<p><strong>Threat Assessment Level: ELEVATED — Trending HIGH</strong></p>
<p><em>Continued from prior assessment (2026-04-06): Level remains ELEVATED — Trending HIGH. No downgrade is warranted. While no new state government victim was confirmed in this cycle, the convergence of active ransomware operations against government targets, a new macOS credential-theft campaign weaponizing AI tool lures, the emergence of a stealer capable of bypassing MFA via server-side session hijacking, ICS/SCADA advisories affecting utility infrastructure, and an escalating pro-Iran hacktivist campaign shifting to destructive operations collectively sustain the upward pressure on the threat level.</em></p>
<p>For state government CIOs and CISOs, the past 72 hours have delivered a clear message: <strong>the attack surface is expanding faster than most agencies can patch it.</strong> Threat actors — from ransomware syndicates to nation-state espionage groups to ideologically motivated hacktivists — are converging on the same targets: your identity platforms, your perimeter appliances, your ICS/SCADA systems, and increasingly, the AI development tools your teams are adopting.</p>
<p>This briefing synthesizes intelligence collected through April 7, 2026, and is designed to give state IT leadership a single, prioritized view of what matters right now and what to do about it.</p>
<h2><strong>What Changed (April 3–7, 2026)</strong></h2>
<table>
<thead>
<tr>
<th>
<p>Development</p>
</th>
<th>
<p>Why It Matters for State Government</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p><strong>EvilTokens PhaaS + TA416/Mustang Panda OAuth consent phishing</strong> targeting government and diplomatic organizations (April 3–6)</p>
</td>
<td>
<p>EvilTokens is deploying 1,000+ domains to attack M365 device-code authentication at industrial scale. Simultaneously, TA416 is abusing OAuth consent flows to deploy PlugX against government targets. Together, these campaigns represent a coordinated assault on identity platforms that MFA alone cannot stop.</p>
</td>
</tr>
<tr>
<td>
<p><strong>FortiClient EMS CVE-2026-35616</strong> (CVSS 9.8) confirmed actively exploited (April 6)</p>
</td>
<td>
<p>An unauthenticated remote code execution vulnerability in a widely deployed perimeter security appliance is under active exploitation. Any unpatched FortiClient EMS instance is a direct network entry point.</p>
</td>
</tr>
<tr>
<td>
<p><strong>ClickFix + AMOS Stealer campaign</strong> targeting AI tool users (Claude Code, Gemini CLI, Cursor, others) via poisoned Google Ads</p>
</td>
<td>
<p>State developers and data scientists adopting AI tools are now a direct target. AMOS harvests macOS Keychain credentials, browser sessions, and files — a single compromised developer workstation can yield VPN credentials, cloud tokens, and code-signing keys.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Storm Stealer</strong> emerges as a $1,000/month rental toolkit with server-side decryption and Google Refresh Token session hijacking</p>
</td>
<td>
<p>Storm bypasses endpoint detection entirely by exfiltrating encrypted browser data for remote decryption. Its ability to restore authenticated Google/M365 sessions using stolen refresh tokens with geo-matched proxies means <strong>MFA alone is no longer sufficient</strong> to protect cloud identity.</p>
</td>
</tr>
<tr>
<td>
<p><strong>SmartApeSG</strong> traffic distribution system actively injecting malicious JavaScript into compromised legitimate websites (April 6)</p>
</td>
<td>
<p>Any state employee browsing a compromised site — or any state agency website running vulnerable CMS plugins — is at risk of drive-by compromise.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Three ICS advisories</strong> issued: Siemens SICAM 8, Yokogawa CENTUM VP, Hitachi Energy Ellipse</p>
</td>
<td>
<p>Directly relevant to state-operated water treatment, transportation, and utility SCADA environments. The Yokogawa vulnerability allows attacker login as the PROG user with permission modification capability.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Operation Epic Fury</strong> pro-Iran hacktivist campaign escalates from DDoS to <strong>destructive/wiper operations</strong> (1,583 verified incidents, 144 financial institutions, 14 countries)</p>
</td>
<td>
<p>While primarily targeting financial services, the campaign's expansion trajectory and involvement of NoName057(16) — which simultaneously targets NATO-aligned government infrastructure — creates direct spillover risk for state government portals and citizen-facing services.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Ransomware groups remain active against government:</strong> DragonForce (last victim April 5), Akira (last victim April 6), Qilin/REVENANT SPIDER (updated April 7)</p>
</td>
<td>
<p>State and local government remains the #1 public-sector ransomware target. No new state victim was confirmed this cycle, but operational tempo has not decreased.</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>Threat Timeline: March 19 – April 7, 2026</strong></h2>
<table>
<thead>
<tr>
<th>
<p>Date</p>
</th>
<th>
<p>Event</p>
</th>
<th>
<p>Actors / Malware</p>
</th>
<th>
<p>Impact</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Mar 19</p>
</td>
<td>
<p>DOJ seizure of Iranian cyber infrastructure</p>
</td>
<td>
<p>APT42, CyberAv3ngers, MuddyWater, Handala/Void Manticore</p>
</td>
<td>
<p>Triggered confirmed retaliatory pre-positioning in U.S. critical infrastructure</p>
</td>
</tr>
<tr>
<td>
<p>Apr 2</p>
</td>
<td>
<p>CISA publishes three ICS advisories</p>
</td>
<td>
<p>—</p>
</td>
<td>
<p>Siemens SICAM 8, Yokogawa CENTUM VP, Hitachi Energy Ellipse vulnerabilities disclosed</p>
</td>
</tr>
<tr>
<td>
<p>Apr 3–4</p>
</td>
<td>
<p>OAuth consent phishing campaigns against government/diplomatic targets</p>
</td>
<td>
<p>TA416/Mustang Panda (China)</p>
</td>
<td>
<p>PlugX deployment via OAuth abuse targeting government organizations</p>
</td>
</tr>
<tr>
<td>
<p>Apr 5</p>
</td>
<td>
<p>DragonForce ransomware claims latest government victim</p>
</td>
<td>
<p>DragonForce</p>
</td>
<td>
<p>Continued government-sector targeting</p>
</td>
</tr>
<tr>
<td>
<p>Apr 6</p>
</td>
<td>
<p>FortiClient EMS CVE-2026-35616 (CVSS 9.8) confirmed actively exploited</p>
</td>
<td>
<p>Multiple actors</p>
</td>
<td>
<p>Critical perimeter appliance vulnerability under active exploitation</p>
</td>
</tr>
<tr>
<td>
<p>Apr 6</p>
</td>
<td>
<p>EvilTokens PhaaS platform deploying 1,000+ domains targeting M365 device-code auth</p>
</td>
<td>
<p>EvilTokens operators</p>
</td>
<td>
<p>Identity platform attack at industrial scale</p>
</td>
</tr>
<tr>
<td>
<p>Apr 6</p>
</td>
<td>
<p>SmartApeSG campaign actively injecting JS into compromised websites</p>
</td>
<td>
<p>SmartApeSG TDS, HANEYMANEY, ZPHP</p>
</td>
<td>
<p>Drive-by compromise risk for state employees and state-hosted websites</p>
</td>
</tr>
<tr>
<td>
<p>Apr 6</p>
</td>
<td>
<p>Storm Stealer capability analysis published</p>
</td>
<td>
<p>Storm Stealer</p>
</td>
<td>
<p>Server-side credential exfiltration with MFA bypass via session hijacking</p>
</td>
</tr>
<tr>
<td>
<p>Apr 6</p>
</td>
<td>
<p>Akira ransomware claims latest victim</p>
</td>
<td>
<p>PUNK SPIDER / Akira</p>
</td>
<td>
<p>Government-targeting ransomware remains operationally active</p>
</td>
</tr>
<tr>
<td>
<p>Apr 6</p>
</td>
<td>
<p>CISA adds new entry to Known Exploited Vulnerabilities catalog</p>
</td>
<td>
<p>—</p>
</td>
<td>
<p>Confirmed in-the-wild exploitation requiring federal remediation</p>
</td>
</tr>
<tr>
<td>
<p>Apr 7</p>
</td>
<td>
<p>ClickFix + AMOS macOS campaign targeting AI tool users discovered</p>
</td>
<td>
<p>AMOS (Atomic macOS Stealer)</p>
</td>
<td>
<p>Credential theft via fake AI tool documentation pages served through Google Ads</p>
</td>
</tr>
<tr>
<td>
<p>Feb 28 – Apr 6</p>
</td>
<td>
<p>Operation Epic Fury escalates to destructive attacks</p>
</td>
<td>
<p>Conquerors Electronic Army, NoName057(16), 313 Team, Anonymous For Justice, Hider_Nex</p>
</td>
<td>
<p>1,583 incidents across 14 countries; shift from DDoS to wiper operations in April</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>Key Threat Analysis </strong></h2>
<h3><strong>1. The Identity Platform Crisis: From Phishing to Platform Compromise</strong></h3>
<p>Three distinct campaigns are now converging on the same objective — <strong>stealing and replaying authenticated sessions to bypass MFA</strong>:</p>
<ul>
<li><strong>EvilTokens PhaaS</strong> (1,000+ domains) targets Microsoft 365 device-code authentication flows at industrial scale</li>
<li><strong>TA416/Mustang Panda</strong> uses OAuth consent phishing to deploy PlugX through legitimate authentication mechanisms</li>
<li><strong>Storm Stealer</strong> ($1,000/month rental) exfiltrates encrypted browser data server-side and replays Google Refresh Tokens with geo-matched SOCKS5 proxies to restore authenticated sessions without triggering alerts</li>
</ul>
<p>The common thread: <strong>MFA is necessary but no longer sufficient.</strong> Attackers have moved past credential theft to session theft, token replay, and OAuth abuse. For state agencies running Microsoft 365 and Azure AD — which is effectively all of them — this represents a fundamental shift in the threat model. Identity platforms now require the same continuous monitoring, segmentation, and defense-in-depth that network perimeters received a decade ago.</p>
<p><strong>Named actors:</strong> TA416/Mustang Panda (China), APT42 (IRGC-IO), Kimsuky (DPRK), APT28 (Russia) — all have demonstrated OAuth or token-based attack capabilities against government targets.</p>
<h3><strong>2. Ransomware: Sustained Pressure on State and Local Government</strong></h3>
<p>The ransomware threat to state government has not diminished. Four groups with confirmed government-targeting activity were updated in intelligence feeds between April 5–7:</p>
<table>
<thead>
<tr>
<th>
<p>Group</p>
</th>
<th>
<p>Alias</p>
</th>
<th>
<p>Last Confirmed Victim</p>
</th>
<th>
<p>Notable Capability</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p><strong>Akira</strong></p>
</td>
<td>
<p>PUNK SPIDER</p>
</td>
<td>
<p>April 6, 2026</p>
</td>
<td>
<p>Dual-extortion; Linux/ESXi variants</p>
</td>
</tr>
<tr>
<td>
<p><strong>DragonForce</strong></p>
</td>
<td>
<p>—</p>
</td>
<td>
<p>April 5, 2026</p>
</td>
<td>
<p>Onion-based leak site; aggressive public shaming</p>
</td>
</tr>
<tr>
<td>
<p><strong>Qilin</strong></p>
</td>
<td>
<p>REVENANT SPIDER</p>
</td>
<td>
<p>Updated April 7, 2026</p>
</td>
<td>
<p>Targets managed service providers for downstream access</p>
</td>
</tr>
<tr>
<td>
<p><strong>LockBit</strong></p>
</td>
<td>
<p>BITWISE SPIDER</p>
</td>
<td>
<p>Active</p>
</td>
<td>
<p>Despite law enforcement disruption, affiliate network persists</p>
</td>
</tr>
</tbody>
</table>
<p><strong>Key concern for state agencies:</strong> Qilin/REVENANT SPIDER's targeting of managed service providers (MSPs) is particularly dangerous for state governments that rely on MSPs for specialized agency IT. A single MSP compromise can cascade across multiple agencies simultaneously.</p>
<h3><strong>3. ICS/SCADA: Vulnerabilities in State-Operated Critical Infrastructure</strong></h3>
<p>Three ICS advisories published April 2 affect systems commonly deployed in state-operated utilities and infrastructure:</p>
<table>
<thead>
<tr>
<th>
<p>Advisory</p>
</th>
<th>
<p>Product</p>
</th>
<th>
<p>State Gov Relevance</p>
</th>
<th>
<p>Risk</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>ICSA-26-092-01</p>
</td>
<td>
<p><strong>Siemens SICAM 8</strong></p>
</td>
<td>
<p>Water/wastewater SCADA, energy distribution</p>
</td>
<td>
<p>Denial of service against SICAM A8000 devices</p>
</td>
</tr>
<tr>
<td>
<p>ICSA-26-092-02</p>
</td>
<td>
<p><strong>Yokogawa CENTUM VP</strong></p>
</td>
<td>
<p>Process control in water treatment, chemical facilities</p>
</td>
<td>
<p>Attacker can login as PROG user and modify permissions — <strong>direct control manipulation</strong></p>
</td>
</tr>
<tr>
<td>
<p>ICSA-26-092-03</p>
</td>
<td>
<p><strong>Hitachi Energy Ellipse</strong></p>
</td>
<td>
<p>Utility asset management</p>
</td>
<td>
<p>Jasper Report vulnerability in asset management platform</p>
</td>
</tr>
</tbody>
</table>
<p>The Yokogawa CENTUM VP vulnerability is the most concerning: it allows an attacker to authenticate as the PROG user and modify system permissions, which maps directly to ICS ATT&CK techniques T0831 (Manipulation of Control) and T0836 (Modify Parameter). For state agencies operating water treatment or chemical processing facilities, this vulnerability should be treated as critical regardless of CVSS score.</p>
<p><strong>Continuing threat context:</strong> The March 19 DOJ seizure of Iranian cyber infrastructure triggered confirmed retaliatory pre-positioning by CyberAv3ngers (IRGC-CEC) in U.S. critical infrastructure — the same group that compromised Unitronics PLCs in U.S. water systems in late 2023. State water and wastewater utilities remain in the threat crosshairs.</p>
<h3><strong>4. ClickFix + AMOS: AI Tool Adoption Creates a New Attack Surface</strong></h3>
<p>The ClickFix social engineering technique — which tricks users into copying and executing terminal commands — has been weaponized against users of AI development tools including Claude Code, Grok, n8n, NotebookLM, Gemini CLI, OpenClaw, and Cursor. Attackers purchased Google Ads to serve fake documentation pages that deploy <strong>AMOS (Atomic macOS Stealer)</strong>.</p>
<p>AMOS capabilities on a compromised macOS endpoint:</p>
<ul>
<li>Escalates to root</li>
<li>Harvests macOS Keychain passwords (including VPN credentials, SSH keys, certificates)</li>
<li>Sweeps browser credentials and session cookies from Chrome, Safari, and Firefox</li>
<li>Empties cryptocurrency wallets</li>
<li>Collects files from Desktop, Documents, and Downloads</li>
<li>Installs a persistent backdoor with WebSocket reverse shell</li>
</ul>
<p><strong>Why this matters for state government:</strong> State IT modernization initiatives are driving rapid adoption of AI tools for code generation, data analysis, and automation. Developers and data scientists are high-privilege users with access to production systems, code repositories, and cloud infrastructure. A single compromised developer workstation can yield credentials that unlock far more than the developer's own accounts.</p>
<h3><strong>5. Operation Epic Fury: Pro-Iran Hacktivist Escalation</strong></h3>
<p>Between February 28 and April 6, 2026, the pro-Iran hacktivist coalition behind Operation Epic Fury executed <strong>1,583 verified incidents</strong> across 14 countries, targeting 144 financial institutions. The critical development: <strong>in April, the campaign shifted from DDoS to destructive operations</strong>, including potential wiper malware deployment.</p>
<p>Key participating groups:</p>
<ul>
<li><strong>Conquerors Electronic Army</strong> — 32 financial sector incidents</li>
<li><strong>NoName057(16)</strong> — 25 incidents (Russian-affiliated; simultaneously targets NATO government infrastructure)</li>
<li><strong>313 Team</strong> — 10 incidents (Iraq-based)</li>
<li><strong>Anonymous For Justice</strong> — 8 destructive attacks debuting April 1</li>
<li><strong>Hider_Nex</strong> — 10 incidents with geographic expansion into Africa</li>
</ul>
<p><strong>State government spillover risk:</strong> NoName057(16) has a documented history of targeting government web portals in NATO-aligned countries. The group's participation in a pro-Iran coalition that is escalating to destructive operations raises the probability that state government citizen-facing portals could be targeted — particularly during periods of heightened U.S.-Iran tension following the March 19 DOJ seizure.</p>
<h2><strong>Predictive Analysis: Most Likely Attack Scenarios (Next 7–14 Days)</strong></h2>
<table>
<thead>
<tr>
<th>
<p>Scenario</p>
</th>
<th>
<p>Probability</p>
</th>
<th>
<p>Basis</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p><strong>Ransomware incident at a U.S. state or local government agency</strong> (Akira, DragonForce, or Qilin)</p>
</td>
<td>
<p><strong>HIGH (75–85%)</strong></p>
</td>
<td>
<p>Four active groups with confirmed government targeting; operational tempo sustained through April 6–7; MSP supply chain vector amplifies reach</p>
</td>
</tr>
<tr>
<td>
<p><strong>Session hijacking attack against state M365/Azure AD environment</strong> using token replay or OAuth abuse</p>
</td>
<td>
<p><strong>HIGH (70–80%)</strong></p>
</td>
<td>
<p>EvilTokens (1,000+ domains), Storm Stealer (session replay capability), and TA416 OAuth phishing all active simultaneously; state agencies are heavy M365 users</p>
</td>
</tr>
<tr>
<td>
<p><strong>ClickFix/AMOS credential theft affecting a state government developer or analyst</strong></p>
</td>
<td>
<p><strong>MODERATE (40–55%)</strong></p>
</td>
<td>
<p>Campaign is active and targeting AI tools being adopted by government; Google Ads delivery mechanism bypasses email security controls</p>
</td>
</tr>
<tr>
<td>
<p><strong>DDoS or defacement of state government web portal</strong> by pro-Iran or NoName057(16) hacktivists</p>
</td>
<td>
<p><strong>MODERATE (35–50%)</strong></p>
</td>
<td>
<p>Operation Epic Fury expanding geographically; NoName057(16) has government-targeting history; U.S.-Iran tensions elevated post-DOJ seizure</p>
</td>
</tr>
<tr>
<td>
<p><strong>Exploitation of unpatched ICS/SCADA system</strong> (Siemens SICAM, Yokogawa CENTUM VP) at a state-operated utility</p>
</td>
<td>
<p><strong>LOW-MODERATE (20–35%)</strong></p>
</td>
<td>
<p>Advisories just published; exploitation requires network access to OT environment; but Iranian pre-positioning in U.S. water infrastructure raises the floor</p>
</td>
</tr>
<tr>
<td>
<p><strong>SmartApeSG drive-by compromise of a state agency website or state employee browsing session</strong></p>
</td>
<td>
<p><strong>MODERATE (35–45%)</strong></p>
</td>
<td>
<p>Campaign actively injecting JS into legitimate sites; state CMS platforms (especially WordPress) are common targets for injection</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>SOC Operational Guidance </strong></h2>
<h3><strong>Hunt Hypotheses</strong></h3>
<p><strong>Hypothesis 1: ClickFix Terminal Command Execution on macOS Endpoints</strong></p>
<ul>
<li><strong>ATT&CK:</strong> T1204.002 (User Execution: Malicious File), T1059.004 (Unix Shell), T1555.001 (Keychain), T1547 (Boot/Logon Autostart)</li>
<li><strong>Hunt:</strong> Query EDR for curl | bash, curl | sh, or osascript -e executions initiated from browser processes on macOS. Look for new LaunchAgent or LaunchDaemon plist files created within 60 seconds of a browser-spawned shell. Correlate with DNS queries to recently registered domains mimicking AI tool documentation sites.</li>
<li><strong>Detection:</strong> Alert on any macOS endpoint where a browser process spawns /bin/bash, /bin/zsh, or osascript with network download commands.</li>
</ul>
<p><strong>Hypothesis 2: M365 Session Token Replay / OAuth Consent Abuse</strong></p>
<ul>
<li><strong>ATT&CK:</strong> T1550.001 (Application Access Token), T1539 (Steal Web Session Cookie), T1528 (Steal Application Access Token)</li>
<li><strong>Hunt:</strong> In Azure AD sign-in logs, search for authentication events where the same user session appears from two geographically distant IP addresses within a short window (< 2 hours). Look for OAuth application consent grants to unfamiliar application IDs — especially those requesting Mail.Read, Files.Read.All, or User.Read.All scopes. Monitor for device-code authentication flows (grant_type=urn:ietf:params:oauth:grant-type:device_code) from unexpected user populations.</li>
<li><strong>Detection:</strong> Alert on new OAuth app consent grants, device-code auth from non-mobile users, and impossible-travel sign-in anomalies.</li>
</ul>
<p><strong>Hypothesis 3: SmartApeSG JavaScript Injection on State Websites</strong></p>
<ul>
<li><strong>ATT&CK:</strong> T1189 (Drive-by Compromise), T1059.007 (JavaScript), T1071.001 (Web Protocols)</li>
<li><strong>Hunt:</strong> Scan state-managed web properties for unauthorized <script> tags referencing external domains — particularly domains ending in .top or recently registered domains. Review web server access logs for requests to paths containing /realm/ or filenames like session-header.js, rate-effect.php, legacy-validator.js. Monitor DNS logs for state employee endpoints resolving domains associated with SmartApeSG infrastructure.</li>
<li><strong>Detection:</strong> Web application firewall (WAF) rules to block script injection from known SmartApeSG domains. DNS sinkhole for confirmed malicious domains.</li>
</ul>
<p><strong>Hypothesis 4: Ransomware Pre-Positioning via MSP Compromise</strong></p>
<ul>
<li><strong>ATT&CK:</strong> T1199 (Trusted Relationship), T1021.001 (Remote Desktop Protocol), T1486 (Data Encrypted for Impact)</li>
<li><strong>Hunt:</strong> Audit all MSP remote access connections to state networks. Look for RDP, RMM tool (ConnectWise, AnyDesk, TeamViewer), or VPN sessions from MSP IP ranges occurring outside normal maintenance windows. Monitor for lateral movement patterns originating from MSP-connected network segments. Check for new service accounts or scheduled tasks created on systems accessible to MSP personnel.</li>
<li><strong>Detection:</strong> Enforce just-in-time (JIT) access for MSP connections. Alert on any MSP-origin session that touches systems outside the MSP's contracted scope.</li>
</ul>
<p><strong>Hypothesis 5: ICS/SCADA Unauthorized Access</strong></p>
<ul>
<li><strong>ATT&CK:</strong> T0831 (Manipulation of Control), T0836 (Modify Parameter), T0855 (Unauthorized Command Message)</li>
<li><strong>Hunt:</strong> In OT network monitoring, look for authentication attempts to Yokogawa CENTUM VP systems using the PROG account from non-standard workstations. Monitor Siemens SICAM A8000 devices for unusual configuration changes or restart patterns. Review firewall logs for any IT-to-OT traffic that was not explicitly authorized.</li>
<li><strong>Detection:</strong> Ensure OT network monitoring is capturing authentication events. Alert on any PROG account login from an IP not on the authorized engineering workstation list.</li>
</ul>
<h2><strong>Sector-Specific Defensive Priorities</strong></h2>
<h3><strong>Financial Services (State Treasury, Revenue, Pension Funds)</strong></h3>
<p>Operation Epic Fury has directly targeted 144 financial institutions across 14 countries, with the April escalation to destructive/wiper operations representing a step-change in risk. State treasury systems, revenue collection portals, and pension fund management platforms share the same technology stack as commercial financial institutions.</p>
<ul>
<li><strong>Immediate:</strong> Enable enhanced DDoS protection on all citizen-facing financial portals (tax filing, payment processing, benefits disbursement). Validate that anti-DDoS services can absorb volumetric attacks from NoName057(16)'s DDoSia botnet.</li>
<li><strong>7-Day:</strong> Conduct tabletop exercise simulating a wiper attack against the state's financial management system. Verify that offline backups of financial databases are current and tested.</li>
<li><strong>30-Day:</strong> Implement network segmentation between citizen-facing financial portals and backend financial management systems. Ensure that a compromised web frontend cannot reach core accounting or ERP systems.</li>
</ul>
<h3><strong>Energy (State-Operated Utilities, Grid Coordination)</strong></h3>
<p>The Siemens SICAM 8 and Hitachi Energy Ellipse advisories directly affect energy distribution and utility asset management. Combined with confirmed Iranian pre-positioning in U.S. critical infrastructure following the March 19 DOJ seizure, state-operated energy infrastructure faces elevated risk.</p>
<ul>
<li><strong>Immediate:</strong> Inventory all Siemens SICAM A8000 and Hitachi Energy Ellipse deployments. Apply vendor mitigations from ICSA-26-092-01 and ICSA-26-092-03 where patches are available.</li>
<li><strong>7-Day:</strong> Validate IT/OT network segmentation. Confirm that no direct path exists from the corporate network or internet to SICAM or Ellipse management interfaces. Audit firewall rules governing IT-to-OT traffic.</li>
<li><strong>30-Day:</strong> Deploy passive OT network monitoring (e.g., Claroty, Dragos, Nozomi) if not already in place. Establish baseline behavioral profiles for SCADA communication patterns to enable anomaly detection.</li>
</ul>
<h3><strong>Healthcare (State Health Agencies, Medicaid Systems, Public Health Labs)</strong></h3>
<p>State health agencies manage protected health information (PHI) for millions of residents and operate systems subject to HIPAA. Ransomware groups — particularly Akira and Qilin — have demonstrated willingness to target healthcare organizations, and the Storm Stealer's session hijacking capability threatens cloud-based health information exchanges.</p>
<ul>
<li><strong>Immediate:</strong> Verify that all health agency M365 tenants have Conditional Access policies enforcing compliant-device-only access. Disable legacy authentication protocols (IMAP, POP3, SMTP AUTH) that bypass MFA.</li>
<li><strong>7-Day:</strong> Audit OAuth application consent grants in health agency Azure AD tenants. Revoke any unfamiliar or overly permissive application registrations. Implement admin-consent-only policies for new OAuth apps.</li>
<li><strong>30-Day:</strong> Conduct a ransomware readiness assessment for Medicaid management systems and electronic health record (EHR) platforms. Ensure that recovery time objectives (RTOs) for critical health systems are documented and tested.</li>
</ul>
<h3><strong>Government (Executive Branch Agencies, Elections, Law Enforcement)</strong></h3>
<p>State executive branch agencies are the primary target for both nation-state espionage (Mustang Panda/TA416, Kimsuky, APT28) and ransomware. The TA416 OAuth consent phishing campaign (April 3–4) specifically targeted government organizations with PlugX deployment.</p>
<ul>
<li><strong>Immediate:</strong> Push emergency awareness communications to all agency IT staff about the ClickFix social engineering technique — specifically the danger of copying terminal commands from websites. Include screenshots of the fake AI tool documentation pages.</li>
<li><strong>7-Day:</strong> Review all FortiClient EMS deployments for CVE-2026-35616 (CVSS 9.8) patching status. This vulnerability is confirmed actively exploited and provides unauthenticated remote code execution on a perimeter security appliance.</li>
<li><strong>30-Day:</strong> Implement phishing-resistant authentication (FIDO2/passkeys) for all privileged accounts (domain admins, Azure AD global admins, security administrators). Token-based attacks (EvilTokens, Storm Stealer, TA416 OAuth abuse) are specifically designed to defeat traditional MFA — only phishing-resistant methods close this gap.</li>
</ul>
<h3><strong>Aviation / Logistics (State DOT, Airport Authorities, Port Operations)</strong></h3>
<p>State departments of transportation, airport authorities, and port operations manage both IT and OT systems. The Yokogawa CENTUM VP vulnerability (ICSA-26-092-02) affects process control systems used in transportation infrastructure, and ransomware groups have historically targeted transportation agencies for their operational urgency.</p>
<ul>
<li><strong>Immediate:</strong> Inventory all Yokogawa CENTUM VP deployments in transportation and port operations. Restrict PROG account access to authorized engineering workstations only. Monitor for any PROG account authentication from unexpected sources.</li>
<li><strong>7-Day:</strong> Audit remote access pathways to transportation OT networks. Ensure that VPN access to OT segments requires separate credentials from IT network access and is logged independently.</li>
<li><strong>30-Day:</strong> Develop or update continuity of operations plans (COOP) for a ransomware scenario affecting traffic management, toll collection, or port operations systems. Identify manual fallback procedures for critical transportation functions.</li>
</ul>
<h2><strong>Prioritized Defense Recommendations</strong></h2>
<h3><strong>IMMEDIATE (Within 24 Hours)</strong></h3>
<table>
<thead>
<tr>
<th>
<p>Priority</p>
</th>
<th>
<p>Team</p>
</th>
<th>
<p>Action</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p><strong>IMMEDIATE</strong></p>
</td>
<td>
<p>SOC</p>
</td>
<td>
<p>Block all IOCs listed in the IOC Blocking Guidance table above at perimeter firewalls, DNS sinkholes, and endpoint protection platforms.</p>
</td>
</tr>
<tr>
<td>
<p><strong>IMMEDIATE</strong></p>
</td>
<td>
<p>SOC</p>
</td>
<td>
<p>Create detection rules for ClickFix-style execution: browser process → shell process → network download on macOS endpoints (T1204.002, T1059.004).</p>
</td>
</tr>
<tr>
<td>
<p><strong>IMMEDIATE</strong></p>
</td>
<td>
<p>Identity/IAM</p>
</td>
<td>
<p>Audit Azure AD sign-in logs for device-code authentication flows (grant_type=device_code) from unexpected users or IP ranges. Investigate any anomalies as potential EvilTokens compromise.</p>
</td>
</tr>
<tr>
<td>
<p><strong>IMMEDIATE</strong></p>
</td>
<td>
<p>Identity/IAM</p>
</td>
<td>
<p>Review and revoke any OAuth application consent grants created in the last 30 days that request Mail.Read, Files.Read.All, or User.Read.All permissions from unfamiliar application IDs.</p>
</td>
</tr>
<tr>
<td>
<p><strong>IMMEDIATE</strong></p>
</td>
<td>
<p>Web/AppSec</p>
</td>
<td>
<p>Scan all state-managed websites for unauthorized external JavaScript includes, particularly references to .top domains or paths containing /realm/.</p>
</td>
</tr>
<tr>
<td>
<p><strong>IMMEDIATE</strong></p>
</td>
<td>
<p>ICS/OT</p>
</td>
<td>
<p>Confirm network isolation of all Yokogawa CENTUM VP and Siemens SICAM A8000 systems. Verify no unauthorized IT-to-OT pathways exist.</p>
</td>
</tr>
</tbody>
</table>
<h3><strong>7-DAY</strong></h3>
<table>
<thead>
<tr>
<th>
<p>Priority</p>
</th>
<th>
<p>Team</p>
</th>
<th>
<p>Action</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p><strong>7-DAY</strong></p>
</td>
<td>
<p>IT Ops</p>
</td>
<td>
<p>Verify patching status of all FortiClient EMS instances for CVE-2026-35616 (CVSS 9.8, actively exploited). Isolate any unpatched instances from the network until remediation is complete.</p>
</td>
</tr>
<tr>
<td>
<p><strong>7-DAY</strong></p>
</td>
<td>
<p>Identity/IAM</p>
</td>
<td>
<p>Implement Conditional Access policies requiring compliant/managed devices for all M365 access. Disable legacy authentication protocols (IMAP, POP3, SMTP AUTH) across all tenants.</p>
</td>
</tr>
<tr>
<td>
<p><strong>7-DAY</strong></p>
</td>
<td>
<p>SOC</p>
</td>
<td>
<p>Deploy hunting queries for Storm Stealer session replay indicators: same-user authentication from geographically impossible locations within short time windows; Google Refresh Token usage from non-standard user agents.</p>
</td>
</tr>
<tr>
<td>
<p><strong>7-DAY</strong></p>
</td>
<td>
<p>IT Ops</p>
</td>
<td>
<p>Audit all MSP remote access connections. Implement just-in-time (JIT) access controls and ensure MSP sessions are logged, time-limited, and scoped to contracted systems only.</p>
</td>
</tr>
<tr>
<td>
<p><strong>7-DAY</strong></p>
</td>
<td>
<p>CISO/IR</p>
</td>
<td>
<p>Conduct a 2-hour tabletop exercise simulating a ransomware attack against a critical agency (e.g., revenue, health, transportation). Test notification chains, backup restoration procedures, and executive communication plans.</p>
</td>
</tr>
</tbody>
</table>
<h3><strong>30-DAY</strong></h3>
<table>
<thead>
<tr>
<th>
<p>Priority</p>
</th>
<th>
<p>Team</p>
</th>
<th>
<p>Action</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p><strong>30-DAY</strong></p>
</td>
<td>
<p>Identity/IAM</p>
</td>
<td>
<p>Deploy FIDO2/passkey authentication for all Tier 0 and Tier 1 privileged accounts (domain admins, Azure AD global admins, security admins, backup admins). This is the only effective countermeasure against token replay and OAuth consent phishing.</p>
</td>
</tr>
<tr>
<td>
<p><strong>30-DAY</strong></p>
</td>
<td>
<p>IT Ops/OT</p>
</td>
<td>
<p>Deploy passive OT network monitoring on all state-operated ICS/SCADA networks. Establish behavioral baselines for normal SCADA communication patterns.</p>
</td>
</tr>
<tr>
<td>
<p><strong>30-DAY</strong></p>
</td>
<td>
<p>SOC</p>
</td>
<td>
<p>Implement continuous session monitoring for M365 — detect and alert on token refresh anomalies, impossible travel, and session cookie replay. Evaluate Microsoft Entra ID Protection or equivalent ITDR tooling.</p>
</td>
</tr>
<tr>
<td>
<p><strong>30-DAY</strong></p>
</td>
<td>
<p>CISO</p>
</td>
<td>
<p>Commission an external assessment of MSP access controls and supply chain risk across all agencies using third-party IT service providers. Prioritize MSPs with administrative access to Active Directory or cloud identity.</p>
</td>
</tr>
<tr>
<td>
<p><strong>30-DAY</strong></p>
</td>
<td>
<p>CISO/Legal</p>
</td>
<td>
<p>Review state cybersecurity incident reporting obligations and ensure all agencies have updated incident response plans that reflect current notification timelines and escalation requirements.</p>
</td>
</tr>
<tr>
<td>
<p><strong>30-DAY</strong></p>
</td>
<td>
<p>Web/AppSec</p>
</td>
<td>
<p>Implement Content Security Policy (CSP) headers on all state-managed web properties to prevent unauthorized script injection (SmartApeSG and similar TDS campaigns). Audit CMS platforms — especially WordPress — for vulnerable plugins.</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>Intelligence Collection Note </strong></h2>
<p>Open-source intelligence (OSINT) collection has been degraded for two consecutive cycles. All intelligence in this report is derived from commercial threat intelligence feeds (Anomali ThreatStream Next-Gen) and CISA advisories. This represents a collection gap that may result in delayed detection of emerging threats not yet covered by commercial feeds. The CTI team is actively working to restore full OSINT collection capability.</p>
<h2><strong>The Bottom Line </strong></h2>
<p>The threat landscape facing state government IT is defined by three converging realities:</p>
<p><strong>First, identity is the battleground.</strong> EvilTokens, Storm Stealer, TA416's OAuth phishing, and ClickFix/AMOS are all different weapons aimed at the same target: your users' authenticated sessions. Patching a firewall won't help when the attacker walks in through a stolen OAuth token. Phishing-resistant authentication (FIDO2/passkeys) for privileged accounts is no longer a roadmap item — it is an operational necessity.</p>
<p><strong>Second, the ransomware clock is ticking.</strong> Four active ransomware groups are confirmed targeting government. Qilin's focus on MSP compromise means your agency's security is only as strong as your weakest vendor's. If you haven't tested your backup restoration in the last 90 days, you don't have backups — you have hope.</p>
<p><strong>Third, the OT threat is no longer theoretical.</strong> Three ICS advisories in a single week, combined with confirmed Iranian pre-positioning in U.S. water infrastructure, means state-operated utilities must treat IT/OT segmentation as a life-safety control, not an IT project.</p>
<p>The actions in this report are specific, prioritized, and assigned. The threat actors are not waiting. Neither should you.</p>