All Posts
Anomali Cyber Watch
1
min read

Iran’s Cyber War Enters Its Most Dangerous Phase: Active ICS Exploitation, Geographic Expansion, and Two Critical Zero-Days

Published on
April 13, 2026
Table of Contents
<p><strong>Threat Assessment Level: CRITICAL</strong></p> <p><em>The threat assessment level remains CRITICAL, unchanged from the prior cycle (April 12, 2026). While the prior executive flash labeled the posture &ldquo;HIGH &mdash; ESCALATING,&rdquo; the convergence of confirmed active ICS exploitation, two simultaneously exploited CVSS 9.8 zero-days, and geographic expansion of destructive operations meets the threshold for CRITICAL. The diplomatic vacuum following the collapse of US-Iran ceasefire talks on April 12 has removed the last restraint on Iranian cyber tempo.</em></p> <h2><strong>Introduction&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2> <p>Forty-four days into the US-Iran military confrontation, the cyber dimension of this conflict has reached an inflection point that demands immediate executive attention. On April 7, CISA, the FBI, and the NSA issued Joint Advisory AA26-097a &mdash; not a warning about potential attacks, but a confirmation that Iranian-affiliated actors are <strong>already inside</strong> US critical infrastructure, actively exploiting programmable logic controllers across the water, energy, and manufacturing sectors. In the same week, the IRGC-linked destructive group Handala claimed breaches of three major UAE organizations, marking a rapid geographic expansion of wiper operations from Israel to the United States to the Gulf. And two CVSS 9.8 zero-day vulnerabilities &mdash; in Fortinet FortiClientEMS and Ivanti EPMM &mdash; are being actively exploited in the wild, both in product classes historically favored by Iranian actors for initial access.</p> <p>This is not a forecast. This is a damage report.</p> <h2><strong>What Changed&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <p>The period from April 7&ndash;13, 2026 saw six developments that materially alter the threat landscape for every organization operating critical infrastructure, defense supply chains, or Gulf-connected networks:</p> <ol> <li><strong>CISA/FBI/NSA Joint Advisory AA26-097a</strong> confirmed active Iranian exploitation of Rockwell Automation/Allen-Bradley PLCs across US water, energy, and manufacturing &mdash; with 5,219 PLCs quantified as internet-exposed.</li> <li><strong>Handala (BANISHED KITTEN)</strong> claimed breaches of three major UAE organizations spanning defense, energy, government, and healthcare &mdash; the first confirmed Gulf-state targeting by this IRGC-linked destructive group.</li> <li><strong>CVE-2026-35616</strong> (Fortinet FortiClientEMS, CVSS 9.8) &mdash; a zero-day allowing unauthenticated remote code execution &mdash; was added to CISA&rsquo;s Known Exploited Vulnerabilities catalog with confirmed in-the-wild exploitation.</li> <li><strong>CVE-2026-1340</strong> (Ivanti EPMM, CVSS 9.8) &mdash; a pre-authentication RCE vulnerability &mdash; was also confirmed on the KEV with active exploitation.</li> <li><strong>Three new ICS advisories</strong> (Contemporary Controls BASC, GPL Odorizers, Mitsubishi GENESIS64/ICONICS) expanded the attack surface for industrial environments already under active Iranian targeting.</li> <li><strong>A Mirai2 botnet variant</strong> distributing Iran-themed binaries targeting IoT and embedded architectures (ARM, MIPS, SH4) was detected, with device-type overlap into PLC and ICS environments already under active threat.</li> </ol> <p>These developments occurred against the backdrop of the <strong>April 12 collapse of US-Iran ceasefire talks</strong>, which removed the primary diplomatic constraint on Iranian cyber operations.</p> <h2><strong>Conflict &amp; Threat Timeline&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <table> <thead> <tr> <th> <p>Date</p> </th> <th> <p>Event</p> </th> <th> <p>Significance</p> </th> </tr> </thead> <tbody> <tr> <td> <p>Feb 28, 2026</p> </td> <td> <p>US-Iran military confrontation begins</p> </td> <td> <p>Day 0 &mdash; kinetic and cyber operations commence</p> </td> </tr> <tr> <td> <p>Mar 2026</p> </td> <td> <p>Handala (BANISHED KITTEN) wiper attack on Stryker (US)</p> </td> <td> <p>First non-Israel destructive operation by Handala</p> </td> </tr> <tr> <td> <p>Apr 4, 2026</p> </td> <td> <p>CVE-2026-35616 (FortiClientEMS) published</p> </td> <td> <p>CVSS 9.8 zero-day; exploitation confirmed in the wild</p> </td> </tr> <tr> <td> <p>~Apr 6, 2026</p> </td> <td> <p>CVE-2026-35616 and CVE-2026-1340 added to CISA KEV</p> </td> <td> <p>Two critical zero-days simultaneously on KEV</p> </td> </tr> <tr> <td> <p>Apr 7, 2026</p> </td> <td> <p>CISA/FBI/NSA Joint Advisory AA26-097a published</p> </td> <td> <p>Confirms active Iranian exploitation of Rockwell PLCs in US critical infrastructure</p> </td> </tr> <tr> <td> <p>Apr 7&ndash;9, 2026</p> </td> <td> <p>Three ICS advisories: BASC, GPL Odorizers, GENESIS64</p> </td> <td> <p>Expanded ICS attack surface during active targeting</p> </td> </tr> <tr> <td> <p>Apr 10&ndash;11, 2026</p> </td> <td> <p>MuddyWater campaign updates across 17 countries</p> </td> <td> <p>BugSleep, PowerStats, StarWhale, DHCSpy malware active</p> </td> </tr> <tr> <td> <p>Apr 12, 2026</p> </td> <td> <p>US-Iran ceasefire talks collapse</p> </td> <td> <p>Diplomatic constraint on cyber operations removed</p> </td> </tr> <tr> <td> <p>Apr 12&ndash;13, 2026</p> </td> <td> <p>Handala claims breach of 3 UAE organizations</p> </td> <td> <p>Geographic expansion: Israel &rarr; US &rarr; Gulf states</p> </td> </tr> <tr> <td> <p>Apr 13, 2026</p> </td> <td> <p>Mirai2 botnet with Iran-themed binaries detected</p> </td> <td> <p>IoT/embedded architecture targeting overlaps ICS device types</p> </td> </tr> </tbody> </table> <h2><strong>Key Threat Analysis&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <h3><strong>1. Active ICS/OT Exploitation &mdash; CyberAv3ngers (IRGC-CEC)</strong></h3> <p>Joint Advisory AA26-097a is the most significant US government attribution of Iranian ICS operations since the Unitronics campaign of 2023. The advisory names <strong>CyberAv3ngers</strong> (also known as the Shahid Kaveh Group), an IRGC Cyber-Electronic Command unit, as actively exploiting internet-exposed <strong>Rockwell Automation/Allen-Bradley PLCs</strong> using Dropbear SSH implants.</p> <p>The attack methodology is straightforward and devastating: these actors are exploiting default credentials on PLCs that should never have been internet-accessible. With 5,219 such devices quantified as exposed, the remediation window is closing fast &mdash; adversaries will race to exploit remaining targets before patching and network segmentation are completed.</p> <p><strong>Relevant ATT&amp;CK techniques:</strong> T1190 (Exploit Public-Facing Application), T1078 (Valid Accounts &mdash; default credentials), T0816 (Device Restart/Shutdown), T0826 (Loss of Availability), T0890 (Exploitation of Remote Services)</p> <p>The simultaneous release of three additional ICS advisories &mdash; affecting <strong>Contemporary Controls BASC 20T</strong> (building automation), <strong>GPL Odorizers GPL750</strong> (gas distribution), and <strong>Mitsubishi GENESIS64/ICONICS Suite</strong> (industrial SCADA/HMI) &mdash; expands the vulnerable surface in precisely the sectors under active Iranian targeting.</p> <h3><strong>2. Handala Geographic Expansion &mdash; BANISHED KITTEN (IRGC)</strong></h3> <p><strong>Handala</strong> (tracked as BANISHED KITTEN, Void Manticore, UNC5203, Storm-842) operates under IRGC direction using a well-documented operational model: <strong>APT34/OilRig</strong> establishes initial access and hands off to Handala for destruction and information operations amplification.</p> <p>The claimed breach of three major UAE organizations &mdash; spanning defense, energy, government, and healthcare &mdash; represents a critical geographic expansion. Handala&rsquo;s targeting trajectory over the past six weeks tells a clear story:</p> <ul> <li><strong>Pre-conflict:</strong> Israel-focused exclusively</li> <li><strong>March 2026:</strong> Stryker attack &mdash; first US target</li> <li><strong>April 12&ndash;13, 2026:</strong> Three UAE organizations &mdash; first Gulf-state targets</li> </ul> <p>This expansion aligns with a strategic logic: UAE is an Abraham Accords signatory, making it a legitimate target in Iran&rsquo;s threat calculus. The operational infrastructure remains active across three known domains: handala-hack[.]to (data leak site), handala-alert[.]to (news/amplification), and handala-redwanted[.]to (targeting site).</p> <h3><strong>3. Two Critical Zero-Days Under Active Exploitation</strong></h3> <p><strong>CVE-2026-35616 &mdash; Fortinet FortiClientEMS (CVSS 9.8)</strong> Improper access control in FortiClientEMS versions 7.4.5&ndash;7.4.6 allows unauthenticated remote code execution via crafted requests. FortiClientEMS is widely deployed across defense industrial base contractors and government networks for endpoint management. Fortinet products are a documented Iranian initial-access preference &mdash; this CVE will be adopted by Iranian actors if it hasn&rsquo;t been already.</p> <p><strong>CVE-2026-1340 &mdash; Ivanti EPMM (CVSS 9.8)</strong> Code injection in Ivanti Endpoint Manager Mobile allowing unauthenticated RCE. Both vulnerabilities are on CISA&rsquo;s KEV, confirming active exploitation in the wild.</p> <p><strong>Relevant ATT&amp;CK techniques:</strong> T1190 (Exploit Public-Facing Application), T1068 (Exploitation for Privilege Escalation), T1059 (Command and Scripting Interpreter)</p> <h3><strong>4. Named Threat Actors &mdash; Full Attribution Map</strong></h3> <p>The following Iranian state-directed and state-affiliated groups are assessed as active or pre-positioned in the current conflict:</p> <table> <thead> <tr> <th> <p>Actor</p> </th> <th> <p>Aliases</p> </th> <th> <p>Affiliation</p> </th> <th> <p>Current Activity</p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>CyberAv3ngers</strong></p> </td> <td> <p>Shahid Kaveh Group, HYDRO KITTEN</p> </td> <td> <p>IRGC-CEC</p> </td> <td> <p>Active PLC exploitation (AA26-097a)</p> </td> </tr> <tr> <td> <p><strong>Handala</strong></p> </td> <td> <p>BANISHED KITTEN, Void Manticore, UNC5203, Storm-842</p> </td> <td> <p>IRGC</p> </td> <td> <p>UAE breach claims; wiper operations</p> </td> </tr> <tr> <td> <p><strong>APT34</strong></p> </td> <td> <p>OilRig</p> </td> <td> <p>MOIS</p> </td> <td> <p>Initial access provider for Handala handoff</p> </td> </tr> <tr> <td> <p><strong>MuddyWater</strong></p> </td> <td> <p>Mango Sandstorm, TA450, Seedworm</p> </td> <td> <p>MOIS</p> </td> <td> <p>Operationally silent &mdash; anomalous; last active Apr 10&ndash;11</p> </td> </tr> <tr> <td> <p><strong>APT42</strong></p> </td> <td> <p>CALANQUE</p> </td> <td> <p>IRGC-IO</p> </td> <td> <p>BELLACIAO/SHELLAFEL espionage campaigns</p> </td> </tr> <tr> <td> <p><strong>Fox Kitten</strong></p> </td> <td> <p>&mdash;</p> </td> <td> <p>MOIS</p> </td> <td> <p>Active espionage operations</p> </td> </tr> <tr> <td> <p><strong>APT35</strong></p> </td> <td> <p>Tortoiseshell</p> </td> <td> <p>IRGC-affiliated</p> </td> <td> <p>Active operations</p> </td> </tr> <tr> <td> <p><strong>Shamoon Group</strong></p> </td> <td> <p>&mdash;</p> </td> <td> <p>Iranian-affiliated</p> </td> <td> <p>Profile updated Apr 12; no new operations &mdash; possible pre-positioning</p> </td> </tr> <tr> <td> <p><strong>Silent Librarian</strong></p> </td> <td> <p>&mdash;</p> </td> <td> <p>Iranian-affiliated</p> </td> <td> <p>Profile updated Apr 12</p> </td> </tr> </tbody> </table> <h3><strong>5. Mirai2 Botnet with Iran-Themed Binaries</strong></h3> <p>Intelligence collection identified a Mirai2 botnet variant distributing binaries with Iran-themed filenames (iran.armv5l, iran.i486, iran.mipsel, iran.sh4) from IP 83[.]168[.]110[.]191. While this is assessed as likely criminal rather than state-directed, the targeting of IoT/embedded architectures (ARM, MIPS, SH4) overlaps with PLC and ICS device architectures &mdash; creating potential for confusion during incident response and an additional threat to already-stressed OT environments.</p> <h3><strong>6. Notable Absences &mdash; What&rsquo;s Missing Is Also Signal</strong></h3> <p><strong>MuddyWater silence:</strong> Despite being one of Iran&rsquo;s most active cyber espionage groups &mdash; with confirmed operations across 17 countries &mdash; MuddyWater has gone operationally silent during peak conflict escalation. This is anomalous given their historical pattern of parallel kinetic-cyber operations and may indicate retooling or preparation for a significant operation.</p> <p><strong>DIB pre-positioning gap:</strong> There has been no new intelligence on Iranian pre-positioning within defense industrial base contractor networks for 34 days &mdash; during the most active Iranian cyber campaign in years. This represents either a collection gap or undetected dormant access. Both possibilities are unacceptable.</p> <p><strong>No Western hacktivist counter-operations:</strong> The absence of Anonymous or other Western hacktivist activity against Iranian targets creates an asymmetric information operations environment where pro-Iran groups (Handala, DieNet, 313 Team) dominate the narrative without counter-pressure.</p> <h2><strong>Predictive Analysis &mdash; Next 72 Hours</strong></h2> <table> <thead> <tr> <th> <p>Probability</p> </th> <th> <p>Scenario</p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>HIGH (&gt;75%)</strong></p> </td> <td> <p>Additional Iranian PLC exploitation attempts accelerate as AA26-097a drives defender response &mdash; actors will race to exploit remaining exposed PLCs before patching completes</p> </td> </tr> <tr> <td> <p><strong>MODERATE (50&ndash;75%)</strong></p> </td> <td> <p>Handala releases stolen UAE data on its data leak site within 48&ndash;72 hours to maximize information operations impact during US blockade discussions</p> </td> </tr> <tr> <td> <p><strong>MODERATE (50&ndash;75%)</strong></p> </td> <td> <p>CVE-2026-35616 (FortiClientEMS) exploitation adopted by Iranian actors &mdash; Fortinet products are a documented Iranian initial-access preference</p> </td> </tr> <tr> <td> <p><strong>LOW-MODERATE (25&ndash;50%)</strong></p> </td> <td> <p>MuddyWater reactivation with new tooling, possibly leveraging APT42 BELLACIAO/SHELLAFEL infrastructure overlap</p> </td> </tr> <tr> <td> <p><strong>LOW-MODERATE (25&ndash;50%)</strong></p> </td> <td> <p>Shamoon-style wiper deployment against Gulf-state energy infrastructure, potentially via Handala&rsquo;s expanded operational pipeline</p> </td> </tr> </tbody> </table> <h2><strong>SOC Operational Guidance&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <h3><strong>What to Monitor</strong></h3> <table> <thead> <tr> <th> <p>Focus Area</p> </th> <th> <p>ATT&amp;CK Technique</p> </th> <th> <p>Detection Guidance</p> </th> </tr> </thead> <tbody> <tr> <td> <p>PLC/ICS default credential abuse</p> </td> <td> <p>T1078 (Valid Accounts)</p> </td> <td> <p>Alert on authentication to Rockwell/Allen-Bradley PLCs from non-OT-management IPs; audit all default credentials on internet-exposed industrial devices</p> </td> </tr> <tr> <td> <p>Edge device exploitation</p> </td> <td> <p>T1190 (Exploit Public-Facing Application)</p> </td> <td> <p>Monitor FortiClientEMS (7.4.5&ndash;7.4.6) and Ivanti EPMM for unauthenticated access patterns; correlate with CISA KEV IOCs when published</p> </td> </tr> <tr> <td> <p>Wiper precursor activity</p> </td> <td> <p>T1485 (Data Destruction), T1486 (Data Encrypted for Impact)</p> </td> <td> <p>Monitor for mass file deletion, MBR/VBR modification, or encryption without ransom note &mdash; Handala wipers masquerade as ransomware</p> </td> </tr> <tr> <td> <p>Lateral movement from OT to IT</p> </td> <td> <p>T0890 (Exploitation of Remote Services)</p> </td> <td> <p>Alert on any traffic from OT/ICS network segments to IT management networks; Dropbear SSH implants on PLCs will attempt lateral movement</p> </td> </tr> <tr> <td> <p>Dormant account reactivation</p> </td> <td> <p>T1078 (Valid Accounts)</p> </td> <td> <p>Hunt for accounts dormant &gt;30 days that suddenly authenticate &mdash; especially in DIB/aerospace environments</p> </td> </tr> <tr> <td> <p>Data staging and exfiltration</p> </td> <td> <p>T1560 (Archive Collection), T1567.002 (Exfil to Cloud Storage)</p> </td> <td> <p>Monitor for unusual archive creation (7z, RAR, ZIP) followed by uploads to cloud storage services</p> </td> </tr> <tr> <td> <p>Credential harvesting from ICS</p> </td> <td> <p>T1552.001 (Credentials in Files)</p> </td> <td> <p>Audit Mitsubishi GENESIS64/ICONICS SQL Server configurations for exposed credentials per ICSA-26-097-01</p> </td> </tr> <tr> <td> <p>C2 communications</p> </td> <td> <p>T1041 (Exfiltration Over C2 Channel)</p> </td> <td> <p>Monitor for connections to known Handala infrastructure: handala-hack[.]to, handala-alert[.]to, handala-redwanted[.]to, justicehomeland[.]org, karmabelow80[.]org</p> </td> </tr> <tr> <td> <p>IoT/embedded device compromise</p> </td> <td> <p>T1190</p> </td> <td> <p>Monitor for connections to 83[.]168[.]110[.]191 (Mirai2 C2); scan for unauthorized binaries on ARM/MIPS/SH4 architecture devices</p> </td> </tr> </tbody> </table> <h3><strong>Hunting Hypotheses</strong></h3> <ol> <li><strong>Hypothesis: Iranian actors have already compromised Rockwell PLCs in our environment via default credentials.</strong> Hunt for: Dropbear SSH processes on PLC firmware, unexpected outbound connections from OT segments, authentication events using factory-default credentials on Allen-Bradley devices.</li> <li><strong>Hypothesis: FortiClientEMS or Ivanti EPMM has been exploited as an initial access vector.</strong> Hunt for: Unauthenticated API calls to FortiClientEMS management interfaces, anomalous process execution on EPMM servers, web shells (T1505.003) deployed post-exploitation.</li> <li><strong>Hypothesis: Dormant access exists in DIB/aerospace networks from prior Iranian espionage operations.</strong> Hunt for: Valid accounts inactive &gt;30 days with sudden reactivation, GitHub-sourced developer tools with embedded backdoors (UNC6446 resume lure campaign), exfiltration to cloud storage services from engineering workstations.</li> <li><strong>Hypothesis: APT34 has established initial access that will be handed off to Handala for destruction.</strong> Hunt for: OilRig TTPs (DNS tunneling, web shells on Exchange/OWA servers) in environments connected to Gulf-region partners or UAE operations.</li> </ol> <h2><strong>Sector-Specific Defensive Priorities</strong></h2> <h3><strong>Financial Services</strong></h3> <p>Financial institutions face dual risk: direct targeting by Iranian espionage groups (APT34, APT42) seeking economic intelligence during sanctions enforcement, and collateral impact from destructive operations against interconnected infrastructure.</p> <ul> <li><strong>Immediate:</strong> Audit all Fortinet FortiClientEMS and Ivanti EPMM deployments; emergency patch CVE-2026-35616 and CVE-2026-1340. Financial sector adoption of these products for remote workforce management is widespread.</li> <li><strong>7-Day:</strong> Review SWIFT and interbank messaging system access controls for dormant accounts. Iranian actors have historically targeted financial messaging infrastructure during geopolitical escalation.</li> <li><strong>30-Day:</strong> Conduct tabletop exercise simulating a wiper attack on core banking systems, modeled on Handala&rsquo;s operational pattern (APT34 initial access &rarr; data exfiltration &rarr; wiper deployment &rarr; public leak).</li> </ul> <h3><strong>Energy</strong></h3> <p>Energy is the highest-risk sector in this threat environment. AA26-097a explicitly names energy as an active target, and Handala&rsquo;s UAE expansion puts Gulf-connected energy operations directly in the crosshairs.</p> <ul> <li><strong>Immediate:</strong> Remove ALL Rockwell Automation/Allen-Bradley PLCs from the public internet. Where remote access is operationally required, place behind VPN with MFA and restrict to named management IPs. Audit default credentials on every PLC.</li> <li><strong>Immediate:</strong> Review ICS advisories for Contemporary Controls BASC (building automation), GPL Odorizers GPL750 (gas distribution), Yokogawa CENTUM VP, Siemens SICAM 8, and Hitachi Energy Ellipse. Apply patches or compensating controls.</li> <li><strong>7-Day:</strong> Validate OT/IT network segmentation. Dropbear SSH implants on compromised PLCs will attempt lateral movement &mdash; ensure OT segments cannot reach IT management networks.</li> <li><strong>30-Day:</strong> Commission independent assessment of ICS/OT network segmentation and air-gap integrity across all operational technology environments.</li> </ul> <h3><strong>Healthcare</strong></h3> <p>Healthcare faces risk from both targeted operations (Handala&rsquo;s UAE claims included healthcare organizations) and collateral damage from wiper attacks on shared infrastructure. The March 2026 Stryker attack demonstrated that medical device manufacturers are viable targets.</p> <ul> <li><strong>Immediate:</strong> Patch FortiClientEMS and Ivanti EPMM &mdash; both are commonly deployed in healthcare for mobile device management of clinical staff.</li> <li><strong>7-Day:</strong> Audit all network-connected medical devices for default credentials and unnecessary internet exposure. The same PLC exploitation methodology (default creds on internet-exposed devices) applies to connected medical equipment.</li> <li><strong>30-Day:</strong> Review and test incident response plans specifically for wiper scenarios. Healthcare organizations must be prepared for simultaneous loss of EHR, imaging, and connected medical device systems.</li> </ul> <h3><strong>Government</strong></h3> <p>Government agencies are primary targets for both espionage (APT42, MuddyWater) and destructive operations (CyberAv3ngers, Handala). The CISA advisory is directed at government defenders.</p> <ul> <li><strong>Immediate:</strong> Implement all AA26-097a mitigations. Ingest CSAF IOCs when the full advisory is published. Audit Ivanti EPMM deployments &mdash; government mobile device management is a high-value target.</li> <li><strong>7-Day:</strong> Conduct threat hunt for MuddyWater indicators (BugSleep, PowerStats, StarWhale, DHCSpy) across government networks. MuddyWater&rsquo;s operational silence during peak conflict is anomalous and may precede a significant operation.</li> <li><strong>30-Day:</strong> Brief Gulf-region diplomatic and military partners on Handala&rsquo;s geographic expansion. Share TLP:GREEN indicators and coordinate defensive posture.</li> </ul> <h3><strong>Aviation &amp; Logistics</strong></h3> <p>Aviation and defense logistics face the highest risk from PIR-007 &mdash; dormant Iranian pre-positioning in defense industrial base networks. The GitHub resume lure campaign (UNC6446) specifically targeted aerospace.</p> <ul> <li><strong>Immediate:</strong> Audit all developer workstations for GitHub-sourced tools and repositories that may contain embedded backdoors. The UNC6446 campaign uses fake coding challenges and resume-themed lures.</li> <li><strong>7-Day:</strong> Execute dedicated threat hunt for dormant valid accounts (T1078) in aerospace and defense logistics networks. Focus on accounts inactive &gt;30 days that show any authentication activity. Search for web shells (T1505.003) on externally-facing servers.</li> <li><strong>30-Day:</strong> Review supply chain security for all software dependencies. The LiteLLM/TeamPCP compromise (C2 at 83[.]142[.]209[.]11) demonstrates that AI/ML toolchain supply chain attacks are active and may target aerospace R&amp;D environments.</li> </ul> <h2><strong>Prioritized Defense Recommendations</strong></h2> <h3><strong>Immediate (Within 24 Hours)</strong></h3> <table> <thead> <tr> <th> <p>Team</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>IT Ops</strong></p> </td> <td> <p>Emergency patch Fortinet FortiClientEMS to version &gt;7.4.6 to remediate CVE-2026-35616 (CVSS 9.8, actively exploited). Verify zero remaining instances of versions 7.4.5&ndash;7.4.6 in production.</p> </td> </tr> <tr> <td> <p><strong>IT Ops</strong></p> </td> <td> <p>Emergency patch Ivanti EPMM to remediate CVE-2026-1340 (CVSS 9.8, CISA KEV). Audit EPMM access logs for indicators of unauthenticated RCE.</p> </td> </tr> <tr> <td> <p><strong>SOC</strong></p> </td> <td> <p>Block IP 83[.]168[.]110[.]191 and associated Mirai2 MD5 hashes at network perimeter and EDR. Prioritize IoT/OT network segments.</p> </td> </tr> <tr> <td> <p><strong>SOC</strong></p> </td> <td> <p>Block Handala infrastructure domains (handala-hack[.]to, handala-alert[.]to, handala-redwanted[.]to, justicehomeland[.]org, karmabelow80[.]org) at DNS and proxy layers.</p> </td> </tr> <tr> <td> <p><strong>OT/ICS Ops</strong></p> </td> <td> <p>Audit and remediate ALL internet-exposed Rockwell Automation/Allen-Bradley PLCs. Remove from public internet or place behind VPN with MFA. Change all default credentials.</p> </td> </tr> <tr> <td> <p><strong>SOC</strong></p> </td> <td> <p>Ingest CISA AA26-097a indicators (full CSAF when published) and create detection rules for PLC default credential abuse and Dropbear SSH implant activity.</p> </td> </tr> </tbody> </table> <h3><strong>7-Day Actions</strong></h3> <table> <thead> <tr> <th> <p>Team</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>SOC</strong></p> </td> <td> <p>Conduct threat hunt for Handala/BANISHED KITTEN indicators in UAE-connected partner networks. Search for Handala DLS domains in DNS and proxy logs.</p> </td> </tr> <tr> <td> <p><strong>SOC</strong></p> </td> <td> <p>Execute dedicated threat hunt for dormant access in DIB/aerospace networks: T1078 (dormant account reactivation), T1505.003 (web shells), T1567.002 (exfiltration to cloud storage). The 34-day intelligence gap during active conflict is an unacceptable blind spot.</p> </td> </tr> <tr> <td> <p><strong>IT Ops</strong></p> </td> <td> <p>Audit Mitsubishi GENESIS64/ICONICS Suite deployments for SQL Server credential exposure per ICSA-26-097-01. Rotate all affected credentials.</p> </td> </tr> <tr> <td> <p><strong>SOC</strong></p> </td> <td> <p>Increase monitoring for MuddyWater infrastructure reactivation. Deploy detection for BugSleep, PowerStats, StarWhale, and DHCSpy malware families. Check for BELLACIAO/SHELLAFEL deployment overlap with APT42 campaigns.</p> </td> </tr> </tbody> </table> <h3><strong>30-Day Actions</strong></h3> <table> <thead> <tr> <th> <p>Team</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>CISO</strong></p> </td> <td> <p>Commission independent assessment of ICS/OT network segmentation posture for all Rockwell Automation, Yokogawa CENTUM VP, Siemens SICAM 8, and Hitachi Energy Ellipse deployments. Validate air-gap integrity.</p> </td> </tr> <tr> <td> <p><strong>CISO</strong></p> </td> <td> <p>Brief Gulf-region partners on Handala geographic expansion to UAE. Share TLP:GREEN indicators and recommend perimeter hardening: block Iran and Starlink IP ranges, enforce MFA on all remote access, restrict VPN to business-required countries.</p> </td> </tr> <tr> <td> <p><strong>CISO / IR</strong></p> </td> <td> <p>Conduct tabletop exercise simulating the APT34 &rarr; Handala kill chain: initial access via edge device exploitation &rarr; lateral movement &rarr; data exfiltration &rarr; wiper deployment &rarr; public data leak on Handala DLS. Test IR playbooks for simultaneous destructive and information operations.</p> </td> </tr> <tr> <td> <p><strong>CISO</strong></p> </td> <td> <p>Evaluate consolidation of threat monitoring across ICS/OT, edge device, and espionage threat vectors. The Iranian operational model &mdash; where a single intrusion chain spans espionage, destruction, and information operations &mdash; requires integrated detection rather than siloed monitoring.</p> </td> </tr> </tbody> </table> <h2><strong>Bottom Line&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2> <p>We are 44 days into the US-Iran military confrontation, and the cyber dimension has entered its most dangerous phase. CISA, the FBI, and the NSA have confirmed that Iranian actors are inside US critical infrastructure <em>right now</em>, exploiting PLCs that control water treatment, energy distribution, and manufacturing processes. Handala&rsquo;s geographic expansion from Israel to the United States to the UAE in six weeks demonstrates that Iran&rsquo;s IRGC is systematically broadening its target aperture. Two CVSS 9.8 zero-days in edge devices favored by Iranian actors are being exploited simultaneously. And the collapse of ceasefire talks has removed the last diplomatic brake on Iranian cyber operations.</p> <p>The window to act is measured in hours, not weeks. Every internet-exposed PLC, every unpatched FortiClientEMS instance, every Ivanti EPMM server running a vulnerable version &mdash; these are not theoretical vulnerabilities. They are active attack surfaces being exploited by named, attributed threat actors with demonstrated willingness to cross destructive thresholds.</p> <p>Patch. Segment. Hunt. Brief your board. The next 72 hours will define whether your organization is a defender or a headline.</p>

FEATURED RESOURCES

April 13, 2026
Anomali Cyber Watch

Iran’s Cyber War Enters Its Most Dangerous Phase: Active ICS Exploitation, Geographic Expansion, and Two Critical Zero-Days

Read More
April 13, 2026
Anomali Cyber Watch
Public Sector

The Attack Surface Is Accelerating: AI-Augmented Intrusions, Actively Exploited Zero-Days, and What State Government IT Leaders Must Do This Week

Read More
April 13, 2026
Cyber Threat Intelligence
Security Operations

The Real Threat Intelligence Gap Is Execution

Read More
Explore All