All Posts
Anomali Cyber Watch
1
min read

The Iran Cyber Threat Machine Isn’t Slowing Down — Here’s What CISOs Need to Know Now

Published on
April 2, 2026
Table of Contents
<p><strong>Threat Assessment Level: ELEVATED</strong></p> <p><em>The assessment level remains ELEVATED, unchanged from the prior cycle. While no single event this cycle triggered an escalation to CRITICAL, the sustained operational tempo of Iranian cyber actors &mdash; combined with three new critical-severity vulnerabilities under active exploitation &mdash; demands continued heightened vigilance. The prior cycle&rsquo;s CRITICAL assessment (1 April 2026) was driven by the Handala/FBI Director breach; those events remain valid context, but today&rsquo;s intelligence reflects sustained pressure rather than a new escalation trigger.</em></p> <h2><strong>Introduction&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2> <p>Thirty-three days into the Iran-Israel cyber conflict&rsquo;s current escalation phase, Iranian state and proxy cyber operations show zero signs of de-escalation. New actor groups are emerging, ransomware is being reframed as a weapon of war rather than a profit tool, and a CVSS 10.0 vulnerability in React Server Components is being exploited at industrial scale &mdash; 766 hosts compromised in 24 hours.</p> <p>If your organization runs Next.js applications, Ivanti Endpoint Manager Mobile, or BeyondTrust Remote Support, this report requires your immediate attention. If you operate in defense, energy, government, healthcare, or financial services, the threat actors discussed here have named your sector as a target.</p> <p>This isn&rsquo;t a theoretical exercise. The infrastructure is live. The actors are active. The vulnerabilities are being exploited right now.</p> <h2><strong>What Changed&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2> <p>Since our last assessment on 1 April 2026, seven developments have reshaped the operational picture:</p> <ol> <li><strong>A new Iranian-aligned threat group, APTIran, surfaced</strong> &mdash; claiming compromise of Israeli government ministries, hospitals, universities, and financial institutions, with 350,000+ leaked credentials and ~300 internal databases. Most significantly, they claim deployment of <strong>ALPHV and LockBit ransomware as weapons of retaliation</strong>, not for profit.</li> <li><strong>Cyber Islamic Resistance emerged as a named actor</strong> &mdash; an Iran-aligned hacktivist collective claiming access to industrial control systems and OT environments, adding another group to the growing roster of Iranian proxy cyber operators.</li> <li><strong>CVE-2025-55182 (React2Shell) is under mass automated exploitation</strong> &mdash; Cisco Talos disclosed that actor UAT-10608 weaponized this CVSS 10.0 pre-authentication RCE in React Server Components, compromising 766 hosts within 24 hours using a fully automated credential harvesting pipeline. Talos&rsquo;s 2025 Year in Review calls it &ldquo;the most targeted vulnerability&rdquo; in its class, with exploitation &ldquo;likely fuelled by AI.&rdquo;</li> <li><strong>AdaptixC2 infrastructure on Iranian ASNs expanded</strong> &mdash; a new command-and-control node at 45.147.77[.]210 (ASN 51889, Tehran) was confirmed, joining three previously tracked nodes. This open-source C2 framework has replaced Cobalt Strike as the tool of choice for Iranian state actors seeking to evade commercial EDR detection.</li> <li><strong>Three critical ICS advisories landed</strong> &mdash; affecting PX4 drone autopilot systems (MAVLink RCE), WAGO industrial managed switches (CLI escape), and PTC Windchill PLM (RCE in defense manufacturing software).</li> <li><strong>UNC1860/ShroudedSnooper has gone operationally silent</strong> &mdash; last updated in threat databases on 25 March 2026, this stealthy telecom and energy backdoor operator&rsquo;s silence is consistent with deep-cover pre-positioning rather than stand-down, and warrants active hunting in affected sectors.</li> </ol> <h2><strong>Conflict &amp; Threat Timeline&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2> <table> <thead> <tr> <th> <p>Date</p> </th> <th> <p>Event</p> </th> <th> <p>Significance</p> </th> </tr> </thead> <tbody> <tr> <td> <p>4 Feb 2026</p> </td> <td> <p>AdaptixC2 node 213.177.179[.]31 first observed</p> </td> <td> <p>Iranian state actors begin standing up open-source C2 infrastructure ahead of conflict escalation</p> </td> </tr> <tr> <td> <p>28 Feb 2026</p> </td> <td> <p>Current escalation phase begins</p> </td> <td> <p>Marks the start of the sustained Iranian cyber offensive tempo</p> </td> </tr> <tr> <td> <p>28 Feb 2026</p> </td> <td> <p>AdaptixC2 node 62.60.131[.]49 first observed</p> </td> <td> <p>Second Iranian C2 node confirms deliberate infrastructure build-out</p> </td> </tr> <tr> <td> <p>24 Mar 2026</p> </td> <td> <p>APTIran and Cyber Islamic Resistance actor profiles created</p> </td> <td> <p>Google Threat Intelligence documents two new Iran-aligned groups</p> </td> </tr> <tr> <td> <p>25 Mar 2026</p> </td> <td> <p>UNC1860 / ShroudedSnooper last updated in threat databases</p> </td> <td> <p>Stealthy telecom/energy backdoor operator goes silent &mdash; possible deep-cover operations</p> </td> </tr> <tr> <td> <p>27 Mar 2026</p> </td> <td> <p>Handala Hack Team breaches FBI Director&rsquo;s personal Gmail</p> </td> <td> <p>IRGC-affiliated actors demonstrate high-value target access</p> </td> </tr> <tr> <td> <p>31 Mar 2026</p> </td> <td> <p>TWOSTROKE campaign expands to Azerbaijan and Turkey</p> </td> <td> <p>MOIS-suspected espionage actors broaden geographic targeting</p> </td> </tr> <tr> <td> <p>31 Mar 2026</p> </td> <td> <p>CISA publishes ICS advisories for PX4, WAGO, PTC Windchill</p> </td> <td> <p>New attack surface in drone systems, industrial switches, and defense PLM</p> </td> </tr> <tr> <td> <p>2 Apr 2026</p> </td> <td> <p>Cisco Talos discloses UAT-10608 / React2Shell mass exploitation</p> </td> <td> <p>766 hosts compromised in 24 hours via CVE-2025-55182 (CVSS 10.0)</p> </td> </tr> <tr> <td> <p>2 Apr 2026</p> </td> <td> <p>AdaptixC2 node 45.147.77[.]210 confirmed on Iranian ASN</p> </td> <td> <p>Fourth C2 node expands Iranian offensive infrastructure</p> </td> </tr> </tbody> </table> <h2><strong>Key Threat Analysis&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <h3><strong>Iranian State C2 Infrastructure: AdaptixC2 Replaces Cobalt Strike</strong></h3> <p>Iranian state-sponsored actors affiliated with MOIS (MuddyWater/UNC3313/UNC5667, OilRig/APT34) have systematically migrated from Cobalt Strike to <strong>AdaptixC2</strong>, an open-source command-and-control framework. Four confirmed nodes are now operational:</p> <table> <thead> <tr> <th> <p>IP Address</p> </th> <th> <p>ASN</p> </th> <th> <p>Location</p> </th> <th> <p>Confidence</p> </th> <th> <p>Port(s)</p> </th> </tr> </thead> <tbody> <tr> <td> <p>45.147.77[.]210</p> </td> <td> <p>51889 (Gostaresh Pardazesh)</p> </td> <td> <p>Tehran, IR</p> </td> <td> <p>93</p> </td> <td> <p>&mdash;</p> </td> </tr> <tr> <td> <p>62.60.131[.]49</p> </td> <td> <p>208137 (Feo Prest)</p> </td> <td> <p>Tehran, IR</p> </td> <td> <p>86</p> </td> <td> <p>&mdash;</p> </td> </tr> <tr> <td> <p>213.177.179[.]31</p> </td> <td> <p>WIS Telecom</p> </td> <td> <p>Tehran, IR</p> </td> <td> <p>88</p> </td> <td> <p>&mdash;</p> </td> </tr> <tr> <td> <p>83.142.209[.]11</p> </td> <td> <p>205759 (Ghosty Networks)</p> </td> <td> <p>Netherlands</p> </td> <td> <p>98</p> </td> <td> <p>2222</p> </td> </tr> </tbody> </table> <p>The Dutch relay node on port 2222 provides a European egress point, making geographic IP blocking insufficient. This infrastructure likely supports multiple Iranian actor groups simultaneously and represents a deliberate effort to evade signature-based detection tuned for Cobalt Strike beacons.</p> <p><strong>Why this matters:</strong> If your EDR is optimized for Cobalt Strike detection but lacks signatures for AdaptixC2, you have a blind spot that Iranian state actors are actively exploiting.</p> <h3><strong>Ransomware as a Weapon: APTIran&rsquo;s Doctrinal Shift</strong></h3> <p>APTIran&rsquo;s claimed deployment of <strong>ALPHV (BlackCat) and LockBit ransomware</strong> against Israeli critical infrastructure represents a significant doctrinal evolution. Previously, Iranian actors&rsquo; use of ransomware-as-a-service (RaaS) platforms was assessed as primarily revenue-motivated &mdash; state operators moonlighting for personal profit. APTIran explicitly frames ransomware as a retaliatory weapon, deployed for destruction and coercion rather than financial gain.</p> <p>This convergence of state-sponsored operations with criminal ransomware tooling creates attribution challenges and raises the stakes: ransomware incidents against organizations in the Iran-Israel conflict orbit may now carry geopolitical motivations that change the incident response calculus entirely.</p> <p>The group also claims exfiltration of 350,000+ Israeli government credentials and ~300 internal databases &mdash; a scale of credential compromise that, if validated, would represent one of the largest state-directed credential harvesting operations in the conflict.</p> <h3><strong>React2Shell: A CVSS 10.0 Vulnerability Exploited at Machine Speed</strong></h3> <p><strong>CVE-2025-55182</strong> is a pre-authentication remote code execution vulnerability in React Server Components affecting <strong>Next.js</strong> applications (versions 19.0.0&ndash;19.2.0). The threat actor UAT-10608 built a fully automated exploitation pipeline called the <strong>NEXUS Listener</strong> that compromised 766 hosts within 24 hours of campaign launch.</p> <p>The harvested data is staggering in scope:</p> <table> <thead> <tr> <th> <p>Data Type</p> </th> <th> <p>% of Compromised Hosts</p> </th> </tr> </thead> <tbody> <tr> <td> <p>Database credentials</p> </td> <td> <p>91.5%</p> </td> </tr> <tr> <td> <p>SSH keys</p> </td> <td> <p>78.2%</p> </td> </tr> <tr> <td> <p>AWS credentials</p> </td> <td> <p>25.6%</p> </td> </tr> <tr> <td> <p>Stripe API keys</p> </td> <td> <p>11.4%</p> </td> </tr> <tr> <td> <p>GitHub tokens</p> </td> <td> <p>8.6%</p> </td> </tr> <tr> <td> <p>Kubernetes service account tokens</p> </td> <td> <p>&mdash;</p> </td> </tr> </tbody> </table> <p>Cisco Talos&rsquo;s 2025 Year in Review explicitly notes that React2Shell became the most targeted vulnerability within weeks of disclosure, with &ldquo;industrialization of vulnerability exploitation likely fuelled by AI.&rdquo;</p> <p><strong>The Iranian nexus:</strong> While UAT-10608 is not currently attributed to Iran, the harvested credentials &mdash; particularly AWS, Azure, and Kubernetes tokens &mdash; represent exactly the kind of initial access that Iranian state actors purchase or leverage for lateral movement into government and defense cloud infrastructure. The Talos YiR confirms Iranian-linked actors increased hacktivist operations approximately 60% over the past year, and state actors like ShroudedSnooper (UNC1860) deploy stealthy backdoors in telecommunications infrastructure. React2Shell exploitation could provide the initial foothold that Iranian actors subsequently exploit.</p> <h3><strong>Critical Vulnerability Convergence</strong></h3> <p>Three additional critical-severity vulnerabilities demand immediate attention:</p> <table> <thead> <tr> <th> <p>CVE</p> </th> <th> <p>Product</p> </th> <th> <p>CVSS</p> </th> <th> <p>Type</p> </th> <th> <p>Status</p> </th> </tr> </thead> <tbody> <tr> <td> <p>CVE-2025-55182</p> </td> <td> <p>React Server Components / Next.js</p> </td> <td> <p>10.0</p> </td> <td> <p>Pre-auth RCE</p> </td> <td> <p><strong>Actively exploited at scale</strong></p> </td> </tr> <tr> <td> <p>CVE-2026-1281</p> </td> <td> <p>Ivanti EPMM</p> </td> <td> <p>9.8</p> </td> <td> <p>Pre-auth RCE</p> </td> <td> <p>Disclosed; Iranian adoption expected</p> </td> </tr> <tr> <td> <p>CVE-2026-1340</p> </td> <td> <p>Ivanti EPMM</p> </td> <td> <p>9.8</p> </td> <td> <p>Pre-auth RCE</p> </td> <td> <p>Disclosed; Iranian adoption expected</p> </td> </tr> <tr> <td> <p>CVE-2026-1731</p> </td> <td> <p>BeyondTrust Remote Support</p> </td> <td> <p>9.8</p> </td> <td> <p>Pre-auth RCE</p> </td> <td> <p>Disclosed</p> </td> </tr> </tbody> </table> <p>The Ivanti EPMM vulnerabilities are particularly concerning given Iranian actors&rsquo; track record: <strong>CVE-2024-21887</strong> (Ivanti Connect Secure) was weaponized by Iranian groups within 48 hours of proof-of-concept availability. Expect the same adoption velocity for CVE-2026-1281 and CVE-2026-1340.</p> <h3><strong>ICS/OT: Expanding Attack Surface</strong></h3> <p>The emergence of Cyber Islamic Resistance claiming ICS/OT access, combined with three new ICS advisories, expands the operational technology threat surface:</p> <ul> <li><strong>PX4 Autopilot (ICSA-26-090-02):</strong> MAVLink interface RCE enables arbitrary shell command execution on military and commercial drone platforms. In the Iran-Israel theater, where both sides rely heavily on UAS for ISR and strike operations, this vulnerability has direct kinetic implications.</li> <li><strong>WAGO Industrial Managed Switches (ICSA-26-085-01):</strong> Unauthenticated CLI escape achieves full system access on industrial network switches.</li> <li><strong>PTC Windchill PLM (ICSA-26-085-03):</strong> RCE in product lifecycle management software used extensively by defense and aerospace manufacturers &mdash; a high-value target for Iranian aerospace espionage actors.</li> </ul> <p>These advisories join the existing threat from <strong>Cyber Av3ngers (HYDRO KITTEN)</strong>, the IRGC Cyber Electronic Command-affiliated group that has maintained 21+ days of operational silence &mdash; a pattern historically consistent with pre-attack OPSEC discipline.</p> <h2><strong>Predictive Analysis&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <p>Based on current intelligence, historical pattern analysis, and the operational tempo of Iranian cyber actors:</p> <table> <thead> <tr> <th> <p>Scenario</p> </th> <th> <p>Probability</p> </th> <th> <p>Timeframe</p> </th> <th> <p>Basis</p> </th> </tr> </thead> <tbody> <tr> <td> <p>Iranian actors begin scanning for CVE-2026-1281/1340 (Ivanti EPMM)</p> </td> <td> <p><strong>70%</strong></p> </td> <td> <p>Within 7 days</p> </td> <td> <p>Historical precedent: CVE-2024-21887 weaponized within 48 hours of PoC</p> </td> </tr> <tr> <td> <p>React2Shell (CVE-2025-55182) exploitation adopted by Iranian-nexus actors</p> </td> <td> <p><strong>60%</strong></p> </td> <td> <p>Within 14 days</p> </td> <td> <p>Automated tooling lowers barrier; Iranian operators adopt commodity frameworks</p> </td> </tr> <tr> <td> <p>Cyber Av3ngers (HYDRO KITTEN) executes destructive ICS/OT operation</p> </td> <td> <p><strong>50%</strong></p> </td> <td> <p>Within 7 days</p> </td> <td> <p>21+ day operational silence consistent with pre-attack OPSEC; no de-escalation signals</p> </td> </tr> <tr> <td> <p>Additional Iran-aligned hacktivist groups emerge with CI targeting claims</p> </td> <td> <p><strong>65%</strong></p> </td> <td> <p>Within 14 days</p> </td> <td> <p>APTIran and Cyber Islamic Resistance appeared within days of each other; pattern suggests coordinated emergence</p> </td> </tr> <tr> <td> <p>Iranian actors leverage harvested React2Shell credentials for secondary operations</p> </td> <td> <p><strong>55%</strong></p> </td> <td> <p>Within 30 days</p> </td> <td> <p>Cloud credentials (AWS, Azure, K8s tokens) are high-value for lateral movement into government/defense infrastructure</p> </td> </tr> <tr> <td> <p>Ceasefire-related cyber tempo reduction</p> </td> <td> <p><strong>&lt;20%</strong></p> </td> <td> <p>Next 3 cycles</p> </td> <td> <p>Absence of de-escalation signals; continued aggressive posturing by multiple actor groups</p> </td> </tr> </tbody> </table> <h2><strong>SOC Operational Guidance&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2> <h3><strong>What to Monitor</strong></h3> <p><strong>AdaptixC2 Command &amp; Control (ATT&amp;CK: T1071.001, T1571, T1573)</strong> - Monitor for outbound connections to confirmed C2 IPs: 45.147.77[.]210, 62.60.131[.]49, 213.177.179[.]31, 83.142.209[.]11 - Alert on any traffic to port 2222 destined for ASN 205759 (Ghosty Networks, NL) - Hunt for TLS connections to Iranian ASNs 51889 and 208137 from internal hosts - Deploy network signatures for AdaptixC2 beacon patterns &mdash; these differ from Cobalt Strike&rsquo;s malleable C2 profiles</p> <p><strong>React2Shell / NEXUS Listener Exploitation (ATT&amp;CK: T1190, T1059.004, T1552.001)</strong> - Monitor web application logs for anomalous POST requests to React Server Component endpoints - Alert on HTTP callbacks matching the NEXUS Listener C2 pattern: GET /&lt;path&gt;?h=&lt;HOSTNAME&gt;&amp;l=&lt;PHASE&gt;&amp;id=&lt;ID&gt; on port 8080 - Hunt for shell scripts in /tmp/ directories with randomized names (e.g., .eba9ee1e4.sh) - Monitor for bulk reads of .env files, SSH key directories, and cloud credential metadata endpoints.</p> <p><strong>Credential Harvesting Indicators (ATT&amp;CK: T1552.005, T1528, T1078.004)</strong> - Alert on unusual access to cloud instance metadata APIs (AWS IMDS, GCP metadata server, Azure IMDS) - Monitor for exfiltration of files named environ.txt, jsenv.txt, ssh.txt, full.txt, k8s.txt, docker.txt - Watch for anomalous GitHub token usage, Kubernetes service account token access, and Stripe API key calls from unexpected sources</p> <p><strong>ICS/OT Indicators (ATT&amp;CK: T1190, T1059)</strong> - Monitor MAVLink interfaces on PX4 autopilot systems for unauthorized command injection - Audit WAGO industrial switch management interfaces for CLI escape attempts - Alert on unexpected connections to PTC Windchill PLM servers from external IPs</p> <h3><strong>Hunting Hypotheses</strong></h3> <ol> <li><strong>Hypothesis: Iranian actors have already adopted AdaptixC2 in our environment.</strong> Hunt for TLS connections from internal hosts to any IP on ASNs 51889, 208137, or 205759 over the past 90 days. Correlate with DNS queries for domains resolving to these ASNs. Check EDR telemetry for processes establishing persistent outbound connections on non-standard ports (2222, 4322, 4444).</li> <li><strong>Hypothesis: React2Shell exploitation has compromised a Next.js application in our environment.</strong> Inventory all Next.js deployments. Check web server logs for exploitation signatures. Search for /tmp/ shell scripts with randomized filenames. Audit .env files for evidence of unauthorized access. Check cloud provider logs for credential usage from unexpected geographic locations.</li> <li><strong>Hypothesis: Harvested credentials from React2Shell are being used for lateral movement.</strong> Review AWS CloudTrail, Azure Activity Logs, and GCP Audit Logs for authentication events from unfamiliar IPs or user agents. Check for new IAM roles, service accounts, or API keys created in the past 14 days. Monitor Kubernetes audit logs for service account token usage from outside the cluster.</li> <li><strong>Hypothesis: UNC1860/ShroudedSnooper has pre-positioned web shells in our telecom or energy infrastructure.</strong> Hunt for LIONTAIL and TEMPLEDOOR web shell indicators. Search for unusual IIS module loading events (T1505.003). Audit web servers for files modified in the past 90 days that don&rsquo;t match deployment records.</li> </ol> <h3><strong>Detection Rules to Deploy</strong></h3> <ul> <li><strong>Snort SIDs 66180, 66181, 301456</strong> &mdash; Qilin EDR killer detection (relevant given ransomware-as-weapon doctrine)</li> <li><strong>Sigma rules for </strong><strong>/tmp/</strong><strong> shell script execution</strong> &mdash; process_creation events where CommandLine contains /tmp/. and nohup</li> <li><strong>Cloud credential abuse detection</strong> &mdash; alert on AssumeRole or GetSessionToken API calls from IPs outside your known CIDR ranges</li> </ul> <h2><strong>Sector-Specific Defensive Priorities</strong></h2> <h3><strong>Financial Services</strong></h3> <p>Iranian actors &mdash; particularly APTIran &mdash; have explicitly claimed compromise of Israeli financial institutions. The 350,000+ credential dump, if weaponized against interconnected financial systems, could enable account takeover at scale. <strong>Priority actions:</strong> - Enforce phishing-resistant MFA (FIDO2/WebAuthn) on all customer-facing and internal banking platforms &mdash; credential dumps render password-only and SMS-based MFA insufficient - Audit SWIFT and interbank messaging systems for unauthorized access patterns - Review third-party fintech integrations running Next.js for React2Shell exposure (CVE-2025-55182) - Monitor for Stripe API key abuse &mdash; 11.4% of React2Shell victims had Stripe keys harvested</p> <h3><strong>Energy</strong></h3> <p>Cyber Av3ngers (HYDRO KITTEN) and Cyber Islamic Resistance both claim ICS/OT access targeting energy infrastructure. The 21+ day operational silence from Cyber Av3ngers is consistent with pre-attack preparation. <strong>Priority actions:</strong> - Conduct emergency audit of all internet-facing SCADA/HMI interfaces &mdash; verify network segmentation between IT and OT - Review WAGO industrial managed switch configurations for CLI escape vulnerability (ICSA-26-085-01) - Implement out-of-band monitoring for PLC firmware integrity on Yokogawa and Johnson Controls systems - Ensure OT incident response playbooks account for destructive attacks (wipers), not just ransomware - Pre-position manual override procedures for critical processes in case of control system compromise</p> <h3><strong>Healthcare</strong></h3> <p>APTIran claims hospital compromise among its Israeli targets. Healthcare organizations globally face elevated risk from ransomware-as-weapon operations where the goal is disruption rather than payment. <strong>Priority actions:</strong> - Verify offline backup integrity for electronic health record (EHR) systems &mdash; ransomware-as-weapon actors have no incentive to provide decryption keys - Audit Ivanti EPMM deployments managing clinical mobile devices &mdash; CVE-2026-1281/1340 (CVSS 9.8) enables pre-auth RCE on the mobile device management platform - Segment biomedical device networks from general IT infrastructure - Review BeyondTrust Remote Support deployments used for vendor access to medical systems &mdash; CVE-2026-1731 (CVSS 9.8)</p> <h3><strong>Government</strong></h3> <p>MuddyWater&rsquo;s confirmed MOIS espionage operations across 17 countries and 7 verticals, with government agencies as primary targets. The TWOSTROKE campaign&rsquo;s expansion to Azerbaijan and Turkey demonstrates geographic broadening beyond the immediate conflict theater. <strong>Priority actions:</strong> - Audit Microsoft 365 / Entra ID configurations for OAuth consent grant abuse &mdash; Russian actor UTA0355&rsquo;s phishing campaign (spoofing European security events) demonstrates the TTP is active, and Iranian actors have adopted similar techniques - Hunt for AdaptixC2 beacons on government networks &mdash; block all four confirmed C2 IPs at the perimeter - Review cloud identity logs for anomalous service principal activity, particularly in Azure Government and GovCloud environments - Assess exposure to PTC Windchill PLM if used in defense acquisition or procurement workflows (ICSA-26-085-03)</p> <h3><strong>Aviation &amp; Logistics</strong></h3> <p>PX4 autopilot vulnerabilities (ICSA-26-090-02) directly threaten UAS/drone operations. Iranian aerospace espionage actors (UNC6446) target PLM and design systems. <strong>Priority actions:</strong> - Audit all PX4 autopilot deployments &mdash; ensure MAVLink interfaces are not accessible from untrusted networks - Review drone ground control station (GCS) network architecture for segmentation from enterprise IT - Assess PTC Windchill PLM exposure in aerospace design and manufacturing environments - Monitor supply chain integrity for avionics firmware and flight management system updates - Implement GPS spoofing detection on UAS platforms operating in conflict-adjacent airspace</p> <h2><strong>Prioritized Defense Recommendations</strong></h2> <h3><strong>Immediate (Within 24 Hours)</strong></h3> <table> <thead> <tr> <th> <p>Priority</p> </th> <th> <p>Team</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p>🔴</p> </td> <td> <p><strong>DevOps</strong></p> </td> <td> <p>Audit ALL Next.js deployments for React Server Components versions 19.0.0&ndash;19.2.0. Patch to 19.2.1+ immediately. If patching is not possible within 24 hours, disable Server Function endpoints. Check /tmp/ directories for randomized shell scripts matching dropper patterns. <strong>(CVE-2025-55182, CVSS 10.0)</strong></p> </td> </tr> <tr> <td> <p>🔴</p> </td> <td> <p><strong>IT Ops</strong></p> </td> <td> <p>Patch Ivanti EPMM to the latest version addressing CVE-2026-1281 and CVE-2026-1340 (both CVSS 9.8, pre-auth RCE). If internet-facing, apply emergency mitigation per Ivanti advisory immediately.</p> </td> </tr> <tr> <td> <p>🔴</p> </td> <td> <p><strong>SOC</strong></p> </td> <td> <p>Block AdaptixC2 C2 IPs at perimeter firewall and ingest into threat intelligence platform: 45.147.77[.]210, 62.60.131[.]49, 213.177.179[.]31, 83.142.209[.]11 (port 2222). Query NetFlow/proxy logs for any historical connections to ASNs 51889 and 208137.</p> </td> </tr> <tr> <td> <p>🔴</p> </td> <td> <p><strong>SOC</strong></p> </td> <td> <p>Deploy detection for NEXUS Listener C2 callback pattern: HTTP GET to port 8080 with URI matching /h=*&amp;l=*&amp;id=*.</p> </td> </tr> <tr> <td> <p>🔴</p> </td> <td> <p><strong>Executive/IR</strong></p> </td> <td> <p>Brief executive leadership on the ransomware-as-weapon doctrine shift. Update incident response playbooks to account for ransomware incidents with no decryption possibility &mdash; the attacker&rsquo;s goal may be destruction, not payment. Ensure crisis communication plans cover geopolitically motivated attacks.</p> </td> </tr> </tbody> </table> <h3><strong>7-Day Actions</strong></h3> <table> <thead> <tr> <th> <p>Priority</p> </th> <th> <p>Team</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p>🟡</p> </td> <td> <p><strong>IT Ops</strong></p> </td> <td> <p>Inventory all BeyondTrust Remote Support instances and patch CVE-2026-1731 (CVSS 9.8, pre-auth RCE). Verify no unauthorized remote access tools are present.</p> </td> </tr> <tr> <td> <p>🟡</p> </td> <td> <p><strong>SOC</strong></p> </td> <td> <p>Deploy Snort SIDs 66180, 66181, 301456 for Qilin EDR killer detection. Deploy YARA/Sigma rules for AdaptixC2 beacon patterns and /tmp/ shell script execution.</p> </td> </tr> <tr> <td> <p>🟡</p> </td> <td> <p><strong>OT Security</strong></p> </td> <td> <p>Review PX4 autopilot deployments for MAVLink interface exposure. Ensure MAVLink is not accessible from untrusted networks. Audit WAGO industrial managed switches for CLI escape vulnerability per ICSA-26-085-01.</p> </td> </tr> <tr> <td> <p>🟡</p> </td> <td> <p><strong>Cloud Security</strong></p> </td> <td> <p>Audit AWS CloudTrail, Azure Activity Logs, and GCP Audit Logs for credential usage from unexpected IPs or regions. Review IAM roles and service accounts created in the past 30 days. Rotate any credentials that may have been exposed via .env files in Next.js applications.</p> </td> </tr> <tr> <td> <p>🟡</p> </td> <td> <p><strong>Identity</strong></p> </td> <td> <p>Audit Microsoft 365 / Entra ID OAuth consent grants. Revoke any suspicious application permissions. Enforce conditional access policies requiring compliant devices for sensitive applications.</p> </td> </tr> </tbody> </table> <h3><strong>30-Day Actions</strong></h3> <table> <thead> <tr> <th> <p>Priority</p> </th> <th> <p>Team</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p>🟢</p> </td> <td> <p><strong>CISO</strong></p> </td> <td> <p>Commission security assessment of PTC Windchill PLM deployment given ICSA-26-085-03 RCE vulnerability. Windchill is a high-value target for Iranian aerospace espionage actors.</p> </td> </tr> <tr> <td> <p>🟢</p> </td> <td> <p><strong>SOC</strong></p> </td> <td> <p>Establish proactive threat hunt for UNC1860/ShroudedSnooper TTPs &mdash; search for LIONTAIL/TEMPLEDOOR web shell indicators, unusual IIS module loading, and connections to Iranian ASNs from telecom and energy infrastructure.</p> </td> </tr> <tr> <td> <p>🟢</p> </td> <td> <p><strong>CISO</strong></p> </td> <td> <p>Review and update the organization&rsquo;s ransomware response strategy to address the state-sponsored ransomware-as-weapon scenario. This includes legal counsel engagement on attribution implications, government notification procedures, and insurance policy review for acts of war exclusions.</p> </td> </tr> <tr> <td> <p>🟢</p> </td> <td> <p><strong>Architecture</strong></p> </td> <td> <p>Assess network segmentation between IT and OT environments. Validate that ICS/SCADA systems are not reachable from internet-facing networks. Implement unidirectional security gateways where feasible.</p> </td> </tr> <tr> <td> <p>🟢</p> </td> <td> <p><strong>Supply Chain</strong></p> </td> <td> <p>Audit npm, PyPI, and GitHub Actions dependencies across all development pipelines. Pin GitHub Actions to commit SHAs. Implement software composition analysis (SCA) scanning for all production deployments. The backdoored Axios npm package (~45M weekly downloads, from prior cycle) and React2Shell demonstrate that the JavaScript supply chain remains a primary attack vector.</p> </td> </tr> </tbody> </table> <h2><strong>Bottom Line&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <p>Thirty-three days into this escalation cycle, the pattern is unmistakable: Iranian cyber operations are intensifying, diversifying, and professionalizing. New actor groups are standing up. Ransomware is being weaponized for destruction. Critical vulnerabilities are being exploited at machine speed. And the actors who should concern you most &mdash; Cyber Av3ngers, UNC1860 &mdash; are the ones you&rsquo;re hearing the least from.</p> <p>Silence from a capable adversary is not comfort. It is preparation.</p> <p>The three actions that will have the greatest impact on your security posture this week:</p> <ol> <li><strong>Patch Next.js</strong> (CVE-2025-55182) and <strong>Ivanti EPMM</strong> (CVE-2026-1281/1340) &mdash; these are pre-auth RCE vulnerabilities with CVSS scores of 9.8&ndash;10.0, and at least one is under active mass exploitation today.</li> <li><strong>Block the AdaptixC2 infrastructure</strong> and hunt for historical connections &mdash; four confirmed C2 nodes are operational and likely serving multiple Iranian state actor groups.</li> <li><strong>Update your incident response playbooks</strong> for ransomware-as-weapon scenarios &mdash; when the attacker&rsquo;s goal is destruction rather than payment, your negotiation playbook is worthless. Plan for no decryption key.</li> </ol> <p>The threat actors aren&rsquo;t waiting. Neither should you.</p>

FEATURED RESOURCES

April 2, 2026
Anomali Cyber Watch

The Iran Cyber Threat Machine Isn’t Slowing Down — Here’s What CISOs Need to Know Now

Read More
April 2, 2026
Public Sector
Anomali Cyber Watch

Russian Intelligence Weaponizes iOS Exploits, Ransomware Operators Blind Your Defenses, and a Critical Cisco Flaw Has No Workaround: What State Government CISOs Must Do Today

Read More
April 1, 2026
Anomali Cyber Watch

Iran's Cyber War Machine Hits Full Stride: What CISOs Must Do Right Now

Read More
Explore All