Iranian State Hackers Use Starlink and X for Digital Warfare

Dominic Jainy is a seasoned IT professional with deep expertise in artificial intelligence, machine learning, and blockchain technology. His work frequently intersects with the geopolitical landscape, where he analyzes how emerging technologies—from decentralized networks to satellite internet—are being leveraged by both state and non-state actors in modern conflict. As digital and physical battlefields merge, his insights provide a crucial understanding of how specialized technical tools influence the security of sovereign nations and the safety of global infrastructure.

This conversation explores the complexities of “dual-use” technologies in high-stakes environments, specifically focusing on the recent activities of Iranian-linked hacking groups like Handala. We delve into the mechanics of black-market hardware smuggling, the legal friction between social media platforms and international sanctions, and the inherent resilience of digital operations against traditional kinetic warfare. By examining the technical signatures of state-sponsored hacktivism and the psychological impact of breached civilian applications, we uncover the evolving nature of cyber warfare in an increasingly connected world.

Approximately 30,000 satellite internet terminals currently operate within restricted borders due to thriving black markets. How do these smuggling networks typically function, and what measures can be taken to ensure technology intended for civilian dissent doesn’t inadvertently empower state-aligned cyber groups?

The reality is that these smuggling operations are highly organized, driven by an intense demand for uncensored communication that overrides local prohibitions. In regions like Iran, thousands of terminals move through clandestine channels, often with the silent backing of external political entities aiming to support local protestors. However, when 30,000 devices are active in a restricted zone, it becomes nearly impossible to vet every user, allowing groups like Handala—which is tied to the Ministry of Intelligence and Security—to hijack that same bandwidth for their operations. To mitigate this, providers must implement more granular geographic monitoring and signal analysis to identify clusters of activity that match the behavioral patterns of state actors rather than civilian dissidents. It is a delicate balancing act because aggressive geofencing might cut off the very people the technology was meant to protect.

State-linked entities often maintain premium social media presences despite being under international sanctions that prohibit business transactions. What are the legal responsibilities of tech platforms in identifying these accounts, and how does the payment for “verified” status complicate the enforcement of trade restrictions?

Under current U.S. sanctions, it is strictly illegal for American companies to engage in financial transactions with sanctioned entities like the MOIS or its leadership. The introduction of the $8 monthly premium subscription creates a direct paper trail of “doing business” that simply didn’t exist when verification was a manual, free process. When media outlets like Al-Alam or high-ranking judicial officials purchase these statuses, the platform is essentially accepting prohibited funds, which puts them in a precarious legal position. Tech companies have a fundamental responsibility to cross-reference their payment data with global sanctions lists, yet the sheer volume of automated transactions often allows these groups to slip through the cracks. This creates a bizarre scenario where a regime can be sanctioned by the government while simultaneously being a paying “verified” customer of that country’s most influential social media platforms.

Conventional military strikes frequently fail to permanently disable digital infrastructure or decentralized hacking cells. When a group remains operational immediately following a kinetic attack, what does that reveal about their geographic resilience, and how should defensive strategies evolve to address this persistence?

A kinetic strike might level a building, but it rarely destroys a distributed digital network, as we saw when Iranian-linked groups stayed online even as missiles were in the air. This persistence reveals that these cells are not tied to a single physical “command center”; they utilize mobile hardware like satellite terminals to maintain a presence from virtually anywhere. To counter this, defensive strategies must shift away from trying to “kill” the source and instead focus on neutralizing the group’s ability to reach their targets. We need to evolve toward a “zero-trust” architecture at the infrastructure level, assuming that the adversary will always be online and active regardless of what happens on the physical battlefield. The fact that groups like Handala or Hamas-linked hackers reappear so quickly proves that digital resilience is now a primary component of modern statecraft.

Many hacking collectives operate under the guise of independent hacktivism while maintaining deep ties to national intelligence ministries. How do these groups select critical infrastructure targets like fuel or energy sectors, and what specific technical signatures distinguish state-directed operations from genuine grassroots activism?

State-directed groups typically select targets that offer the maximum psychological and economic leverage, such as Jordan’s fuel infrastructure or regional gas sectors, to signal their reach and power. Unlike genuine grassroots activists who might focus on website defacement or social media “shouting,” state-linked cells like Handala display a level of technical sophistication and persistence that points toward professional training. You can often see this in their “wiper” malware, which is designed not just to disrupt, but to systematically erase data and paralyze entire industrial control systems. These operations require long-term reconnaissance and specialized payloads that are rarely available to independent hobbyists. When a group claims to be “independent” but moves with the precision of a national intelligence agency, the technical signature of their malware usually gives the secret away.

Retaliatory cycles often involve “wiper” malware and the exploitation of popular consumer applications to spread propaganda or instructions to surrender. What technical vulnerabilities make mobile prayer or calendar apps prime targets for such breaches, and what are the long-term psychological effects on the civilian population?

Consumer applications like BadeSaba, which has over 5 million users, are prime targets because they sit at the intersection of daily life and personal trust. These apps often lack the rigorous, multi-layered security protocols of banking or enterprise software, making them easier to breach and use as a megaphone for mass psychological operations. When a user receives a notification to “surrender” or sees fake “safe zone” coordinates on an app they use for daily prayer, it shatters their sense of digital sanctity and security. This creates a pervasive “climate of fear” where the civilian population no longer knows which digital signals to trust, leading to long-term societal anxiety and a breakdown in local communication. The breach isn’t just a technical failure; it is a direct strike on the collective psyche of millions of people who are simply trying to navigate their daily routines.

What is your forecast for the future of satellite-enabled cyber warfare?

My forecast is that we are entering an era of “ubiquitous connectivity” where traditional borders and internet shutdowns will become largely obsolete, for better and for worse. We will see a surge in “ghost networks”—fleets of smuggled or unauthorized satellite terminals that allow state-sponsored hackers to operate with total geographic immunity from within their targets’ own backyards. As satellite technology becomes smaller and harder to detect, the distinction between a civilian’s tool for freedom and a soldier’s tool for disruption will vanish entirely. This will force a radical shift in international law, as nations struggle to hold satellite providers accountable for the traffic crossing their constellations. Ultimately, the battle for the “high ground” in cyber warfare will no longer be fought on land-based fiber optics, but in the low-earth orbit where the data of both dissidents and dictators flows through the same hardware.

Explore more

Trend Analysis: Trust-Based AI Communications

Digital interactions have reached a point where distinguishing a legitimate business representative from a sophisticated synthetic impersonator requires more than just intuition or a caller ID. As enterprises navigate a landscape cluttered by automated spam and high-fidelity deepfakes, the “digital trust gap” has emerged as the most significant hurdle to sustainable growth. The convenience of generative AI has inadvertently provided

AI and Generative AI Transform Global Corporate Banking

The high-stakes world of global corporate finance has finally severed its ties to the sluggish, paper-heavy traditions of the past, replacing the clatter of manual data entry with the silent, lightning-fast processing of neural networks. While the industry once viewed artificial intelligence as a speculative luxury confined to the periphery of experimental “innovation labs,” it has now matured into the

Is Auditability the New Standard for Agentic AI in Finance?

The days when a financial analyst could be mesmerized by a chatbot simply generating a coherent market summary have vanished, replaced by a rigorous demand for structural transparency. As financial institutions pivot from experimental generative models to autonomous agents capable of managing liquidity and executing trades, the “wow factor” has been eclipsed by the cold reality of production-grade requirements. In

How to Bridge the Execution Gap in Customer Experience

The modern enterprise often functions like a sophisticated supercomputer that possesses every piece of relevant information about a customer yet remains fundamentally incapable of addressing a simple inquiry without requiring the individual to repeat their identity multiple times across different departments. This jarring reality highlights a systemic failure known as the execution gap—a void where multi-million dollar investments in marketing

Trend Analysis: AI Driven DevSecOps Orchestration

The velocity of software production has reached a point where human intervention is no longer the primary driver of development, but rather the most significant bottleneck in the security lifecycle. As generative tools produce massive volumes of functional code in seconds, the traditional manual review process has effectively crumbled under the weight of machine-generated output. This shift has created a