Get 24/7 incident response assistance from our global team
- APAC: +65 3159 4398
- EU & NA: +31 20 890 55 59
- MEA: +971 4 540 6400
- LATAM: +56 2 275 473 79
Get 24/7 incident response assistance from our global team
Please review the following rules before submitting your application:
1. Our main objective is to foster a community of like-minded individuals dedicated to combatting cybercrime and who have never engaged in Blackhat activities.
2. All applications must include research or a research draft. You can find content criteria in the blog. Please provide a link to your research or research draft using the form below.
Hacktivist groups are running coordinated campaigns across the region. Credential theft and mass fraud attempts are targeting your employees and customers.
For organizations operating in the region, it is a business continuity matter. Whatever stage you are at — assessing exposure, testing your response plan, or preparing for what escalates next — our best regional experts and solutions are here to help..
Group-IB's correlation assessment shows that threat actors are targeting countries well beyond the immediate conflict zone through regional influence networks. The attack surface is wider than most organizations assume.
Escalation windows are where initial access gets established quietly. Group-IB has identified active credential theft campaigns, DDoS against Gulf financial institutions, and supply chain risk tied to regional cloud instability. Threat actors may have already breached your infrastructure or your partners without any visible sign of compromise.
Organizations that request Threat Intelligence, Managed XDR and Tabletop Exercise together qualify
for preferential pricing and priority onboarding.
Anticipate threats before they become incidents

of threat actors active in the Gulf, with attribution mapped to MITRE ATT&CK, including TTPs, infrastructure, and tools used by groups active in this escalation

with custom alerting when your organization, executives, or partners are mentioned

covering VIP accounts, payment card data, and breach databases before they can be weaponized against your organization

Group-IB analysts verify claims before you respond, so you act on evidence rather than noise

with some of the fastest removal times in the industry

with SIEM, SOAR, and TIP platforms. Intelligence your SOC team can operationalize immediately
Detect and stop regional threats around the clock




You can run the Tabletop Exercise right now, without prior assessments. Scenario-
based regional crisis simulation is built on the threat intelligence Group-IB is collecting
from this escalation right now. Test management decision-making and technical team
response without any impact on live systems.




The most dangerous phase of any escalation is the early window, before visible impact. Group-IB’s assessment shows that cyber activity in this conflict is already broader geographically than kinetic activity. Organizations that have not seen direct targeting may already have threat actors present in their environment. The time to assess is before an incident, not after.
The Tabletop Exercise can be scheduled right after you confirm your interest. Managed XDR proof of concept can begin within days of engagement. Threat Intelligence is operational from day one of subscription. For organizations with Group-IB Managed XDR already deployed, managed detection and response begins immediately.
General threat intelligence does not cover the specificity this situation requires. Group-IB’s META team is actively tracking the groups, TTPs, and infrastructure tied to this escalation in real time. That means sector-specific, geography-specific intelligence updated hourly — not a quarterly report from a vendor who is not present in the region.
Hacktivist targeting lists are not exhaustive and are frequently used for disinformation. Group-IB’s analysis shows that credential theft, supply chain disruption, and fraud campaigns are targeting organizations broadly across the Gulf. Financial services, energy, and critical infrastructure are at elevated risk regardless of whether they have been publicly named.
The assessment is conducted against your existing logs, telemetry, and network data. It does not require changes to your live environment. Group-IB analysts work against known IOCs from threat actors active in this conflict to identify signs of past or current access.
If indicators of compromise are identified, Group-IB’s incident response team is available immediately. Organizations with a Services Retainer have priority access. For organizations engaging on a standalone basis, Group-IB will scope a response engagement as part of the findings debrief.
Yes. The exercise is designed for both management and technical teams simultaneously. The management track tests crisis decision-making, communication, and escalation procedures. The technical track tests detection, containment, and response actions. The two tracks run in parallel and converge in the debrief.
Yes. Group-IB’s regional coverage includes organizations with Gulf-based operations, subsidiaries, or supply chain exposure, regardless of where they are headquartered. The threat actors active in this escalation are targeting regional presence, not just locally registered entities.