All Posts
Anomali Cyber Watch
1
min read

Cyber Threat Briefing: Iran Retaliatory Posture

Published on
February 28, 2026
Table of Contents
<h2>Threat Level: CRITICAL &mdash; MAXIMUM</h2> <p>The Iran geopolitical/military crisis has reached its apex. Operation Epic Fury (28 Feb) has destroyed Iran's conventional military options, making cyber operations the regime's <strong>sole remaining instrument of asymmetric retaliation</strong>. This is not a theoretical scenario &mdash; Iran-backed groups are confirmed escalating operations.</p> <h2>Key Judgments (with confidence)</h2> <ol> <li><strong>Iranian retaliatory cyber operations are imminent</strong> (HIGH confidence). Both MOIS (MuddyWater) and IRGC (APT42, APT33) cyber units were activated and retooling before the kinetic trigger. Iran's published war doctrine names cyber as a first-tier response.</li> <li><strong>Wiper attacks against Israeli and US critical infrastructure are the highest-probability retaliatory action</strong> (HIGH confidence). Active wiper campaigns were already underway against Israeli energy, financial, government, and utilities sectors. Iran's wiper arsenal includes 15+ families (ZeroCleare, Meteor, Dustman, DEADWOOD, Apostle, BFG Agonizer, MultiLayer, PartialWasher, and others).</li> <li><strong>ICS/OT attacks are possible within 48&ndash;72 hours</strong> (MODERATE-HIGH confidence). Iran possesses IOCONTROL (purpose-built ICS malware), ICS vulnerability exploits doubled in 2025, and "sabotage" is explicitly named in Iranian retaliatory targeting analysis.</li> <li><strong>Iran's 4% internet connectivity will delay but not prevent retaliation</strong> (HIGH confidence). Pre-positioned implants, foreign-based operators, and proxy groups operate independently of Iranian domestic infrastructure.</li> </ol> <ol start="5"> <li><strong>APT34/OilRig silence is the most concerning intelligence gap</strong> (MODERATE confidence). Iran's most prolific espionage group has been undetected for the entire 7-day cycle during the most significant crisis in Iranian history. This likely indicates covert pre-positioning, not inactivity.</li> </ol> <p>&nbsp;</p> <h3>Cluster Summary</h3> <table> <thead> <tr> <td width="450"> <p><strong>Description</strong></p> </td> <td width="300"> <p><strong>Confidence</strong></p> </td> </tr> </thead> <tbody> <tr> <td width="450"> <p>MuddyWater Retooling + Retaliatory Escalation</p> </td> <td width="300"> <p>MODERATE-HIGH</p> </td> </tr> <tr> <td width="450"> <p>APT42 Multi-Track Operations (credentials + backdoors + think tanks)</p> </td> <td width="300"> <p>MODERATE</p> </td> </tr> <tr> <td width="450"> <p>APT33 Aerospace Targeting via GitHub Lures</p> </td> <td width="300"> <p>MODERATE</p> </td> </tr> <tr> <td width="450"> <p>IRGC Maritime Cyber Operations</p> </td> <td width="300"> <p>LOW</p> </td> </tr> <tr> <td width="450"> <p>Iranian Credential Theft via Trusted Relationships</p> </td> <td width="300"> <p>MODERATE-HIGH</p> </td> </tr> <tr> <td width="450"> <p>Pro-Iran Wiper Operations Against Israeli Critical Infrastructure</p> </td> <td width="300"> <p><strong>HIGH</strong></p> </td> </tr> <tr> <td width="450"> <p>UNC757 Citrix/Ivanti Exploitation</p> </td> <td width="300"> <p>MODERATE-HIGH</p> </td> </tr> <tr> <td width="450"> <p>Iranian Proxy Infrastructure &mdash; Multi-Actor Relay</p> </td> <td width="300"> <p>LOW</p> </td> </tr> <tr> <td width="450"> <p>Iranian Espionage Expansion &mdash; Turkic States</p> </td> <td width="300"> <p>LOW</p> </td> </tr> <tr> <td width="450"> <p>Critical ICS Vulnerability Exposure + IOCONTROL</p> </td> <td width="300"> <p>MODERATE</p> </td> </tr> <tr> <td width="450"> <p>Israeli Offensive Cyber &mdash; Iran Communications Blackout</p> </td> <td width="300"> <p>HIGH</p> </td> </tr> </tbody> </table> <h3>Forward-Looking Probabilistic Assessment</h3> <table> <thead> <tr> <td width="300"> <p><strong>Scenario</strong></p> </td> <td width="156"> <p><strong>Probability</strong></p> </td> <td width="156"> <p><strong>Timeframe</strong></p> </td> <td width="156"> <p><strong>Impact</strong></p> </td> </tr> </thead> <tbody> <tr> <td width="300"> <p>Hacktivist DDoS/defacement against US/Israeli websites</p> </td> <td width="156"> <p><strong>90%</strong></p> </td> <td width="156"> <p>0&ndash;24 hours</p> </td> <td width="156"> <p>LOW-MEDIUM</p> </td> </tr> <tr> <td width="300"> <p>Wiper deployment against Israeli critical infrastructure</p> </td> <td width="156"> <p><strong>85%</strong></p> </td> <td width="156"> <p>24&ndash;48 hours</p> </td> <td width="156"> <p>HIGH</p> </td> </tr> <tr> <td width="300"> <p>Wiper deployment against US critical infrastructure</p> </td> <td width="156"> <p><strong>60%</strong></p> </td> <td width="156"> <p>48&ndash;72 hours</p> </td> <td width="156"> <p>CRITICAL</p> </td> </tr> <tr> <td width="300"> <p>ICS/OT attack (IOCONTROL or equivalent)</p> </td> <td width="156"> <p>40%</p> </td> <td width="156"> <p>48&ndash;96 hours</p> </td> <td width="156"> <p>CRITICAL</p> </td> </tr> <tr> <td width="300"> <p>APT34/OilRig activation from pre-positioned access</p> </td> <td width="156"> <p><strong>75%</strong></p> </td> <td width="156"> <p>24&ndash;72 hours</p> </td> <td width="156"> <p>HIGH</p> </td> </tr> <tr> <td width="300"> <p>Ransomware-as-cover destructive attacks on US SMBs</p> </td> <td width="156"> <p>70%</p> </td> <td width="156"> <p>24&ndash;72 hours</p> </td> <td width="156"> <p>MEDIUM-HIGH</p> </td> </tr> <tr> <td width="300"> <p>Supply chain attack via compromised partner organizations</p> </td> <td width="156"> <p>50%</p> </td> <td width="156"> <p>72+ hours</p> </td> <td width="156"> <p>HIGH</p> </td> </tr> </tbody> </table> <p><strong>Bottom line: </strong>The next 72 hours represent the highest cyber risk period since the 2020 Soleimani killing, and likely the highest in history given the scale of kinetic operations. Every organization in the US, Israeli, and allied critical infrastructure sectors should be at maximum defensive posture.</p>

FEATURED RESOURCES

February 28, 2026
Anomali Cyber Watch

Israel in Focus: Iran Retaliatory Posture

Read More
February 28, 2026
Anomali Cyber Watch

Cyber Threat Briefing: Iran Retaliatory Posture

Read More
February 24, 2026
Anomali Cyber Watch

Anomali Cyber Watch: LockBit 5.0, Chrome Zero-Day CVE-2026-2441, Infostealer Targets OpenClaw, and more

LockBit 5.0 Ransomware Targets Windows, Linux, and VMware ESXi in Active Campaigns. Google Patches Actively Exploited Chrome Zero-Day CVE-2026-2441. Infostealer Targets OpenClaw Configuration Files to Capture Credentials and User Context. And more...
Read More
Explore All