Loading...
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Nasir Security: Threat Actor Profile

Nasir Security cyber threat actor concept with silhouetted figure and illuminated global network map

Attribution: Suspected pro-Iranian hacktivist group

First Observed: October 2025

Primary Operations: Data breach claims, infrastructure targeting, hacktivist campaigns, data leaks

Nasir Security is a pro-Iranian hacktivist group that emerged in late 2025 and became active in early 2026 with a series of breach claims targeting government agencies, aviation infrastructure, and energy sector organizations across the Middle East.

The group operates a public leak site where it publishes claims of unauthorized access, data exposure, and ideological statements. Its activity aligns with a broader pattern of geopolitically motivated cyber operations rather than financially driven cybercrime.

Overview

Nasir Security follows a disclosure-driven model, publicly announcing intrusions and presenting alleged proof of access through screenshots or structured data samples. Its communications are framed around retaliation, deterrence, and exposure of sensitive systems.

Targets consistently include government institutions, customs authorities, airports, and oil and gas organizations, indicating a focus on high-visibility and strategically sensitive sectors.

2026 campaign and breachnews coverage

Between March and April 2026, Nasir Security published a sequence of claims across multiple countries and sectors. BreachNews has reported on several of these incidents:

Each of these disclosures followed a similar pattern of politically charged messaging paired with claims of access to sensitive systems or data.

Claimed operations timeline

Based on the group’s public posts, Nasir Security has claimed responsibility for the following operations:

  • October 2025: Taldor allegedly breached
  • March 13, 2026: Dubai Petroleum allegedly breached
  • March 15, 2026: Oman CC Energy Development allegedly breached
  • March 17, 2026: Rumaila Operating Organisation allegedly compromised
  • March 21, 2026: Al-Safi Oil Company allegedly breached
  • March 26, 2026: UAE Federal Customs Authority access claim
  • March 30, 2026: Dubai Airport data leak claim
  • April 5, 2026: Kuwait Ministry of Interior allegedly breached
  • April 15, 2026: Yad Vashem Museum allegedly breached

The consistency and pacing of these claims suggest a coordinated disclosure strategy, potentially involving previously obtained access released over time.

Targeting patterns and strategic focus

Nasir Security’s targeting shows a clear preference for government systems, transportation infrastructure, and energy sector organizations. These sectors carry both economic and geopolitical significance, increasing the potential impact of any confirmed compromise.

The repeated focus on Gulf region entities, particularly in the United Arab Emirates and surrounding countries, indicates a regional campaign aligned with ongoing geopolitical tensions.

Operational style and messaging

The group’s communications are heavily ideological, often incorporating religious language and framing operations as acts of resistance. Statements emphasize exposure and disruption rather than financial gain.

Unlike financially motivated groups such as ShinyHunters, Nasir Security does not appear to prioritize data sales or extortion. Its objective appears to center on visibility, signaling, and psychological impact.

Relationship to broader iran-aligned activity

Nasir Security operates within a wider ecosystem of pro-Iranian cyber groups that have increased activity throughout 2026. Its targeting patterns and messaging align with groups such as Handala Hack, which has also focused on government and infrastructure targets.

These operations coincide with broader coordinated campaigns, including multi-country DDoS attacks targeting Western and allied infrastructure.

Verification challenges

Independent verification of Nasir Security’s claims remains limited. While the group frequently publishes supporting material, confirmation from affected organizations is rare.

Some claims may reflect legitimate unauthorized access, while others could involve partial exposure or exaggerated impact. Each incident requires individual assessment.

Outlook

Nasir Security’s consistent focus on high-value infrastructure and government systems makes it a relevant emerging threat actor despite limited confirmed incidents. Its alignment with geopolitical narratives suggests continued activity, particularly during periods of regional escalation.

Organizations in targeted sectors should treat the group’s claims as indicators of potential targeting and ensure appropriate monitoring and defensive measures are in place.

Picture of m00s3c

m00s3c

Moose (@m00s3c) is the author of BreachNews, focusing on data breach intelligence, dark web monitoring, and threat analysis. His work involves analyzing breach claims, reviewing leaked datasets, and tracking threat actor activity to provide clear, factual reporting.

Related Posts

Newsletter signup

Get the latest data breach and security news.

Please wait...

Thank you for signing up!