Dark Mode Light Mode
China-Linked Earth Alux Targets APAC & LATAM
Iranian Hacker (Hermaan): “The Sound of Israel’s End Doesn’t Come from Afar”
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices
CSEC NEWS | Cybersecurity News | Stay informed on the latest cyber threats, vulnerabilities, and cybersecurity best practices

Iranian Hacker (Hermaan): “The Sound of Israel’s End Doesn’t Come from Afar”

Hermaan Hermaan
Hermaan

Amid escalating regional tensions and in response to Israel’s recent strikes on Iranian territory, a hacker operating under the alias “Hermaan” defaced several websites based in the occupied territories. The attacker replaced their homepage content with a multilingual, symbolic, and threatening message.

The cyberattack occurred at approximately 14:00 (local time) on Friday, featuring messages in Persian, English, and Hebrew. The central statement read:

“The sound of Israel’s end doesn’t come from afar — it rises from within. We’re only here to accelerate it.”

This phrase was also prominently displayed in its English version, underscoring the same narrative and tone.

The well-known global archive for cyber defacement activity, Zone-H, officially recorded the incident under the alias “Hermaan.”
View the defacement record: Zone-H Mirror

Video Message, Targeted Coordinates, and Indirect Threats

Hermaan

In some versions of the defaced sites, a video played automatically, displaying Hebrew text in a stern, ominous tone. A key excerpt reads:

“I didn’t start this war. But if a response is required — it will be one you will never forget… From this moment on, nothing will ever be the same.”

The defacement also included four precise geographic coordinates, which analysts believe point toward critical infrastructure and strategic facilities in Israel:

  • 31.0667° N, 35.0333° E – Near Jerusalem
  • 31.8475° N, 34.6619° E – Eshkol Power Station
  • 32.6172° N, 35.0431° E – Hagit Power Station
  • 31.1537° N, 34.8149° E – Ramat Hovav Industrial Zone

Some experts interpret these coordinates as part of a psychological operation — perhaps foreshadowing future cyber or kinetic strikes.

Who Is Hermaan?

According to gathered information, “Hermaan” is believed to be the alias of Behzad Qasemi, an Iranian hacktivist previously linked to cyber actions following the Quran-burning incidents in Sweden. During those protests, several European websites were defaced with messages condemning anti-Islamic acts.

Although Hermaan is not affiliated with any known hacking group, his symbolic messaging, multilayered narratives, and precision targeting suggest a calculated psychological warfare strategy rather than a mere digital prank.

A New Chapter in Asymmetric Cyber Conflict

While Israeli sources have yet to provide an official damage report, some domestic outlets have confirmed temporary disruptions across several targeted sites.

Still, the significance of this cyberattack may lie less in its technical impact and more in its message: a declaration of a new cyber front — asymmetric, unannounced, and increasingly sophisticated.

One thing is clear:
Hermaan is not just a name. It is a signal.
And that signal has just been sent.

Cybersecurity News
By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use
Advertisement