Iran's Covert Influence: Recruiting Dissidents to Target Israel

Israel Iran covert operations Mossad recruitment Iranian dissidents Secret war Iran Cyber warfare Iran
Jim Gagnard
Jim Gagnard

Board Advisor

 
January 5, 2026 5 min read
Iran's Covert Influence: Recruiting Dissidents to Target Israel

TL;DR

Israel's covert war against Iran is evolving, with the Mossad now recruiting Iranian dissidents and individuals from neighboring countries for operations within Iran. This strategy involves commando raids and cyber warfare, motivated by revenge or financial incentives. The article details the recruitment process, historical context of the conflict, and Iran's own cyber infiltration tactics.

Israel Recruits Iranian Dissidents for Attacks Inside Iran

Operations in the secret war between Iran and Israel have shifted from Mossad field agents to Iranian dissidents and individuals from neighboring countries.

Fire and smoke rise into the sky after an Israeli attack on the Shahran oil depot on June 15 in Tehran, Iran.

Image courtesy of ProPublica

In June, a commando team, led by an Iranian national identified as S.T., targeted an anti-aircraft battery near Tehran. According to Israeli intelligence officials, the recruits' motives varied from seeking revenge against the Iranian regime to financial incentives.

The Mossad planned the attack for over a year. The operation involved approximately 70 commandos attacking anti-aircraft batteries and ballistic missile launchers. The New York Times reported that a previous Mossad operation crippled Hezbollah by detonating explosives in pagers, resulting in casualties.

Details of the Covert Operations

Israeli officials stated that the commando attacks facilitated airstrikes, which allowed the Israeli air force to bomb nuclear facilities and destroy missiles. Additionally, Israeli cyberwarriors reportedly sent a false message to Iranian military leaders, leading to a precision strike on an underground bunker.

In 2018, Israeli-trained operatives broke into a Tehran warehouse, extracting nuclear program documents. Two years later, the Mossad assassinated a top Iranian physicist using AI-enhanced facial recognition and a remote-controlled machine gun, as reported by The New York Times.

The agents involved in these operations were primarily Iranians or third-country citizens, reflecting a strategic shift by the Mossad.

Recruitment and Training

S.T., an Iranian student, was recruited after being arrested and tortured by the Basij militia. He was later contacted by an Israeli spy and agreed to work against Iran in exchange for protection for his family.

He underwent months of training outside Iran by Israeli weapons specialists before returning to participate in the operation.

Origins of the Secret War

The Mossad prioritized Iran in 1993 after the Oslo Accords.

!Israeli Foreign Minister Shimon Peres, center-right — flanked by, from left, Israeli Prime Minister Yitzhak Rabin, Israeli negotiator Joel Singer, President Bill Clinton and Yasser Arafat, chairman of the Palestine Liberation Organization — signs the Oslo Accords in 1993.

Israel views Iran's nuclear ambitions as a threat to its regional nuclear monopoly. Menachem Begin stated that Israel has the right to prevent neighboring countries from developing nuclear weapons.

In the 1990s, Iran began nuclear weapons research with assistance from Pakistani engineer Abdul Qadeer Khan.

Iran turned to Abdul Qadeer Khan, a Pakistani engineer who had worked for a Dutch company that produced enriched uranium, as Iran began researching nuclear weapons.

Image courtesy of ProPublica

Shabtai Shavit, former Mossad director, said that if they had understood Khan's role earlier, they would have taken action to eliminate him. The Mossad discovered a secret enrichment plant near Natanz in 2000, which was later revealed publicly by an Iranian dissident group.

Dagan's Leadership and Covert Operations

In 2001, Ariel Sharon appointed Meir Dagan as director of the Mossad who prioritized stopping Iran’s nuclear program.

Meir Dagan, who led the Mossad from 2002 to 2011, had this photograph of Nazi soldiers brutalizing his grandfather on the wall of his office.

Image courtesy of ProPublica

Under Dagan, the Mossad carried out covert operations, including assassinations of Iranian nuclear scientists.

The Art of Recruitment

Dagan emphasized recruiting Iranians and others for covert operations within Iran, leveraging the country's ethnic diversity.

Meir Dagan, seen in an undated photograph, was a proponent of using foreign-born agents for the Mossad’s missions against Iran.

Image courtesy of ProPublica

Recruits were divided into those gathering intelligence and those willing to carry out violent operations. Mossad officers used gradual erosion, starting with minor requests and escalating to more significant tasks. Trust was crucial in the agent-handler relationship.

Motivations for spying included financial reward, hatred, revenge, and tangible benefits such as medical treatment or higher education. The Mossad uses medical care and educational opportunities as incentives for recruitment.

Candidates undergo psychological evaluations, polygraph tests, and extensive training. Agents receive detailed instructions on their appearance, behavior, and finances to avoid suspicion.

Iran's Cyber Infiltration Tactics

The Handala hacking group, named after a Palestinian refugee child character, is an aggressive arm of Iran’s digital warfare.

סייבר איראני, מתוך פוסט בפרסית

Image courtesy of ynetnews

Unlike groups seeking financial gain, Handala focuses on reputational and psychological damage. Cyberint and Check Point have noted its evolution from hacktivism to state-sponsored activity.

Targeting Decision-Makers

Handala's recent operations target Israel’s decision-making echelon through a "second-circle attack" strategy.

חמינאי נואם בפני סטודנטים בטהרן

Image courtesy of ynetnews

Instead of directly attacking secure devices, they target personal devices of assistants, advisers, and family members, focusing on backup environments like cloud services and private computers.

Disinformation Campaigns

Handala also engages in disinformation campaigns, fabricating content to generate headlines. An example includes publishing false information about internal disputes within the Shin Bet.

Hod Ben Nun, co-founder of MIND, stated that Handala operates under the Revolutionary Guards as part of a planned influence campaign. The group exploits access to large pools of civilian data, presenting it as an achievement to influence Israeli public consciousness.

Undermining Security

In January 2025, Handala penetrated Maagar-Tec, activating air raid sirens and broadcasting threatening messages in kindergartens to undermine public security.

Other activities include:

  • Breaching Israel Police systems, claiming to steal 2.1 terabytes of data.
  • Making nuclear threats, claiming to have penetrated servers linked to the Soreq Nuclear Research Center.
  • Distributing wiper malware disguised as security updates.

False Flag Operations

Handala's use of the child figure is a message, aligning with false flag operations.

חנדלה דמות קומיקס פלסטינית פלסטיני

Image courtesy of ynetnews

The group adopts the name and logo of a Palestinian symbol to construct a narrative of hacktivism, complicating justification for military response and creating emotional identification across the Arab world. This tactic helps Iran avoid direct attribution for its cyber attacks.

Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture, providing solutions to protect against sophisticated threats like those described. Our platform converges networking and security across devices, apps, and environments, utilizing peer-to-peer encrypted tunnels and quantum-resistant cryptography.

Explore how Gopher Security can safeguard your organization against advanced cyber threats. Visit Gopher Security to learn more.

Jim Gagnard
Jim Gagnard

Board Advisor

 

30-year CEO experiences of leading multiple $MM exits. Excellent operator of managing big enterprise companies.

Related News

React2Shell CVE-2025-55182: Max-Severity Threat to JavaScript
n8n vulnerability

React2Shell CVE-2025-55182: Max-Severity Threat to JavaScript

Discover critical n8n and React2Shell vulnerabilities impacting thousands. Learn about RCE exploits, affected systems, and essential patching steps. Secure your network now!

By Edward Zhou January 9, 2026 4 min read
Read full article
Unlocking LockBit 5.0: Enhanced Encryption and Targeted Threats
LockBit 5.0

Unlocking LockBit 5.0: Enhanced Encryption and Targeted Threats

Discover the latest LockBit 5.0 ransomware evolution, its cross-platform capabilities, and advanced evasion tactics. Secure your defenses now!

By Divyansh Ingle January 8, 2026 4 min read
Read full article
CISA's KEV Catalog Grows by 1,484 Vulnerabilities in 2025
CISA KEV Catalog

CISA's KEV Catalog Grows by 1,484 Vulnerabilities in 2025

CISA's KEV Catalog grew to 1,484 with 245 new vulnerabilities in 2025. Learn which are actively exploited and how to protect your organization. Explore now!

By Divyansh Ingle January 7, 2026 7 min read
Read full article
Eaton UPS Software Vulnerabilities Allow Code Execution Risks
Eaton UPS Companion vulnerabilities

Eaton UPS Software Vulnerabilities Allow Code Execution Risks

Critical vulnerabilities found in Eaton UPS Companion software. High risk of code execution. Update to v3.0 now to protect your systems!

By Edward Zhou January 6, 2026 3 min read
Read full article