<p> <strong> Threat Assessment Level: HIGH </strong>
</p>
<p> The ceasefire between the United States and Iran explicitly excludes cyber operations. Eighty days into this conflict, Iran is exploiting that gap with increasing precision — and as of May 18, 2026, confirmed breaches of U.S. civilian fuel monitoring systems prove the threat has moved from theoretical to operational. Russia continues to provide infrastructure support from Tehran-based networks, state-sponsored actors are refreshing command-and-control nodes weekly, and the boundary between Iranian "hacktivists" and intelligence services has effectively dissolved.
</p>
<p> This is not a future scenario. It is the current operating environment.
</p>
<h2> <strong> What Changed </strong>
</h2>
<p> The past five days brought several developments that shift the risk calculus:
</p>
<ul> <li> <strong> <strong> Fuel infrastructure breached (May 18): </strong> Iranian hackers compromised Veeder-Root Automatic Tank Gauge (ATG) systems at U.S. gas stations — expanding offensive operations from military targets to civilian energy infrastructure for the first time in this conflict. </strong> </li>
</ul>
<ul> <li> <strong> Russian GRU refreshes Iranian-hosted infrastructure (May 14–17): </strong> APT28 (Fancy Bear / GRU Unit 26165) activated five new IP addresses on ASN 213790, a Tehran-based hosting provider. This marks 60+ continuous days of confirmed Russia-Iran cyber infrastructure cooperation. </li>
</ul>
<ul> <li> <strong> Defense-sector espionage campaign active (May 18): </strong> UNC5858 (Black Shadow), an MOIS-linked actor impersonating Israeli defense firm Rafael Advanced Defense Systems, refreshed its IOC infrastructure — confirming ongoing spear-phishing operations against defense-sector targets. </li>
</ul>
<ul> <li> <strong> Defense Industrial Base blind spot persists: </strong> No indicators of Iranian pre-positioning in DIB contractor networks have been detected in 30+ days — during active kinetic conflict. This silence is the most dangerous signal in the current intelligence picture. </li>
</ul>
<ul> <li> <strong> Hacktivist-state convergence confirmed (ongoing): </strong> UNC5855 (AnonymousForJustice) continues claiming breaches of Israeli government ministries while deploying ICYALARM Android malware via smishing. Infrastructure management cadence matches confirmed state APTs — the operational distinction between Iranian "hacktivists" and state intelligence services no longer exists. </li>
</ul>
<ul> <li> <strong> CISA publishes six ICS advisories (May 14): </strong> Advisories covering Siemens SIMATIC CN 4100, Ruggedcom ROX, and Universal Robots Polyscope 5 directly map to the ICS/OT attack surface Iranian actors are actively targeting. Patch windows are now measured in days, not weeks. </li>
</ul>
<ul> <li> <strong> MuddyWater OAuth phishing — 4+ weeks of silence (ongoing concern): </strong> MuddyWater (MOIS) was confirmed conducting OAuth device-code phishing against M365/Azure AD in mid-April. Four-plus weeks of silence during active conflict is assessed as retooling, not cessation — a resurgence is probable within the next two weeks. </li>
</ul>
<h2> <strong> Conflict & Threat Timeline </strong>
</h2>
<table> <thead> <tr> <th> <p> Date </p> </th> <th> <p> Event </p> </th> <th> <p> Significance </p> </th> </tr> </thead> <tbody> <tr> <td> <p> 28 Feb 2026 </p> </td> <td> <p> U.S.-Iran major combat operations begin </p> </td> <td> <p> Kinetic conflict triggers asymmetric cyber doctrine </p> </td> </tr> <tr> <td> <p> 11 Mar 2026 </p> </td> <td> <p> Handala/Void Manticore destroys 200,000+ Stryker Corp endpoints via weaponized Microsoft Intune </p> </td> <td> <p> Largest single destructive cyber operation of the conflict </p> </td> </tr> <tr> <td> <p> 7 Apr 2026 </p> </td> <td> <p> Reuters confirms Russia supplying Iran with cyber support and satellite imagery </p> </td> <td> <p> Moscow-Tehran axis formalized </p> </td> </tr> <tr> <td> <p> 13 Apr 2026 </p> </td> <td> <p> Fast Company: "The Iran cyberattack everyone warned about hasn't really happened yet" </p> </td> <td> <p> Tempo paradox — Iran was pre-positioning, not abstaining </p> </td> </tr> <tr> <td> <p> Mid-Apr 2026 </p> </td> <td> <p> MuddyWater confirmed conducting OAuth device-code phishing against M365/Azure AD </p> </td> <td> <p> Cloud identity vector active </p> </td> </tr> <tr> <td> <p> 15–16 May 2026 </p> </td> <td> <p> CVE-2026-1340 (CVSS 9.8) added to CISA KEV — Iranian exploitation of Veeder-Root ATG confirmed </p> </td> <td> <p> ICS targeting validated by government </p> </td> </tr> <tr> <td> <p> 14 May 2026 </p> </td> <td> <p> CISA publishes six ICS advisories covering Siemens, Ruggedcom, and Universal Robots </p> </td> <td> <p> OT attack surface formally documented </p> </td> </tr> <tr> <td> <p> 14–17 May 2026 </p> </td> <td> <p> APT28 refreshes 5 IPs on Iranian ASN 213790 </p> </td> <td> <p> Russia-Iran infrastructure sharing deepens </p> </td> </tr> <tr> <td> <p> 18 May 2026 </p> </td> <td> <p> Dark Reading confirms Iranian breach of U.S. fuel ATG systems </p> </td> <td> <p> Civilian energy infrastructure now in scope </p> </td> </tr> <tr> <td> <p> 18 May 2026 </p> </td> <td> <p> UNC5858 (Black Shadow) IOCs refreshed — Rafael impersonation campaign active </p> </td> <td> <p> Defense-sector espionage ongoing </p> </td> </tr> </tbody>
</table>
<h2> <strong> Key Threat Analysis </strong>
</h2>
<h3> <strong> 1. Iranian Fuel Infrastructure Targeting — CyberAv3ngers / Ababil of Minab </strong>
</h3>
<p> Iran's IRGC-affiliated cyber units have breached Veeder-Root ATG fuel-level monitoring systems at U.S. gas stations. These are the same systems targeted in 2023 (referenced in CISA AA23-335A), but the current campaign operates under wartime conditions with demonstrated willingness to cause physical disruption.
</p>
<p> <strong> Techniques employed: </strong>
</p>
<ul> <li> Exploitation of internet-exposed ATG serial-over-IP interfaces ( <strong> T1190 </strong> ) </li> <li> Fuel level data manipulation ( <strong> T1565.001 </strong> ) </li> <li> Potential for denial-of-service to fuel distribution networks ( <strong> T1498 </strong> ) </li>
</ul>
<p> <strong> CVE-2026-1340 </strong> (CVSS 9.8) — confirmed actively exploited by Iranian actors against Veeder-Root ATG systems, added to CISA Known Exploited Vulnerabilities catalog.
</p>
<p> <strong> Why this matters: </strong> Fuel monitoring disruption at scale can trigger supply chain panic, complicate military logistics, and demonstrate capability against civilian infrastructure — all core Iranian asymmetric doctrine objectives.
</p>
<h3> <strong> 2. Russia-Iran Infrastructure Axis — APT28 on ASN 213790 </strong>
</h3>
<p> GRU Unit 26165 (APT28/Fancy Bear) continues operating scanning and C2 infrastructure from ASN 213790 ("Limited Network," Tehran). Five new IPs were activated May 14–17, bringing total tracked infrastructure on this ASN to 8+ addresses. The same ASN also hosts Cactus ransomware infrastructure — an anomaly suggesting either shared hosting or deliberate criminal-state convergence.
</p>
<p> <strong> Actors confirmed on ASN 213790: </strong>
</p>
<ul> <li> APT28 (Russian GRU) </li> <li> Cactus ransomware group </li> <li> Adjacent ASN 44208 hosts Transparent Tribe (Pakistani APT) with ObliqueRAT </li>
</ul>
<p> This multi-national convergence on Iranian hosting is not coincidental. It provides mutual deniability, complicates Western attribution, and demonstrates the operational depth of the Moscow-Tehran cyber partnership.
</p>
<h3> <strong> 3. Defense-Sector Espionage — UNC5858 (Black Shadow) </strong>
</h3>
<p> This MOIS-linked actor impersonates Rafael Advanced Defense Systems in spear-phishing campaigns targeting defense-sector personnel. The campaign uses:
</p>
<ul> <li> Spear-phishing with malicious URLs ( <strong> T1566.002 </strong> ) </li> <li> Masquerading as legitimate defense company communications ( <strong> T1036.005 </strong> ) </li> <li> Data collection and exfiltration over C2 ( <strong> T1005 </strong> , <strong> T1041 </strong> ) </li>
</ul>
<p> Active since September 2024, with IOC infrastructure refreshed as recently as May 18, 2026. Targets include Israeli and allied defense organizations.
</p>
<h3> <strong> 4. Hacktivist-State Convergence — UNC5855 (AnonymousForJustice) </strong>
</h3>
<p> UNC5855 claims breaches of Israeli Ministry of Defense, Ministry of Justice, and nuclear organizations while deploying ICYALARM Android malware via smishing campaigns. Despite the "hacktivist" label, this actor operates with state-level IOC management cadence — infrastructure refreshed on the same timeline as confirmed state APTs.
</p>
<p> <strong> The operational distinction between Iranian "hacktivists" and state intelligence services no longer exists. </strong> They share infrastructure, tasking, and operational tempo.
</p>
<h3> <strong> 5. Named Threat Actors — Active Attribution Summary </strong>
</h3>
<table> <thead> <tr> <th> <p> Actor </p> </th> <th> <p> Affiliation </p> </th> <th> <p> Current Activity </p> </th> <th> <p> Primary Target </p> </th> </tr> </thead> <tbody> <tr> <td> <p> APT28 / Fancy Bear </p> </td> <td> <p> GRU Unit 26165 (Russia) </p> </td> <td> <p> Infrastructure refresh on Iranian ASN </p> </td> <td> <p> Commercial scanning </p> </td> </tr> <tr> <td> <p> CyberAv3ngers / Shahid Kaveh Group </p> </td> <td> <p> IRGC-CEC </p> </td> <td> <p> Fuel ATG exploitation </p> </td> <td> <p> U.S. energy infrastructure </p> </td> </tr> <tr> <td> <p> Ababil of Minab </p> </td> <td> <p> IRGC-affiliated </p> </td> <td> <p> U.S. transit/fuel OT targeting </p> </td> <td> <p> Civilian infrastructure </p> </td> </tr> <tr> <td> <p> UNC5858 / Black Shadow </p> </td> <td> <p> MOIS-linked </p> </td> <td> <p> Rafael impersonation espionage </p> </td> <td> <p> Defense industrial base </p> </td> </tr> <tr> <td> <p> UNC5855 / AnonymousForJustice </p> </td> <td> <p> Iranian state-hacktivist </p> </td> <td> <p> Israeli government data theft, Android malware </p> </td> <td> <p> Israeli government/military </p> </td> </tr> <tr> <td> <p> Handala / Void Manticore / BANISHED KITTEN </p> </td> <td> <p> IRGC-affiliated </p> </td> <td> <p> Quiet since March 11 (assessed preparing follow-on) </p> </td> <td> <p> Healthcare/enterprise IT </p> </td> </tr> <tr> <td> <p> MuddyWater / TEMP.Zagros </p> </td> <td> <p> MOIS </p> </td> <td> <p> Quiet 4+ weeks (assessed retooling) </p> </td> <td> <p> Cloud/identity (M365, OAuth) </p> </td> </tr> <tr> <td> <p> APT42 </p> </td> <td> <p> IRGC-IO </p> </td> <td> <p> Active </p> </td> <td> <p> Credential harvesting, surveillance </p> </td> </tr> </tbody>
</table>
<h3> <strong> 6. ICS/OT Vulnerability Exposure </strong>
</h3>
<p> CISA published six ICS advisories on May 14, 2026, directly relevant to organizations in this threat environment:
</p>
<ul> <li> <strong> Siemens SIMATIC CN 4100 </strong> — Multiple vulnerabilities affecting availability, integrity, and confidentiality </li> <li> <strong> Ruggedcom ROX </strong> (pre-v2.17.1) — Input validation flaws in Scheduler and feature key installation </li> <li> <strong> Universal Robots Polyscope 5 </strong> — Authentication bypass with code execution </li>
</ul>
<p> Additionally, <strong> CVE-2026-0966 </strong> (libssh, CVSS 8.2) — denial-of-service vulnerability affecting SSH implementations across Linux infrastructure.
</p>
<h2> <strong> Predictive Analysis </strong>
</h2>
<table> <thead> <tr> <th> <p> Scenario </p> </th> <th> <p> Probability </p> </th> <th> <p> Timeframe </p> </th> <th> <p> Basis </p> </th> </tr> </thead> <tbody> <tr> <td> <p> MuddyWater resurfaces with retooled OAuth phishing </p> </td> <td> <p> <strong> 60% </strong> </p> </td> <td> <p> 7–14 days </p> </td> <td> <p> 4+ weeks of silence during active conflict indicates retooling, not cessation </p> </td> </tr> <tr> <td> <p> CyberAv3ngers publicly claims fuel ATG breaches </p> </td> <td> <p> <strong> 70% </strong> </p> </td> <td> <p> 48 hours </p> </td> <td> <p> Historical pattern: state operation → delayed hacktivist claim for IO amplification </p> </td> </tr> <tr> <td> <p> Additional ICS/OT targeting (water or power) </p> </td> <td> <p> <strong> 50% </strong> </p> </td> <td> <p> 7 days </p> </td> <td> <p> Confirmed fuel-sector success + available Siemens/Ruggedcom vulnerabilities </p> </td> </tr> <tr> <td> <p> Dormant DIB contractor access activated </p> </td> <td> <p> <strong> 40% </strong> </p> </td> <td> <p> 7–14 days </p> </td> <td> <p> 30-day quiet period during active conflict matches pre-activation pattern (CISA AA22-320A precedent) </p> </td> </tr> <tr> <td> <p> Handala/Void Manticore follow-on destructive attack </p> </td> <td> <p> <strong> 35% </strong> </p> </td> <td> <p> 14–30 days </p> </td> <td> <p> 69 days since 200K endpoint destruction; no claims since = preparation phase </p> </td> </tr> <tr> <td> <p> Ransomware-as-cover destructive operation (Cactus or similar) </p> </td> <td> <p> <strong> 30% </strong> </p> </td> <td> <p> 30 days </p> </td> <td> <p> Criminal infrastructure co-located on state ASN; precedent: DEV-0842 using ransomware to mask wipers </p> </td> </tr> </tbody>
</table>
<h2> <strong> SOC Operational Guidance </strong>
</h2>
<h3> <strong> Immediate Detection Priorities </strong>
</h3>
<p> <strong> Hunt Hypothesis 1: APT28 Scanning from Iranian ASN </strong>
</p>
<ul> <li> <strong> ATT&CK: </strong> <strong> T1595.002 </strong> (Vulnerability Scanning), <strong> T1071 </strong> (Application Layer Protocol), <strong> T1571 </strong> (Non-Standard Port) </li> <li> <strong> Detection: </strong> Alert on any inbound or outbound connections to ASN 213790 (Limited Network, Tehran). Cross-reference with the IOCs below. Hunt in firewall, proxy, and DNS logs for the past 30 days. </li> <li> <strong> Query logic: </strong> dst_asn:213790 OR src_ip IN [192.253.248[.]52, 192.253.248[.]55, 172.94.9[.]170, 172.94.9[.]171, 185.93.89[.]147] </li>
</ul>
<p> <strong> Hunt Hypothesis 2: Veeder-Root ATG Exposure </strong>
</p>
<ul> <li> <strong> ATT&CK: </strong> <strong> T1190 </strong> (Exploit Public-Facing Application), <strong> T1565.001 </strong> (Stored Data Manipulation) </li> <li> <strong> Detection: </strong> Identify any Veeder-Root ATG systems with internet-facing serial-over-IP interfaces. Monitor for anomalous fuel-level readings or unauthorized configuration changes. Scan for port 10001 (default ATG port) exposure. </li> <li> <strong> Query logic: </strong> Network scan for TCP/10001 on OT segments; alert on any external IP communicating with ATG controllers. </li>
</ul>
<p> <strong> Hunt Hypothesis 3: Rafael Impersonation Phishing (UNC5858) </strong>
</p>
<ul> <li> <strong> ATT&CK: </strong> <strong> T1566.002 </strong> (Spearphishing Link), <strong> T1036.005 </strong> (Masquerading) </li> <li> <strong> Detection: </strong> Email gateway rules for subjects/sender domains referencing "Rafael," "Rafael Advanced Defense," or variations. Monitor for malicious URLs in emails purporting to be from defense contractors. </li> <li> <strong> Query logic: </strong> email_subject:*rafael* OR email_from:*rafael* NOT sender_domain:rafael.co.il </li>
</ul>
<p> <strong> Hunt Hypothesis 4: OAuth Device-Code Phishing (MuddyWater) </strong>
</p>
<ul> <li> <strong> ATT&CK: </strong> <strong> T1528 </strong> (Steal Application Access Token), <strong> T1550.001 </strong> (Use Alternate Authentication Material) </li> <li> <strong> Detection: </strong> Monitor Azure AD/Entra ID sign-in logs for device code authentication flows from unexpected geographies. Alert on bulk device code requests or codes redeemed from IP ranges outside corporate geography. </li> <li> <strong> Query logic: </strong> SignInLogs | where AuthenticationProtocol == "deviceCode" | where Location !in (approved_countries) </li>
</ul>
<p> <strong> Hunt Hypothesis 5: DIB Pre-Positioning (Pioneer Kitten / UNC757) </strong>
</p>
<ul> <li> <strong> ATT&CK: </strong> <strong> T1133 </strong> (External Remote Services), <strong> T1567.002 </strong> (Exfiltration to Cloud Storage) </li> <li> <strong> Detection: </strong> Hunt for Rclone or Wasabi S3 bucket connections from VPN concentrators. Check for dormant web shells on internet-facing appliances. Audit Ivanti EPMM and Cisco ASA/FTD for unauthorized configuration changes. </li> <li> <strong> Query logic: </strong> process_name:rclone* OR dns_query:*wasabi* OR dns_query:*s3.wasabisys.com* </li>
</ul>
<h3> <strong> IOC Blocking Table </strong>
</h3>
<table> <thead> <tr> <th> <p> Type </p> </th> <th> <p> Value </p> </th> <th> <p> Attribution </p> </th> <th> <p> Action </p> </th> </tr> </thead> <tbody> <tr> <td> <p> IPv4 </p> </td> <td> <p> 192.253.248[.]52 </p> </td> <td> <p> APT28 / ASN 213790 </p> </td> <td> <p> Block at perimeter </p> </td> </tr> <tr> <td> <p> IPv4 </p> </td> <td> <p> 192.253.248[.]55 </p> </td> <td> <p> APT28 / ASN 213790 </p> </td> <td> <p> Block at perimeter </p> </td> </tr> <tr> <td> <p> IPv4 </p> </td> <td> <p> 172.94.9[.]170 </p> </td> <td> <p> APT28 / ASN 213790 </p> </td> <td> <p> Block at perimeter </p> </td> </tr> <tr> <td> <p> IPv4 </p> </td> <td> <p> 172.94.9[.]171 </p> </td> <td> <p> APT28 / ASN 213790 </p> </td> <td> <p> Block at perimeter </p> </td> </tr> <tr> <td> <p> IPv4 </p> </td> <td> <p> 185.93.89[.]147 </p> </td> <td> <p> APT28 / ASN 213790 </p> </td> <td> <p> Block at perimeter </p> </td> </tr> <tr> <td> <p> IPv4 </p> </td> <td> <p> 185.93.89[.]43 </p> </td> <td> <p> Cactus ransomware / ASN 213790 </p> </td> <td> <p> Block at perimeter </p> </td> </tr> <tr> <td> <p> IPv4 </p> </td> <td> <p> 176.46.152[.]46 </p> </td> <td> <p> Transparent Tribe / ObliqueRAT / ASN 44208 </p> </td> <td> <p> Block at perimeter </p> </td> </tr> <tr> <td> <p> IPv4 </p> </td> <td> <p> 46.30.189[.]66 </p> </td> <td> <p> Iran-nexus infrastructure </p> </td> <td> <p> Monitor/block </p> </td> </tr> <tr> <td> <p> IPv4 </p> </td> <td> <p> 148.251.232[.]252 </p> </td> <td> <p> Iran-nexus infrastructure </p> </td> <td> <p> Monitor/block </p> </td> </tr> <tr> <td> <p> IPv4 </p> </td> <td> <p> 206.214.220[.]79 </p> </td> <td> <p> Iran-nexus infrastructure </p> </td> <td> <p> Monitor/block </p> </td> </tr> <tr> <td> <p> IPv4 </p> </td> <td> <p> 64.20.51[.]22 </p> </td> <td> <p> Iran-nexus infrastructure </p> </td> <td> <p> Monitor/block </p> </td> </tr> </tbody>
</table>
<p> <em> Additional IOCs (file hashes, domains) available via Anomali ThreatStream. </em>
</p>
<h2> <strong> Sector-Specific Defensive Priorities </strong>
</h2>
<h3> <strong> Financial Services </strong>
</h3>
<p> <strong> Primary threat: </strong> Ransomware-as-cover destructive operations. Cactus ransomware infrastructure co-located on Iranian state ASN suggests potential for financially-motivated attacks that mask state-directed destruction.
</p>
<p> <strong> Actions: </strong>
</p>
<ul> <li> Validate offline backup integrity for core banking systems — assume ransomware deployment may be a wiper in disguise </li> <li> Review SWIFT/payment system segmentation from general corporate networks </li> <li> Monitor for anomalous bulk encryption events that could indicate wiper activity masquerading as ransomware </li> <li> Ensure incident response playbooks differentiate between ransomware-for-profit and ransomware-as-cover scenarios </li>
</ul>
<h3> <strong> Energy </strong>
</h3>
<p> <strong> Primary threat: </strong> ICS/OT targeting of fuel monitoring, power generation, and pipeline SCADA systems. This is the sector under active confirmed attack.
</p>
<p> <strong> Actions: </strong>
</p>
<ul> <li> <strong> Immediately </strong> audit all Veeder-Root ATG systems for internet exposure (CVE-2026-1340, CVSS 9.8) </li> <li> Patch Siemens SIMATIC CN 4100 and upgrade Ruggedcom ROX to v2.17.1+ </li> <li> Implement network segmentation between IT and OT with unidirectional gateways where possible </li> <li> Deploy passive OT network monitoring (e.g., Claroty, Dragos, Nozomi) to detect anomalous serial-over-IP traffic </li> <li> Brief plant operators on manual override procedures in case of fuel-level data manipulation </li>
</ul>
<h3> <strong> Healthcare </strong>
</h3>
<p> <strong> Primary threat: </strong> Destructive attacks via enterprise management tools. Handala/Void Manticore's March 11 destruction of 200,000+ Stryker Corporation endpoints via weaponized Microsoft Intune demonstrates this vector is proven and repeatable.
</p>
<p> <strong> Actions: </strong>
</p>
<ul> <li> Audit Microsoft Intune/SCCM/MDM administrative access — enforce MFA and conditional access on all management plane accounts </li> <li> Implement canary policies in MDM that alert on mass device configuration changes </li> <li> Segment medical device networks from enterprise IT management infrastructure </li> <li> Ensure clinical systems can operate in degraded mode if enterprise IT is destroyed </li> <li> Review and restrict who can push scripts or configurations to endpoints via management tools </li>
</ul>
<h3> <strong> Government </strong>
</h3>
<p> <strong> Primary threat: </strong> Espionage and pre-positioning for destructive operations. UNC5855 claims Israeli government ministry breaches; MuddyWater targets government M365 tenants via OAuth phishing; PIR-007 (dormant access in government/DIB networks) is the highest-consequence blind spot.
</p>
<p> <strong> Actions: </strong>
</p>
<ul> <li> Enforce phishing-resistant MFA (FIDO2/hardware keys) for all privileged accounts — OAuth device-code phishing bypasses SMS/app-based MFA </li> <li> Audit Azure AD/Entra ID for dormant service principals and OAuth app registrations with excessive permissions </li> <li> Hunt for indicators of Pioneer Kitten (UNC757) in VPN infrastructure — focus on Ivanti, Cisco ASA/FTD </li> <li> Review data loss prevention policies for bulk data staging ( <strong> T1074 </strong> ) and exfiltration to cloud storage ( <strong> T1567.002 </strong> ) </li> <li> Brief cleared personnel on Rafael impersonation phishing campaigns (UNC5858) </li>
</ul>
<h3> <strong> Aviation / Logistics </strong>
</h3>
<p> <strong> Primary threat: </strong> Supply chain disruption and VSAT communications compromise. NORMA Cyber VSAT attack demonstrates satellite communications targeting. Aviation logistics are critical to military sustainment during active conflict.
</p>
<p> <strong> Actions: </strong>
</p>
<ul> <li> Audit VSAT terminal firmware versions and patch status — ensure management interfaces are not internet-exposed </li> <li> Review supply chain management system access controls — Iranian actors target logistics data for battle damage assessment </li> <li> Monitor for anomalous GPS/ADS-B data that could indicate spoofing or surveillance </li> <li> Ensure cargo manifest and flight planning systems are segmented from public-facing booking platforms </li> <li> Brief operations staff on social engineering attempts referencing military logistics contracts </li>
</ul>
<h2> <strong> Prioritized Defense Recommendations </strong>
</h2>
<h3> <strong> IMMEDIATE (Within 24 Hours) </strong>
</h3>
<table> <thead> <tr> <th> <p> Priority </p> </th> <th> <p> Team </p> </th> <th> <p> Action </p> </th> </tr> </thead> <tbody> <tr> <td> <p> <strong> IMMEDIATE </strong> </p> </td> <td> <p> SOC </p> </td> <td> <p> Block all 11 IPv4 IOCs listed above at perimeter firewalls and proxy </p> </td> </tr> <tr> <td> <p> <strong> IMMEDIATE </strong> </p> </td> <td> <p> SOC </p> </td> <td> <p> Hunt for any historical connections to ASN 213790 (Limited Network, Tehran) in the past 30 days of firewall/proxy logs </p> </td> </tr> <tr> <td> <p> <strong> IMMEDIATE </strong> </p> </td> <td> <p> ICS/OT </p> </td> <td> <p> Verify all Veeder-Root ATG systems are isolated from internet; disable serial-over-IP if not operationally required (CVE-2026-1340) </p> </td> </tr> <tr> <td> <p> <strong> IMMEDIATE </strong> </p> </td> <td> <p> SOC </p> </td> <td> <p> Deploy email detection rules for Rafael Advanced Defense Systems impersonation in subjects, sender names, and attachment filenames </p> </td> </tr> <tr> <td> <p> <strong> IMMEDIATE </strong> </p> </td> <td> <p> Identity </p> </td> <td> <p> Audit Azure AD sign-in logs for device-code authentication flows from non-corporate geographies (MuddyWater OAuth phishing) </p> </td> </tr> </tbody>
</table>
<h3> <strong> 7-DAY </strong>
</h3>
<table> <thead> <tr> <th> <p> Priority </p> </th> <th> <p> Team </p> </th> <th> <p> Action </p> </th> </tr> </thead> <tbody> <tr> <td> <p> <strong> 7-DAY </strong> </p> </td> <td> <p> IT Ops </p> </td> <td> <p> Patch Siemens SIMATIC CN 4100 per ICSA-26-134-10; upgrade Ruggedcom ROX to v2.17.1+ per ICSA-26-134-16 </p> </td> </tr> <tr> <td> <p> <strong> 7-DAY </strong> </p> </td> <td> <p> IT Ops </p> </td> <td> <p> Patch CVE-2026-0966 (libssh, CVSS 8.2) across all Linux SSH infrastructure per RHSA-2026:18160 </p> </td> </tr> <tr> <td> <p> <strong> 7-DAY </strong> </p> </td> <td> <p> Threat Hunt </p> </td> <td> <p> Conduct proactive hunt for Pioneer Kitten (UNC757) in DIB contractor VPN logs — Rclone, Wasabi S3 exfil, dormant web shells on Ivanti/Cisco appliances </p> </td> </tr> <tr> <td> <p> <strong> 7-DAY </strong> </p> </td> <td> <p> SOC </p> </td> <td> <p> Implement detection for bulk MDM/Intune policy pushes outside change windows (Handala/Void Manticore TTP) </p> </td> </tr> <tr> <td> <p> <strong> 7-DAY </strong> </p> </td> <td> <p> Identity </p> </td> <td> <p> Revoke and re-audit all OAuth app registrations in Azure AD with Mail.Read, Files.ReadWrite.All, or Directory.ReadWrite.All permissions </p> </td> </tr> </tbody>
</table>
<h3> <strong> 30-DAY </strong>
</h3>
<table> <thead> <tr> <th> <p> Priority </p> </th> <th> <p> Team </p> </th> <th> <p> Action </p> </th> </tr> </thead> <tbody> <tr> <td> <p> <strong> 30-DAY </strong> </p> </td> <td> <p> CISO </p> </td> <td> <p> Commission external red team assessment simulating Iranian APT initial access vectors: OAuth device-code phishing, VPN exploitation, ATG serial-over-IP </p> </td> </tr> <tr> <td> <p> <strong> 30-DAY </strong> </p> </td> <td> <p> CISO </p> </td> <td> <p> Establish or validate out-of-band communication plan for executive team in case of destructive attack on M365/enterprise IT (Handala precedent) </p> </td> </tr> <tr> <td> <p> <strong> 30-DAY </strong> </p> </td> <td> <p> IR </p> </td> <td> <p> Tabletop exercise: "Ransomware-as-cover wiper" scenario — practice differentiating Cactus-style ransomware from state-directed destructive operation </p> </td> </tr> <tr> <td> <p> <strong> 30-DAY </strong> </p> </td> <td> <p> IT Ops </p> </td> <td> <p> Implement network-level blocking of entire ASN 213790 and ASN 44208 if no legitimate business traffic exists to these ranges </p> </td> </tr> <tr> <td> <p> <strong> 30-DAY </strong> </p> </td> <td> <p> CISO </p> </td> <td> <p> Assess organizational exposure to Pakistan-Iran cyber cooperation expansion (Transparent Tribe on Iranian infrastructure) and brief allied intelligence-sharing partners </p> </td> </tr> </tbody>
</table>
<h2> <strong> The Bottom Line </strong>
</h2>
<p> Eighty days into the U.S.-Iran conflict, the cyber dimension is no longer a sideshow — it is an active front. Iran has confirmed its willingness and capability to strike U.S. civilian energy infrastructure. Russia is providing the hosting. The hacktivists are the state. And the longest silence in the intelligence picture — 30+ days without visibility into defense industrial base pre-positioning — is not reassurance. It is the gap that should keep you awake.
</p>
<p> The ceasefire does not cover cyber. Act accordingly.
</p>
<p> Three questions every CISO should answer today:
</p>
<ul> <li> <strong> <strong> Can Iranian actors reach your fuel monitoring, water treatment, or power systems from the internet right now? </strong> If you don't know, assume yes. </strong> </li>
</ul>
<ul> <li> <strong> Would you detect a dormant web shell on your VPN concentrator that was placed 6 months ago and activated tomorrow? </strong> If your threat hunt program hasn't looked, the answer is no. </li>
</ul>
<ul> <li> <strong> If your MDM platform was weaponized tonight to wipe every managed endpoint, could your organization continue operating? </strong> Handala proved this is not hypothetical. </li>
</ul>
<p> The time between pre-positioning and destruction is measured in hours. The time to prepare is now.
</p>
<p> <em> Published 2026-05-19 | Anomali CTI Desk | TLP:GREEN </em>
</p>
<p> <em> IOCs for the campaigns discussed in this report are available through Anomali ThreatStream and partner feeds. </em>
</p>