Pro-Iranian Hacktivist Group Cyber Fattah Leaks Sensitive Data from Saudi Games 2024
Cyber Fattah, a pro-Iranian hacktivist group, leaked thousands of personal records from the 2024 Saudi Games. Learn about the breach, motives, tools used, and regional cybersecurity implications.

Table of Contents
- Who is Cyber Fattah?
- How the Breach Occurred
- Types of Leaked Data
- Geopolitical and Ideological Implications
- Middle East Hacktivism on the Rise
- The Strategic Use of Leaks
- The Role of Cross-Border Cyber Collaboration
- Saudi Arabia’s Cybersecurity Challenges
- Why Sports and Social Events Are High-Value Targets
- Conclusion
- Frequently Asked Questions (FAQs)
The cyber threat landscape in the Middle East has taken a more dangerous turn following the recent cyberattack on the Saudi Games 2024. A pro-Iranian hacktivist group named Cyber Fattah claimed responsibility for leaking thousands of sensitive personal records belonging to athletes, government officials, and visitors. This high-profile data breach highlights how hacktivism is now being weaponized as part of ongoing regional and ideological cyber warfare.
Who is Cyber Fattah?
Cyber Fattah describes itself as an Iranian-aligned cyber team that engages in politically motivated hacking operations. The group is known for targeting Israeli and Western organizations and now seems to be extending its reach to Saudi and U.S. entities. They primarily disseminate leaks via Telegram and underground forums, aligning themselves with Iran's broader cyber strategy.
How the Breach Occurred
According to cybersecurity firm Resecurity, the hackers gained unauthorized access to phpMyAdmin—a common web-based MySQL administration tool. From there, they exfiltrated SQL database dumps, which were then leaked online. The stolen data appears to have originated from the official Saudi Games 2024 website.
The database dumps were first shared on DarkForums, a known cybercrime marketplace, under the alias ZeroDayX—a burner profile likely created to promote the leak and protect the real identities behind the operation.
Types of Leaked Data
The leaked records were extensive and highly sensitive, including:
-
Passport and ID card scans
-
Bank account statements
-
Athletes’ medical forms
-
Government officials’ email addresses
-
IT staff login credentials
-
Visitor information and registration data
Such a breach not only violates individual privacy but poses a national security risk by exposing identities linked to key infrastructure and decision-making bodies.
Geopolitical and Ideological Implications
This incident is part of a growing wave of cyber offensives rooted in political ideology. The Saudi Games leak serves as a digital extension of the real-world geopolitical rift between Iran, Israel, and Saudi Arabia.
Hacktivist group Cyber Fattah has previously collaborated with Iran-linked groups like 313 Team, which claimed responsibility for a DDoS attack on Truth Social in response to U.S. airstrikes on Iranian nuclear facilities.
Middle East Hacktivism on the Rise
According to Cyberknow and other threat intelligence platforms, over 119 hacktivist groups have recently been involved in cyber activity across the Middle East. These include:
-
Pro-Israel groups like Predatory Sparrow, known for leaking data from Iran's Ministry of Communications and crypto exchange Nobitex.
-
Pro-Palestinian groups like the Handala team, targeting Israeli firms since June 2025.
-
Pro-Russian-aligned groups like DieNet, which mixes pro-Hamas messaging with Eastern European cyber tactics.
The Strategic Use of Leaks
What makes the Saudi Games attack especially alarming is the strategic intent behind the data leak. According to Resecurity, this wasn’t a financially driven ransomware operation—it was an ideological message. The group intentionally targeted a major social and sporting event to maximize the psychological impact.
Rather than sell the stolen data, the group publicly dumped it to inflict reputational damage and sow distrust in the Saudi government’s ability to safeguard its digital assets.
The Role of Cross-Border Cyber Collaboration
One of the most concerning aspects of this breach is the growing cross-regional collaboration among threat actors. Groups like DieNet showcase how language, location, or even political alignment no longer restrict cyber alliances. Instead, shared objectives override geographic boundaries.
DieNet, for instance, operates with a hybrid identity—its members often communicate in Russian, despite espousing pro-Iranian views. This fusion of resources enhances the technical capacity and operational range of such hacktivist operations.
Saudi Arabia’s Cybersecurity Challenges
The breach serves as a wake-up call for the Kingdom of Saudi Arabia, especially as it hosts more global events and invests heavily in technology. With the rise of Initial Access Brokers (IABs) and persistent threat actors targeting public-facing platforms, enhanced endpoint security, network segmentation, and cloud monitoring are becoming critical.
Why Sports and Social Events Are High-Value Targets
Events like the Saudi Games draw international attention, making them ideal targets for information warfare. Beyond just personal data, hackers aim to:
-
Undermine public trust
-
Embarrass national governments
-
Spread disinformation and propaganda
-
Gain leverage in geopolitical disputes
Conclusion
The attack by Cyber Fattah underscores the blurring lines between hacktivism and cyber warfare. The cyberattack on the Saudi Games is not just a breach—it’s a message. It illustrates how deeply cyber tools have been embedded into modern geopolitical playbooks. For governments, organizations, and cybersecurity professionals, this incident reiterates the need for cyber resilience, proactive threat intelligence, and regional cooperation.
FAQs
What is Cyber Fattah?
Cyber Fattah is a pro-Iranian hacktivist group known for politically motivated cyber attacks against Israeli, Western, and now Saudi targets.
What happened in the Saudi Games 2024 data breach?
Cyber Fattah leaked thousands of sensitive personal records from the Saudi Games by exploiting backend access through phpMyAdmin.
How was the data leaked?
The data was published on Telegram and the DarkForums marketplace by a profile named ZeroDayX.
What kind of data was exposed?
The breach included passports, ID cards, medical documents, bank statements, and staff credentials.
What tool was used for backend access?
Hackers reportedly exploited vulnerabilities in phpMyAdmin, a popular web-based MySQL administration tool.
Is this considered a state-sponsored attack?
While not officially confirmed, the ideological motive and alignment with Iranian interests suggest nation-state sponsorship.
Why was the Saudi Games targeted?
Major sporting events draw public attention, making them ideal targets for propaganda and disinformation campaigns.
Has Cyber Fattah conducted other attacks?
Yes, it has previously attacked Israeli digital assets and is linked to regional groups like the 313 Team.
What is the significance of hacktivism in cyber warfare?
Hacktivism blends activism and hacking to push political agendas, often using data leaks and defacements.
What are Initial Access Brokers (IABs)?
IABs are threat actors who gain unauthorized access to networks and sell that access to other cybercriminals.
Who are other major players in this cyberwarfare?
Groups like Predatory Sparrow, DieNet, 313 Team, and the Handala team are active in similar operations.
What is DarkForums?
DarkForums is a cybercrime forum used for trading stolen data, tools, and exploits.
Was the attack financially motivated?
No, the breach was ideologically driven to erode public trust and harm geopolitical rivals.
How can such breaches be prevented?
Regular audits, stronger access controls, endpoint monitoring, and incident response plans are crucial.
What role does Telegram play in hacktivism?
Telegram is widely used by hacktivist groups to announce breaches and coordinate leaks.
Are there international legal actions against these groups?
Few. Attribution is difficult, and many groups operate in regions with limited law enforcement cooperation.
Is this attack related to the Iran-Israel conflict?
Yes, it reflects broader cyber tensions between Iran and Israel, often affecting third-party nations.
Why are sporting events a common cyber target?
They provide maximum visibility and symbolic value for ideological attacks.
What is DieNet?
DieNet is a pro-Iranian group with Russian-speaking members, reflecting hybrid regional cyber alliances.
What was Iran’s response to other breaches?
Iran accused Israel of hijacking its national broadcaster and leaking cryptocurrency data.
How did Predatory Sparrow retaliate?
By leaking data from Iran's Ministry of Communications and destroying over $90M in cryptocurrency.
What is Cyber Islamic Resistance?
An umbrella group of pro-Iranian hacktivists combining resources to amplify cyber campaigns.
What cybersecurity measures are recommended?
Zero Trust architecture, multi-factor authentication, and continuous threat monitoring are key.
What is the impact on public perception?
Such leaks damage trust in government IT systems and national security preparedness.
How many hacktivist groups are active?
Over 120 groups, including 95 supporting pro-Iranian causes.
How did the attackers distribute the stolen data?
Through file dumps on Telegram and Dark Web leak forums.
Are sports organizations especially vulnerable?
Yes, due to their visibility, large user databases, and often underfunded cybersecurity teams.
Did this involve ransomware?
No, the objective was to expose and embarrass, not extort.
How often are government sites attacked?
Regularly, especially during international conflicts or significant political events.
Can such leaks affect diplomatic relations?
Absolutely. Data leaks are now tools of international influence and retaliation.
What’s the next step for Saudi authorities?
They will likely increase monitoring, update policies, and seek international cyber defense cooperation.