and was part of an information operation IO orchestrated by Iran to spread a narrative of insecurityppAfter the recent announcement on Cyber Fattah channels the data was leaked in one of the prominent underground communities on the Dark Web The actor known by the moniker ZeroDayX His profile is a recent burner profile and contains only two posts which confirms that it was likely created to promote and distribute the stolen data across the Dark Web It is very common for the parties behind major data leaks to use a front actor or in this case a burner profile to release the data thereby obscuring attributionppThe leaked data contains multiple databasesppNotably the first nonpublic claims about the compromise of Saudi Games began circulating on the Dark Web at the beginning of May 2025 Resecurity informed trusted law enforcement partners about this activity and shared artifacts obtained from one of the sources in Iran The timestamp of the SQL dump creation suggests that a threat actor generated it on May 5 2025ppThe actor associated with several other data breaches affecting the Kingdom was attempting to monetize stolen data from Saudi Games in a private capacity It is possible that the mercenary or the actual actor linked to Iranian activities wanted to profit from it on the side Such behavior was previously observed by specialists from our HUNTER team threat intelligence investigations who tracked actors from Iran ppBased on information collected from sources these actors conducting attacks on behalf of foreign states are often not well paid therefore they seek alternative monetization methods which involve certain risks if they are identified Resecurity has established trusted contacts with several of these actors to acquire sensitive intelligence helping organizations defend against planned attacks by Iran As a result of Human Intelligence HUMINT engagement Resecurity was able to acquire the complete data set In contrast the one leaked via a Dark Web forum recently was limited to text recordsppThe breach of such a scale contains a trove of sensitive data ranging from personally identifiable information PII of visitors and athletes to International Bank Account Numbers IBANs and medical examination certificates shared with the event organizerspp IT staff credentialspp government officialspp athletesvisitors informationpp passports and ID cardspp bank statements IBAN certificates and other recordspp medical formsppThe most concerning issue is the insecure storage
of personal documents in the form of scans which have been targeted by
threat actors Cyber Fattah was able to exfiltrate thousands of
sensitive documents related to Saudi citizens and foreigners visiting
the KingdomppThe artifacts observed in the leak confirm references to Saudi GamesppThe activities of Cyber Fattah align with a broader trend of hacktivism in the Middle East where groups frequently engage in cyber warfare as a form of activism In some cases it is complicated to differentiate between activities that are statesupported statesponsored tolerated by the state or purely conducted due to hacktivism Based on recent developments the activities of hacktivists and the narratives promoted by Iran are overlapping as they are based on a common ideology and propaganda ppFor examplepp ProIranian hacktivist groups have launched coordinated attacks on Israeli military and government targetspp Other groups such as Anonymous have also conducted operations in support of the Palestinian cause including attacks on Israeli websites during conflicts in Gazapp Iranian state media resources amplified these events by technically directing actors to conduct cyberattacks and other forms of malicious activityppFrom another perspective with the start of the IsraelIran conflict the group has accelerated its activities specifically targeting Israel the Kingdom of Saudi Arabia and the United States Iran extensively employs malicious cyber activities within targeted information operations IO to sow chaos across the regionppIrans propaganda against Saudi Arabia is primarily driven by their competition for regional dominance including the following key aspects Both nations vie for influence across the Middle East Iran supports Shia militias in various countries Saudi Arabia is seen as a threat to Irans regional ambitionsppA major driver of antiUS propaganda stems from disputes over Irans nuclear program as well as support for Israel and Saudi ArabiappThe group is also calling itself Iranian Cyber Team and it has a significant track record of attacks against Israeli and Western web resources and government agenciesppThe group has close collaboration with other threat actors known as 313 Team xX313XxTeam LulzSec Black رابط التليغرام httpstmemC1MrRnDp5FjNmQ0 Cyber Islamic Resistance Mhwear98ppCyber Fattah is also a member of the socalled Holy League  a conglomerate of hacktivists targeting Israel In the past Cyber Fattah has conducted cyberattacks against an Israeli solar energy company with the assistance of the socalled Iranian and Lebanese Islamic Cyber Resistance battalionsppMay 18 2025 The Holy League cyber alliance announced the declaration of affiliated cyber units to target Ukraine and IsraelppEarlier the group announced cooperation with CyberVolk a nonArabicspeaking hacktivist group known to target NATO countries ppNotably some of their defacements contain reference to Liwaa Mohammad whom we associated with ZeroDayX monikerppDefacements by the same actor prior to 2025 included images of Hassan Nasrallah the former secretarygeneral of HezbollahppThe actor has also been seen in several groups with proHezbollah ideology having a significant presence in LebanonppMultiple episodes of antiIsraeli and antiSaudi propaganda were observed during which actors aim to spread misleading information to amplify geopolitical eventsppMultiple postings by Cyber Fattah actively support the Supreme Leader of Iran Khamenei and promote an antiIsrael agendappThe new propaganda content released by them also targets Donald Trump the President of the USppThis incident by Cyber Fattah may indicate an interesting shift from Israelcentric malicious activity toward a broader focus on antiUS and antiSaudi messaging Likely such maneuvers are aligned with psychological operations conducted by Iran to spread propaganda and malicious narrativesppIndirectly the threat actors sent a concerning message potentially targeting major sports events worldwideppHackers are increasingly targeting major sports events due to a combination of financial political and strategic motivations These events present unique vulnerabilities and opportunities for cybercriminals and statesponsored actors Below are the key reasons why hackers focus on such eventspp1 Financial Gain Valuable Data Major sports events involve vast amounts of sensitive data including personal information of athletes teams and spectators as well as financial transactions Cybercriminals can steal and sell this data on the dark web or use it for identity theft and fraudRansomware Attacks Hackers often deploy ransomware to encrypt critical systems such as ticketing platforms stadium operations or broadcasting networks demanding large sums of money to restore access For example ransomware attacks have previously disrupted sports organizations including encrypting IT systems and affecting stadium operationsTicket Scams Cybercriminals target ticketing systems to steal payment information or sell fake tickets exploiting the high demand for event accesspp2 Political and Geopolitical Motivations StateSponsored Espionage Nationstates may target international sporting events for espionage or sabotage For instance during the 2018 Winter Olympics statelinked hackers launched disruptive cyberattacks aimed at sabotaging the eventGeopolitical Messaging Events like the Olympics or FIFA World Cup are highprofile platforms that can be exploited to send political messages or retaliate against perceived adversaries For example Russian hackers targeted the World AntiDoping Agency WADA after Russian athletes were banned from the Olympicspp3 Disruption and Sabotage Operational Disruption Hackers may aim to disrupt the smooth functioning of events by targeting critical infrastructure such as turnstiles CCTV systems or broadcasting networks This can lead to event delays or cancellations causing reputational damage to organizersDistributed Denial of Service DDoS Attacks DDoS attacks can overwhelm eventrelated websites or streaming platforms disrupting ticket sales live broadcasts or online betting systems4 Exploiting the Digital Surface Interconnected Systems Modern sports events rely heavily on interconnected digital systems including IoT devices payment systems and broadcasting networks A single misconfigured device or weak password can provide hackers with an entry point to compromise the entire networkEmerging Technologies As technologies like 5G and biometric tracking become more integrated into sports events they create new vulnerabilities that hackers can exploit5 Targeting HighProfile Individuals Athletes and Teams Hackers may target athletes coaches or teams to steal sensitive data such as performance metrics medical records or proprietary strategies This information can be used for blackmail extortion or to gain a competitive advantageSponsors and Advertisers Highprofile sponsors and advertisers associated with major events are also lucrative targets for cybercriminals as they handle significant financial transactions and sensitive marketing datappThe hack of a major sports competition is significant for several reasons as it can have wideranging implications across multiple domains including cybersecurity sports integrity and global audiencesppNo date has yet been confirmed for the Saudi Games 2025 but the Kingdom is hosting a variety of major sports events that attract audiences from all over the world includingpp Islamic Solidarity GamesA multisport event held every four years by the Islamic Solidarity Sports Association ISSA Esports World Cup 2025One of the major egaming international competitions 2026 Gulf CupThe Kingdom will host the upcoming global soccer tournamentHosting the Olympics in 2036 is one of the national targets and priorities for Saudi Arabia Likely threat actors attempted to interfere with efforts of the country and abuse the reputation of the Kingdom of Saudi Arabia by conducting a targeted cyberattack on the Saudi GamesppResecurity recommends implementing Digital Identity Protection solution to safeguard consumers and businesses Recognizing the escalating cyber threats in the Middle East Resecuritys IDP solution is poised to play a pivotal role in safeguarding the digital identities of Saudi citizens ppIn a significant stride towards fortifying the cybersecurity landscape in the Middle East Resecurity proudly introduced its stateoftheart Digital Identity Protection IDP solution at the prestigious Black Hat Middle East Africa conference ppThis strategic move aligns with Resecuritys commitment to creating a safer digital society and empowering individuals and businesses in the region to counteract cyber threats effectivelyppThe IDP service provides a comprehensive defense mechanism enabling individuals and enterprises to proactively monitor and receive earlywarning notifications to protect their accounts and personal datappCyber Threat Intelligence CTI by Resecurity empowers organizations to proactively safeguard against breaches and attacks stemming from leaked personally identifiable information PII of employees vendors or customers Utilizing its Context and Risk platforms Resecurity scans the surface deep and dark web for compromised data delivering realtime alerts and actionable insights when sensitive information or leaked credentials are identified The application of predictive analytics and indicators of compromise IoCs enables early threat detection allowing firms to respond swiftly and prevent breachesIn addition to detection capabilities Resecurity offers support for incident response risk management and threat mitigation Its CTI services provide comprehensive intelligence reports to assist in containment and remediation efforts while the HUNTER framework facilitates continuous customized threat hunting within the illicit online community These resources also support the evaluation of thirdparty and supply chain risks ensuring a broader protective net around the organizations ecosystem By integrating advanced analytics monitoring threat actors and providing timely intelligence Resecurity helps companies identify and mitigate vulnerabilities thereby strengthening their cybersecurity posture against risks associated with leaked PIIppCyber Threat IntelligenceppCyber Threat IntelligenceppKeep up to date with the latest cybersecurity news and developmentspp
By subscribing I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy ppResecuritypp
contactresecuritycom
pp
1 888 273 82 76
ppCopyright 2025 Resecurity Inc All rights reservedp