All Posts
Anomali Cyber Watch
1
min read

Iranian Cyber Forces in “Coiled Spring” Posture: What CISOs Must Do Before the Window Closes

Published on
May 7, 2026
Table of Contents
<p> <strong> Threat Assessment Level: ELEVATED </strong> <em> (Maintained from prior cycle. Downgraded from HIGH on 5 May 2026 as diplomatic negotiations suppress overt operations &mdash; but covert pre-positioning is accelerating. Conditions for rapid re-escalation to HIGH exist if negotiations collapse.) </em> </p> <h2> <strong> Introduction </strong> </h2> <p> We are now 68 days into the Iran conflict (since 28 February 2026), and the cyber dimension has entered its most dangerous phase &mdash; not because attacks are happening, but because they aren&rsquo;t. Iranian state cyber forces are updating tooling, refreshing infrastructure, and maintaining active command-and-control nodes while producing zero overt operations. This &ldquo;coiled spring&rdquo; posture mirrors the pattern observed before the 2023 Unitronics PLC attacks and the devastating March 2026 Stryker wiper incident that destroyed 200,000+ endpoints. </p> <p> Simultaneously, 11 ICS/OT advisories have dropped in 48 hours affecting vendors commonly deployed in defense, energy, and critical infrastructure environments &mdash; creating fresh attack surface that Iran-aligned hacktivists historically exploit within 7&ndash;14 days. </p> <p> The message for CISOs is clear: <strong> the quiet is the warning. </strong> </p> <h2> <strong> What Changed (Last 72 Hours) </strong> </h2> <table> <thead> <tr> <th> <p> Development </p> </th> <th> <p> Significance </p> </th> </tr> </thead> <tbody> <tr> <td> <p> <strong> APT34 (OilRig/Helix Kitten) </strong> profile updated 2026-05-07 &mdash; first activity signal after being flagged &ldquo;silent&rdquo; </p> </td> <td> <p> Backend intelligence ingestion suggests new IOCs or targeting data added; possible campaign preparation </p> </td> </tr> <tr> <td> <p> <strong> Cobalt Strike beacon active on Iranian cloud </strong> (188.121.123[.]185, Arvan Cloud) &mdash; confirmed active since Dec 2025 </p> </td> <td> <p> MOIS-linked infrastructure still operational; Arvan Cloud previously hosted MuddyWater C2 </p> </td> </tr> <tr> <td> <p> <strong> 5 new CISA ICS advisories </strong> (ABB B&amp;R &times;3, Hitachi Energy PCM600, Johnson Controls CEM AC2000) </p> </td> <td> <p> Directly affect defense/energy OT stacks; privilege escalation and PLC runtime vulnerabilities </p> </td> </tr> <tr> <td> <p> <strong> Russia confirmed sharing satellite imagery </strong> with Iran for military targeting </p> </td> <td> <p> Qualitative escalation in bilateral cooperation; cyber implications include shared C2 and false-flag potential </p> </td> </tr> <tr> <td> <p> <strong> FBI warns of Iranian assassination plot </strong> using cyber-enabled targeting pipeline </p> </td> <td> <p> Confirms Iran&rsquo;s cyber-to-physical kill chain remains active during negotiations </p> </td> </tr> <tr> <td> <p> <strong> MuddyWater silent for 2nd consecutive day </strong> despite active C2 infrastructure </p> </td> <td> <p> Pre-positioning or retooling; last confirmed operations targeted US banks, airports, and software companies </p> </td> </tr> <tr> <td> <p> <strong> 3 new SOCKS4 proxies </strong> stood up on single /24 subnet (ASN 213790) &mdash; simultaneous refresh </p> </td> <td> <p> Operational relay infrastructure buildup consistent with pre-operation OPSEC staging </p> </td> </tr> <tr> <td> <p> <strong> APT33 / Refined Kitten produces 5 new malware samples </strong> including WILDMORPH.LINUX Linux backdoor (4&ndash;6 May) </p> </td> <td> <p> Signals capability expansion into cloud and OT Linux environments; new tooling entering operational testing phase </p> </td> </tr> <tr> <td> <p> <strong> Pioneer Kitten (UNC757) DIB access &mdash; 55+ days without detection signal </strong> </p> </td> <td> <p> Dormant VPN access tradecraft means absence of signal is not absence of compromise; DIB blind spot remains unresolved </p> </td> </tr> </tbody> </table> <h2> <strong> Conflict &amp; Threat Timeline </strong> </h2> <table> <thead> <tr> <th> <p> Date </p> </th> <th> <p> Event </p> </th> <th> <p> Actor/Attribution </p> </th> </tr> </thead> <tbody> <tr> <td> <p> 2026-02-28 </p> </td> <td> <p> Iran conflict begins </p> </td> <td> <p> &mdash; </p> </td> </tr> <tr> <td> <p> 2026-03-11 </p> </td> <td> <p> Stryker medical device manufacturer wiped (200K+ endpoints) </p> </td> <td> <p> Handala / Void Manticore / BANISHED KITTEN (IRGC) </p> </td> </tr> <tr> <td> <p> 2026-03-27 </p> </td> <td> <p> FBI Director&rsquo;s personal email compromised </p> </td> <td> <p> Handala / BANISHED KITTEN (IRGC) </p> </td> </tr> <tr> <td> <p> 2026-04-07 </p> </td> <td> <p> Ukrainian intelligence reveals Russia sharing satellite targeting data with Iran </p> </td> <td> <p> Russian GRU / IRGC </p> </td> </tr> <tr> <td> <p> 2026-04-28 </p> </td> <td> <p> UNC757/Pioneer Kitten last profile update (DIB targeting) </p> </td> <td> <p> Pioneer Kitten (IRGC) </p> </td> </tr> <tr> <td> <p> 2026-05-01 </p> </td> <td> <p> BANISHED KITTEN profile updated &mdash; last known activity signal </p> </td> <td> <p> BANISHED KITTEN (IRGC) </p> </td> </tr> <tr> <td> <p> 2026-05-04&ndash;06 </p> </td> <td> <p> APT33/Refined Kitten produces 5 new malware samples including Linux backdoor </p> </td> <td> <p> APT33 / Refined Kitten (IRGC) </p> </td> </tr> <tr> <td> <p> 2026-05-05 </p> </td> <td> <p> 5 CISA ICS advisories published (ABB, Hitachi, Johnson Controls) </p> </td> <td> <p> &mdash; </p> </td> </tr> <tr> <td> <p> 2026-05-05 </p> </td> <td> <p> Project Freedom diplomatic pause announced </p> </td> <td> <p> &mdash; </p> </td> </tr> <tr> <td> <p> 2026-05-05&ndash;06 </p> </td> <td> <p> MuddyWater/UNC3313 profiles updated; no operational activity </p> </td> <td> <p> MuddyWater / Seedworm (MOIS) </p> </td> </tr> <tr> <td> <p> 2026-05-07 </p> </td> <td> <p> APT34 profile updated; SOCKS4 proxy cluster refreshed; Cobalt Strike beacon confirmed active </p> </td> <td> <p> APT34 (MOIS), infrastructure actors </p> </td> </tr> </tbody> </table> <h2> <strong> Key Threat Analysis </strong> </h2> <h3> <strong> 1. Iranian APT Pre-Positioning (APT34, MuddyWater, APT33) </strong> </h3> <p> Three of Iran&rsquo;s most capable cyber units are showing simultaneous &ldquo;infrastructure warm, operations cold&rdquo; patterns: </p> <ul> <li> <strong> APT34 (OilRig / Helix Kitten / MOIS-affiliated): </strong> Profile updated 2026-05-07 after being flagged silent. Known for spearphishing (T1566.001), PowerShell execution (T1059.001), and exploitation of public-facing applications (T1190). Active RemcosRAT C2 at 62.60.226[.]42 (port 43155, confidence 97) and 217.60.241[.]19 (port 5903). </li> <li> <strong> MuddyWater / Seedworm (MOIS-affiliated): </strong> Confirmed active C2 using Mythic framework against US financial institutions, airports, and software companies. Two consecutive days of profile updates without operational activity suggests retooling or target selection phase. Cobalt Strike infrastructure on Arvan Cloud (188.121.123[.]185) aligns with known MuddyWater tradecraft. </li> <li> <strong> APT33 / Refined Kitten (IRGC-affiliated): </strong> Produced 5 new malware samples 4&ndash;6 May including <strong> WILDMORPH.LINUX </strong> &mdash; a novel Linux-native backdoor signaling expansion into cloud and OT Linux environments. </li> </ul> <h3> <strong> 2. ICS/OT Attack Surface Expansion </strong> </h3> <p> Eleven ICS advisories in 48 hours affect vendors deployed across defense, energy, and critical infrastructure: </p> <ul> <li> <strong> ABB B&amp;R Automation Runtime </strong> &mdash; PLC runtime vulnerability affecting base HVAC/power systems </li> <li> <strong> ABB B&amp;R Automation Studio </strong> &mdash; Engineering workstation compromise vector </li> <li> <strong> Hitachi Energy PCM600 </strong> &mdash; Substation protection relay configuration tool </li> <li> <strong> Johnson Controls CEM AC2000 </strong> &mdash; Physical access control; privilege escalation from standard user to admin (T1068) </li> </ul> <p> <strong> Why this matters now: </strong> Cyber Av3ngers (IRGC-affiliated hacktivist group) historically exploits ICS vulnerabilities within 7&ndash;14 days of advisory publication. The exploitation window opened 2026-05-05. Their current silence is not reassuring &mdash; it&rsquo;s consistent with target selection. </p> <h3> <strong> 3. Russia-Iran Intelligence Fusion </strong> </h3> <p> Ukrainian intelligence and multiple corroborating sources confirm Russian satellites conducted dozens of detailed imagery surveys of military facilities across the Middle East, shared with Iran to improve strike accuracy. Cyber implications: </p> <ul> <li> Russian infrastructure may serve as shared C2 or false-flag platforms for Iranian operations </li> <li> Combined ISR + cyber targeting creates a more lethal kill chain </li> <li> Defense industrial base contractors are at elevated risk from both Russian and Iranian actors simultaneously </li> </ul> <h3> <strong> 4. The DIB Blind Spot (55+ Days Without Detection) </strong> </h3> <p> The most concerning finding is what we <em> cannot </em> see. Iranian pre-positioning in defense industrial base networks (attributed to UNC757/Pioneer Kitten and a fake-resume GitHub lure campaign targeting aerospace) has produced zero detection signals for over 55 days. This doesn&rsquo;t mean it stopped &mdash; Pioneer Kitten&rsquo;s tradecraft specifically involves dormant VPN access that activates only during kinetic escalation. Current organic detection capabilities are insufficient to confirm or deny active compromise. </p> <h2> <strong> Predictive Analysis </strong> </h2> <table> <thead> <tr> <th> <p> Scenario </p> </th> <th> <p> Probability </p> </th> <th> <p> Timeframe </p> </th> <th> <p> Trigger </p> </th> </tr> </thead> <tbody> <tr> <td> <p> Cyber Av3ngers exploit new ICS advisories (ABB/Hitachi/Johnson Controls) </p> </td> <td> <p> <strong> 35% </strong> </p> </td> <td> <p> 7&ndash;14 days </p> </td> <td> <p> Advisory publication + operational silence pattern </p> </td> </tr> <tr> <td> <p> MuddyWater launches new campaign against US financial/aviation sector </p> </td> <td> <p> <strong> 30% </strong> </p> </td> <td> <p> 7&ndash;21 days </p> </td> <td> <p> 2+ days retooling + active C2 infrastructure </p> </td> </tr> <tr> <td> <p> Negotiations collapse &rarr; coordinated cyber surge (wipers + DDoS + espionage) </p> </td> <td> <p> <strong> 25% </strong> </p> </td> <td> <p> 24&ndash;48 hours post-collapse </p> </td> <td> <p> Diplomatic failure </p> </td> </tr> <tr> <td> <p> BANISHED KITTEN/Handala deploys wiper against new target </p> </td> <td> <p> <strong> 35% </strong> </p> </td> <td> <p> 7 days </p> </td> <td> <p> 6-day silence during active conflict is anomalous </p> </td> </tr> <tr> <td> <p> DIB dormant access activation (Pioneer Kitten) </p> </td> <td> <p> <strong> 20% </strong> </p> </td> <td> <p> Immediate upon kinetic escalation </p> </td> <td> <p> Kinetic strike on Iranian territory </p> </td> </tr> <tr> <td> <p> APT33 deploys WILDMORPH.LINUX against cloud/OT Linux targets </p> </td> <td> <p> <strong> 25% </strong> </p> </td> <td> <p> 14&ndash;30 days </p> </td> <td> <p> New capability needs operational testing </p> </td> </tr> </tbody> </table> <h2> <strong> SOC Operational Guidance </strong> </h2> <h3> <strong> Immediate Detection Priorities </strong> </h3> <table> <thead> <tr> <th> <p> ATT&amp;CK Technique </p> </th> <th> <p> What to Monitor </p> </th> <th> <p> Detection Logic </p> </th> </tr> </thead> <tbody> <tr> <td> <p> T1071.001 (Web Protocols) </p> </td> <td> <p> HTTPS beaconing to 188.121.123[.]185:443 (Cobalt Strike) </p> </td> <td> <p> Alert on any connection to this IP; check JA3/JA4 fingerprints against known Cobalt Strike profiles </p> </td> </tr> <tr> <td> <p> T1219 (Remote Access Software) </p> </td> <td> <p> RemcosRAT beaconing on ports 43155, 5903 </p> </td> <td> <p> Monitor for connections to 62.60.226[.]42:43155 and 217.60.241[.]19:5903; Remcos uses predictable beacon intervals </p> </td> </tr> <tr> <td> <p> T1090 (Proxy) </p> </td> <td> <p> SOCKS4 connections to 206.123.156[.]0/24 </p> </td> <td> <p> Alert on outbound to ports 10255, 17250, 10884 on this subnet; any connection is suspicious </p> </td> </tr> <tr> <td> <p> T1059.001 (PowerShell) </p> </td> <td> <p> Encoded PowerShell execution post-phishing </p> </td> <td> <p> Detect base64-encoded commands, download cradles, AMSI bypass attempts &mdash; APT34 primary post-exploitation </p> </td> </tr> <tr> <td> <p> T1566.001 (Spearphishing) </p> </td> <td> <p> Weaponized attachments from spoofed domains </p> </td> <td> <p> Enhanced email filtering for .doc/.xls with macros from Middle Eastern sender infrastructure </p> </td> </tr> <tr> <td> <p> T1068 (Privilege Escalation) </p> </td> <td> <p> Johnson Controls CEM AC2000 exploitation </p> </td> <td> <p> Monitor for unexpected admin account creation or privilege changes on physical access control systems </p> </td> </tr> </tbody> </table> <h3> <strong> Hunting Hypotheses </strong> </h3> <ol> <li> <strong> Hunt for Mythic Framework C2: </strong> MuddyWater&rsquo;s confirmed use of Mythic against US targets means SOC teams should hunt for Mythic agent characteristics &mdash; HTTP/S callbacks with specific URI patterns, named pipes for lateral movement, and SOCKS proxy pivoting. </li> <li> <strong> Hunt for RemcosRAT persistence: </strong> Search for registry run keys, scheduled tasks, and startup folder entries associated with Remcos. Check for processes communicating on non-standard ports (43155, 5903) to Iranian ASNs. </li> <li> <strong> Hunt for dormant VPN access (PIR-007): </strong> Review all VPN accounts for: (a) accounts unused &gt;30 days that were created during the conflict period, (b) Rclone or Wasabi S3 exfiltration patterns, (c) GitHub-sourced executables in developer environments. </li> <li> <strong> Hunt for Cobalt Strike on Arvan Cloud: </strong> Beyond the known IP, search for any connections to ASN 202468 (Noyan Abr Arvan). Correlate with Cobalt Strike malleable C2 profile indicators. </li> </ol> <h2> <strong> Sector-Specific Defensive Priorities </strong> </h2> <h3> <strong> Financial Services </strong> </h3> <p> MuddyWater has confirmed active C2 targeting US banks using the Mythic framework. <strong> Priority actions: </strong> - Audit all SWIFT/payment system access for anomalous service accounts - Deploy behavioral analytics on wire transfer workflows for T1565.001 (Data Manipulation: Stored Data) - Review email gateway logs for spearphishing attempts from Iranian infrastructure (ASNs 44244, 202468, 213790) - Ensure DDoS mitigation is pre-staged &mdash; hacktivist groups historically combine DDoS with intrusion attempts as distraction </p> <h3> <strong> Energy </strong> </h3> <p> Hitachi Energy PCM600 and ABB B&amp;R vulnerabilities directly affect substation protection and industrial control. <strong> Priority actions: </strong> - Immediately patch PCM600 (ICSA-26-125-01) &mdash; this tool configures protection relays; compromise enables T0826 (Loss of Availability) - Segment engineering workstations running ABB B&amp;R Automation Studio from OT networks - Monitor for Cyber Av3ngers reconnaissance of internet-exposed HMIs (Shodan/Censys scanning from Iranian ASNs) - Review Unitronics PLC configurations if deployed &mdash; Cyber Av3ngers&rsquo; 2023 playbook targeted these specifically </p> <h3> <strong> Healthcare </strong> </h3> <p> The March 2026 Stryker wiper (200K+ endpoints) demonstrated BANISHED KITTEN&rsquo;s willingness to target healthcare supply chains. <strong> Priority actions: </strong> - Verify medical device network segmentation &mdash; especially devices with Stryker components - Pre-position incident response retainers with wiper-specific playbooks - Monitor for Handala/BANISHED KITTEN Telegram channels announcing new targets - Ensure offline backups of patient care systems are tested and current </p> <h3> <strong> Government / Defense </strong> </h3> <p> Russia-Iran satellite imagery sharing and the FBI Director email compromise demonstrate strategic intelligence targeting. <strong> Priority actions: </strong> - Enforce hardware MFA on all email accounts (eliminate SMS/voice as factors) - Hunt for dormant VPN accounts matching Pioneer Kitten tradecraft - Audit all contractor remote access &mdash; DIB supply chain is the primary vector - Brief personnel on Iranian cyber-enabled assassination targeting pipeline (T1589, T1591) - Review physical security posture at facilities identified in satellite imagery reporting </p> <h3> <strong> Aviation / Logistics </strong> </h3> <p> MuddyWater&rsquo;s confirmed targeting of US airports combined with APT33&rsquo;s historical focus on aviation. <strong> Priority actions: </strong> - Audit operational technology in airport systems (baggage handling, HVAC, access control) - Patch Johnson Controls CEM AC2000 (ICSA-26-125-05) if deployed in airport physical access control - Monitor for credential stuffing against airline reservation systems from Iranian proxy infrastructure - Review supply chain dependencies on cloud services hosted on Arvan Cloud (ASN 202468) </p> <h2> <strong> Prioritized Defense Recommendations </strong> </h2> <h3> <strong> IMMEDIATE (Within 24 Hours) </strong> </h3> <table> <thead> <tr> <th> <p> Priority </p> </th> <th> <p> Owner </p> </th> <th> <p> Action </p> </th> </tr> </thead> <tbody> <tr> <td> <p> 1 </p> </td> <td> <p> SOC </p> </td> <td> <p> Block C2 IPs at perimeter: 62.60.226[.]42, 188.121.123[.]185, 217.60.241[.]19. Verify zero historical connections in SIEM &mdash; any hit indicates active compromise. </p> </td> </tr> <tr> <td> <p> 2 </p> </td> <td> <p> IT Ops / OT </p> </td> <td> <p> Emergency patch Hitachi Energy PCM600 (ICSA-26-125-01) and Johnson Controls CEM AC2000 (ICSA-26-125-05) &mdash; both enable privilege escalation in physical infrastructure. </p> </td> </tr> <tr> <td> <p> 3 </p> </td> <td> <p> SOC </p> </td> <td> <p> Deploy detection rules for RemcosRAT beaconing on ports 43155 and 5903 to any Iranian ASN. </p> </td> </tr> <tr> <td> <p> 4 </p> </td> <td> <p> SOC </p> </td> <td> <p> Verify surge staffing plan is ready &mdash; if negotiations collapse, expect 24&ndash;48 hour activation window for coordinated Iranian cyber operations. </p> </td> </tr> </tbody> </table> <h3> <strong> 7-DAY </strong> </h3> <table> <thead> <tr> <th> <p> Priority </p> </th> <th> <p> Owner </p> </th> <th> <p> Action </p> </th> </tr> </thead> <tbody> <tr> <td> <p> 5 </p> </td> <td> <p> SOC </p> </td> <td> <p> Implement alerting for SOCKS4 connections to 206.123.156[.]0/24 (ports 10255, 17250, 10884) &mdash; operational relay infrastructure. </p> </td> </tr> <tr> <td> <p> 6 </p> </td> <td> <p> IT Ops / OT </p> </td> <td> <p> Patch ABB B&amp;R Automation Runtime, Studio, and PVI (ICSA-26-125-02/03/04). Prioritize engineering workstations with OT network access. </p> </td> </tr> <tr> <td> <p> 7 </p> </td> <td> <p> SOC </p> </td> <td> <p> Hunt for Mythic framework indicators across all network segments &mdash; MuddyWater&rsquo;s confirmed tool against US targets. </p> </td> </tr> <tr> <td> <p> 8 </p> </td> <td> <p> SOC </p> </td> <td> <p> Hunt for RemcosRAT persistence mechanisms (registry keys, scheduled tasks) &mdash; 3 confirmed Iranian C2 nodes using this RAT. </p> </td> </tr> <tr> <td> <p> 9 </p> </td> <td> <p> IR Team </p> </td> <td> <p> Update wiper response playbook with BANISHED KITTEN TTPs from March 2026 Stryker incident. Pre-position forensic images. </p> </td> </tr> </tbody> </table> <h3> <strong> 30-DAY </strong> </h3> <table> <thead> <tr> <th> <p> Priority </p> </th> <th> <p> Owner </p> </th> <th> <p> Action </p> </th> </tr> </thead> <tbody> <tr> <td> <p> 10 </p> </td> <td> <p> CISO </p> </td> <td> <p> Authorize proactive threat hunt for dormant DIB access (est. 40 analyst-hours). Focus: inactive VPN accounts, Rclone/Wasabi exfiltration, GitHub-sourced malware in dev environments. 55+ days without visibility is an unacceptable risk. </p> </td> </tr> <tr> <td> <p> 11 </p> </td> <td> <p> CISO </p> </td> <td> <p> Establish bilateral telemetry sharing with DIB contractor partners &mdash; organic collection alone cannot detect Pioneer Kitten dormant access. </p> </td> </tr> <tr> <td> <p> 12 </p> </td> <td> <p> CISO </p> </td> <td> <p> Commission red team exercise simulating Iranian &ldquo;coiled spring&rdquo; activation: simultaneous wiper + DDoS + espionage across multiple business units. </p> </td> </tr> <tr> <td> <p> 13 </p> </td> <td> <p> Intelligence </p> </td> <td> <p> Deploy Telegram OSINT monitoring for BANISHED KITTEN/Handala/Cyber Toufan channels to close hacktivist visibility gap. </p> </td> </tr> <tr> <td> <p> 14 </p> </td> <td> <p> Executive </p> </td> <td> <p> Brief board on Iran conflict cyber risk posture. Key message: negotiations may suppress overt attacks but pre-positioning continues; if talks fail, activation window is 24&ndash;48 hours. </p> </td> </tr> </tbody> </table> <h2> <strong> Bottom Line </strong> </h2> <p> The Iranian cyber apparatus is not dormant &mdash; it is <em> coiled </em> . Every signal we&rsquo;re collecting points to infrastructure maintenance, capability development, and target selection occurring behind the diplomatic curtain. The 5 new ICS advisories have started a 7&ndash;14 day countdown before Cyber Av3ngers historically begins exploitation. The 55-day blind spot on defense industrial base pre-positioning is the kind of gap that becomes a headline after a crisis. </p> <p> CISOs have a narrow window to act: patch the ICS vulnerabilities before they&rsquo;re weaponized, block the confirmed C2 infrastructure before it&rsquo;s used for lateral movement, and &mdash; critically &mdash; authorize the proactive hunt that closes the DIB visibility gap before dormant access activates. </p> <p> The quiet is not peace. It&rsquo;s preparation. Act accordingly. </p>

FEATURED RESOURCES

May 7, 2026
Anomali Cyber Watch

Iranian Cyber Forces in “Coiled Spring” Posture: What CISOs Must Do Before the Window Closes

Read More
May 7, 2026
Anomali Cyber Watch
Public Sector

State Government Cyber Threat Brief: China-Nexus Supply Chain Attacks and PAN-OS Zero-Day Exploitation Demand Immediate Action

Read More
May 6, 2026
Anomali Cyber Watch

The Calm Before the Storm: Iran’s Cyber Forces Are Pre-Positioning While Diplomats Talk

Read More
Explore All