CloudSEK Logo
February 18, 2025

Threat Landscape Report for Middle East 2024

CloudSEK's Middle East Threat Landscape Report 2024 reveals a surge in cyber incidents driven by state-sponsored attacks, hacktivism, and cybercriminal enterprises. With 447 documented cases, the region witnessed an unprecedented rise in hacktivist activities fueled by geopolitical tensions. The most targeted sectors were government, financial services, and defense, while ransomware attacks increasingly focused on construction, education, and real estate.

Breachforums_v2 dominated dark web activity, hosting 63.5% of data breaches, indicating a consolidation of cybercriminal operations. The most prolific ransomware group, Handala, executed 16 attacks, employing sophisticated anti-analysis techniques and hybrid extortion tactics. LockBit 3.0, RansomHub, and FunkSec also played key roles in ransomware proliferation.

Hacktivism intensified, with Ghosts of Palestine and Tengkorak Cyber Crew leading large-scale cyber disruption campaigns. October saw peak cyber activity, indicating coordinated attack planning. The report underscores a shift towards multi-stage, high-impact cyber operations targeting critical infrastructure and politically sensitive data.

With escalating threats, organizations must prioritize intelligence-driven security, proactive vulnerability management, and stronger defense mechanisms to counteract evolving cyber risks in the Middle East.

Authors & Contributors

CloudSEK TRIAD
CloudSEK Threat Research and Information Analytics Division
Downloadable Report

Download the Report

Download the report by clicking below.
The Download will start immediately.

Join our newsletter

Sign up so that you don't miss any updates from us

Threat Landscape Report for Middle East 2024

CloudSEK's Middle East Threat Landscape Report 2024 reveals a surge in cyber incidents driven by state-sponsored attacks, hacktivism, and cybercriminal enterprises. With 447 documented cases, the region witnessed an unprecedented rise in hacktivist activities fueled by geopolitical tensions. The most targeted sectors were government, financial services, and defense, while ransomware attacks increasingly focused on construction, education, and real estate.

Breachforums_v2 dominated dark web activity, hosting 63.5% of data breaches, indicating a consolidation of cybercriminal operations. The most prolific ransomware group, Handala, executed 16 attacks, employing sophisticated anti-analysis techniques and hybrid extortion tactics. LockBit 3.0, RansomHub, and FunkSec also played key roles in ransomware proliferation.

Hacktivism intensified, with Ghosts of Palestine and Tengkorak Cyber Crew leading large-scale cyber disruption campaigns. October saw peak cyber activity, indicating coordinated attack planning. The report underscores a shift towards multi-stage, high-impact cyber operations targeting critical infrastructure and politically sensitive data.

With escalating threats, organizations must prioritize intelligence-driven security, proactive vulnerability management, and stronger defense mechanisms to counteract evolving cyber risks in the Middle East.