All Posts
Anomali Cyber Watch
1
min read

Iran's Cyber War Didn't Stop When the Ceasefire Started — And the Next 72 Hours Are Critical

Published on
April 21, 2026
Table of Contents
<p><strong>Threat Assessment Level: CRITICAL</strong></p> <p><em>Maintained from prior cycle. While the executive flash rates operational tempo as HIGH, the combination of active PLC exploitation across US critical infrastructure, confirmed MOIS multi-persona operations, and the approaching ceasefire expiry on April 23 with no cyber provisions warrants a CRITICAL strategic assessment for defensive planning purposes.</em></p> <p>Fifty-two days into the US-Iran conflict that began on February 28, 2026, a Trump-brokered ceasefire is holding &mdash; but it explicitly excludes cyber operations. That single omission has created a permissive environment in which Iranian state-sponsored actors continue to target US critical infrastructure, conduct espionage against government networks, and manipulate industrial control systems &mdash; all while diplomats negotiate at the table.</p> <p>Today's intelligence paints a picture that every CISO overseeing critical infrastructure, defense industrial base, or government networks needs to internalize: <strong>the ceasefire is a kinetic pause, not a cyber one.</strong> Iranian actors are refreshing command-and-control infrastructure, expanding PLC exploitation to new vendors, and maintaining the full spectrum of their offensive capability. And with the ceasefire set to expire on April 23 &mdash; two days from now &mdash; the window for defensive preparation is closing.</p> <p>This is not theoretical. CISA Advisory AA26-097A confirms active manipulation of Rockwell Automation/Allen-Bradley PLCs in US water, energy, and government facilities. This has moved beyond reconnaissance into <strong>active process interference</strong>.</p> <h2><strong>What Changed: Key Developments (April 15&ndash;21, 2026)</strong></h2> <p>The past week has produced seven significant intelligence developments that collectively raise the threat posture:</p> <table> <thead> <tr> <th> <p>Date</p> </th> <th> <p>Development</p> </th> <th> <p>Significance</p> </th> </tr> </thead> <tbody> <tr> <td> <p>April 21</p> </td> <td> <p>DomainTools/Cryptika confirms Homeland Justice, Karma, and Handala are a single MOIS operation ("Void Manticore")</p> </td> <td> <p>Three previously separate hacktivist personas collapsed into one state-directed actor; DOJ seized four domains in March</p> </td> </tr> <tr> <td> <p>April 21</p> </td> <td> <p>Iran claims US exploited Cisco/Juniper/Fortinet/MikroTik firmware backdoors during strikes; China amplifies narrative</p> </td> <td> <p>Information warfare operation; unverifiable due to 52-day Iranian internet blackout, but firmware integrity audits are prudent</p> </td> </tr> <tr> <td> <p>April 17</p> </td> <td> <p>CISA/FBI/NSA Advisory AA26-097A confirms Iranian exploitation of Rockwell/Allen-Bradley PLCs across US critical infrastructure</p> </td> <td> <p>Active process interference in water, energy, and government &mdash; not just reconnaissance</p> </td> </tr> <tr> <td> <p>April 15</p> </td> <td> <p>Pro-Iran group claims 24-hour DDoS against Bluesky social media platform</p> </td> <td> <p>Hacktivist operations targeting Western platforms continue through ceasefire</p> </td> </tr> <tr> <td> <p>April 7</p> </td> <td> <p>Reuters confirms Russia providing satellite ISR and cyber support to Iran; APT28 infrastructure observed on Iranian ASN 213790</p> </td> <td> <p>Russia-Iran operational cooperation has expanded beyond shared hosting into active military-intelligence support</p> </td> </tr> <tr> <td> <p>Ongoing (52 days)</p> </td> <td> <p>APT33/Peach Sandstorm has produced no confirmed activity against defense industrial base targets since conflict began</p> </td> <td> <p>52-day silence from Iran's primary DIB-targeting group during active armed conflict is anomalous &mdash; pre-positioned dormant access is the leading assessment</p> </td> </tr> </tbody> </table> <p><strong>What hasn't changed &mdash; and why that matters:</strong> Iran's confirmed wiper arsenal (BiBiWiper, ZeroShred, GoneXML, Meteor, ZeroCleare) remains undeployed against Western targets. This deliberate restraint during ceasefire is assessed as calculated escalation management. <strong>If the ceasefire collapses on April 23, wiper deployment against critical infrastructure is the highest-probability immediate Iranian cyber response &mdash; estimated within 24&ndash;48 hours of breakdown.</strong></p> <h2><strong>Conflict and Threat Timeline&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2> <table> <thead> <tr> <th> <p>Date</p> </th> <th> <p>Event</p> </th> </tr> </thead> <tbody> <tr> <td> <p>Feb 28, 2026</p> </td> <td> <p>US-Iran armed conflict begins ("Operation Epic Fury")</p> </td> </tr> <tr> <td> <p>Early Mar 2026</p> </td> <td> <p>Iran's internet disconnected from global internet (blackout ongoing &mdash; now 52 days)</p> </td> </tr> <tr> <td> <p>Mar 2026</p> </td> <td> <p>DOJ seizes four MOIS domains: Handala-Hack[.]to, Karmabelow80[.]org, Justicehomeland[.]org, Handala-Redwanted[.]to</p> </td> </tr> <tr> <td> <p>Mar 7, 2026</p> </td> <td> <p>MuddyWater C2 domain serialmenot[.]com registered</p> </td> </tr> <tr> <td> <p>Apr 7, 2026</p> </td> <td> <p>Reuters reports Russia providing satellite ISR and cyber support to Iran for strike targeting</p> </td> </tr> <tr> <td> <p>Apr 9, 2026</p> </td> <td> <p>MOIS-directed "Ababil of Minab" claims admin access to LA Metro VMware vCenter (~1,421 VMs) and train control systems</p> </td> </tr> <tr> <td> <p>Apr 15, 2026</p> </td> <td> <p>Pro-Iran group conducts 24-hour DDoS against Bluesky</p> </td> </tr> <tr> <td> <p>Apr 17, 2026</p> </td> <td> <p>CISA Advisory AA26-097A: Iranian actors actively exploiting Rockwell/Allen-Bradley PLCs in US water, energy, government</p> </td> </tr> <tr> <td> <p>Apr 17, 2026</p> </td> <td> <p>CISA/FBI/NSA confirm deployment of ICS malware TRK25-ADVANCED against US water PLCs; ZionSiphon targeting Israeli desalination</p> </td> </tr> <tr> <td> <p>Apr 20, 2026</p> </td> <td> <p>Multi-vertical Iranian espionage campaign confirmed active across 17 countries</p> </td> </tr> <tr> <td> <p>Apr 21, 2026</p> </td> <td> <p>MuddyWater DinDoor/DinoDance C2 infrastructure refreshed; Void Manticore persona unification confirmed</p> </td> </tr> <tr> <td> <p>Apr 23, 2026</p> </td> <td> <p><strong>Ceasefire expiry date &mdash; no cyber provisions included</strong></p> </td> </tr> </tbody> </table> <h2><strong>The Iranian Cyber Order of Battle: Who's Doing What</strong></h2> <p>Understanding the threat requires understanding the organizational structure behind it. Iran's cyber operations run through two parallel command hierarchies, each with distinct missions and actor groups.</p> <h3><strong>IRGC-Controlled Operations (Kinetic-Adjacent, ICS/OT Focus)</strong></h3> <p><strong>CyberAv3ngers</strong> &mdash; The IRGC's primary ICS/OT attack group. Confirmed in CISA AA26-097A as actively exploiting Rockwell Automation/Allen-Bradley PLCs across US water, energy, and government sectors. Deployed the purpose-built ICS malware <strong>IOCONTROL</strong> and <strong>TRK25-ADVANCED</strong> against programmable logic controllers. Their operations have escalated from defacement and reconnaissance to <strong>active process interference</strong> &mdash; manipulating HMI/SCADA data and extracting PLC project files.</p> <p><strong>APT33 / Refined Kitten / Peach Sandstorm</strong> &mdash; IRGC-affiliated group and the primary Defense Industrial Base (DIB) threat actor. Named in AA26-097A for PLC exploitation activity. <strong>Critical concern: APT33 has been silent for 52 days against DIB targets despite active conflict &mdash; this absence is anomalous and may indicate pre-positioned dormant access awaiting activation.</strong></p> <p><strong>UNC1549 / Imperial Kitten</strong> &mdash; IRGC-linked group focused on aerospace and defense targeting in the Middle East. Part of the broader IRGC operational umbrella.</p> <p><strong>APT42 / Charming Kitten</strong> (IRGC Intelligence Organization) &mdash; Credential harvesting and surveillance operations targeting journalists, activists, and policy officials. Operates under IRGC-IO rather than the IRGC Cyber-Electronic Command.</p> <h3><strong>MOIS-Directed Operations (Espionage, Wipers, Information Operations)</strong></h3> <p><strong>MuddyWater / UNC5667 / Static Kitten</strong> &mdash; Iran's most prolific espionage group, confirmed active today with fresh DinDoor/DinoDance backdoor infrastructure. Uses the Deno JavaScript runtime for execution and Microsoft Teams for social engineering. Named in CISA AA26-097A alongside CyberAv3ngers for PLC exploitation &mdash; demonstrating MOIS-IRGC operational convergence on ICS targets.</p> <p><strong>OilRig / APT34 / Helix Kitten</strong> &mdash; Long-running MOIS espionage operation targeting government, energy, and telecommunications. Named in AA26-097A for PLC exploitation activity.</p> <p><strong>UNC1860</strong> &mdash; MOIS access broker providing initial footholds to other Iranian groups.</p> <p><strong>Pioneer Kitten / UNC757</strong> &mdash; Known for exploiting VPN appliances and selling access. Tradecraft includes Farsi-named webshells and artifacts.</p> <p><strong>Void Manticore / MOIST GRASSHOPPER</strong> (Handala = Karma = Homeland Justice) &mdash; Newly confirmed as a single MOIS-directed operation. Previously tracked as three separate hacktivist personas. Possesses confirmed wiper capability and deploys Rhadamanthys infostealer via phishing campaigns impersonating F5 updates. Initial access via Microsoft SharePoint exploitation. DOJ seized four of their domains in March 2026.</p> <h3><strong>External Enablers</strong></h3> <p><strong>Russia-Iran Cyber Cooperation</strong> &mdash; Reuters confirmed (April 7) that Russia is providing satellite ISR imagery and cyber support to Iran. APT28 (Russian GRU) infrastructure has been observed operating from Iranian ASN 213790. This cooperation has expanded beyond shared hosting into active military-intelligence support for Iranian targeting.</p> <h2><strong>Active Malware and Tooling</strong></h2> <table> <thead> <tr> <th> <p>Malware / Tool</p> </th> <th> <p>Attribution</p> </th> <th> <p>Function</p> </th> <th> <p>Current Status</p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>IOCONTROL</strong></p> </td> <td> <p>CyberAv3ngers (IRGC)</p> </td> <td> <p>Purpose-built ICS/OT weapon targeting PLCs</p> </td> <td> <p>Legacy samples circulating; no new variants detected &mdash; actors may be shifting to native PLC exploitation</p> </td> </tr> <tr> <td> <p><strong>TRK25-ADVANCED</strong></p> </td> <td> <p>CyberAv3ngers (IRGC)</p> </td> <td> <p>ICS malware targeting US water utility PLCs</p> </td> <td> <p>Confirmed deployed per CISA/FBI/NSA (April 17)</p> </td> </tr> <tr> <td> <p><strong>ZionSiphon</strong></p> </td> <td> <p>Iran-affiliated</p> </td> <td> <p>Targeting Israeli desalination infrastructure</p> </td> <td> <p>Confirmed deployed per CISA/FBI/NSA (April 17)</p> </td> </tr> <tr> <td> <p><strong>DinDoor / DinoDance</strong></p> </td> <td> <p>MuddyWater (MOIS)</p> </td> <td> <p>Backdoor using Deno JavaScript runtime</p> </td> <td> <p><strong>Active &mdash; fresh C2 infrastructure registered April 21</strong></p> </td> </tr> <tr> <td> <p><strong>Rhadamanthys</strong></p> </td> <td> <p>Void Manticore (MOIS)</p> </td> <td> <p>Commercial infostealer (darknet-sourced)</p> </td> <td> <p>Deployed via phishing impersonating F5 updates</p> </td> </tr> <tr> <td> <p><strong>BiBiWiper / ZeroShred / GoneXML / Meteor / ZeroCleare</strong></p> </td> <td> <p>Multiple Iranian actors</p> </td> <td> <p>Destructive wipers</p> </td> <td> <p><strong>Not deployed against Western targets &mdash; assessed as held in reserve</strong></p> </td> </tr> </tbody> </table> <h2><strong>Critical Vulnerabilities Under Active Exploitation</strong></h2> <p>CISA Advisory AA26-097A identifies exploitation of <strong>architectural exposure</strong> rather than specific zero-day CVEs &mdash; Iranian actors are targeting internet-exposed Rockwell Automation/Allen-Bradley PLCs via industrial protocols:</p> <table> <thead> <tr> <th> <p>Protocol / Port</p> </th> <th> <p>Service</p> </th> <th> <p>Exploitation Context</p> </th> </tr> </thead> <tbody> <tr> <td> <p>Port 44818</p> </td> <td> <p>EtherNet/IP (CIP)</p> </td> <td> <p>Primary Rockwell PLC communication &mdash; unauthorized read/write of PLC logic</p> </td> </tr> <tr> <td> <p>Port 2222</p> </td> <td> <p>Rockwell proprietary</p> </td> <td> <p>PLC project file extraction</p> </td> </tr> <tr> <td> <p>Port 102</p> </td> <td> <p>S7comm (Siemens)</p> </td> <td> <p>Cross-vendor ICS targeting</p> </td> </tr> <tr> <td> <p>Port 502</p> </td> <td> <p>Modbus</p> </td> <td> <p>HMI/SCADA data manipulation</p> </td> </tr> </tbody> </table> <p>Additionally, Void Manticore's initial access leverages <strong>Microsoft SharePoint exploitation</strong> (T1190), and CISA issued advisories during this period covering AVEVA Pipeline Simulation, Horner Cscape/XL PLC software, and Delta ASDA-Soft &mdash; all relevant to OT environments under Iranian targeting.</p> <p>Organizations running any Rockwell Automation/Allen-Bradley PLCs with internet-facing configurations should treat this as an <strong>active compromise scenario</strong>, not a theoretical risk.</p> <h2><strong>Predictive Analysis: What Comes Next</strong></h2> <p>Based on current intelligence, operational patterns, and the approaching ceasefire expiry on April 23:</p> <table> <thead> <tr> <th> <p>Scenario</p> </th> <th> <p>Probability</p> </th> <th> <p>Timeframe</p> </th> <th> <p>Basis</p> </th> </tr> </thead> <tbody> <tr> <td> <p>MuddyWater DinDoor phishing campaign against government/energy targets</p> </td> <td> <p><strong>70%</strong></p> </td> <td> <p>72 hours</p> </td> <td> <p>Fresh C2 domain registration pattern matches prior campaign cadence</p> </td> </tr> <tr> <td> <p>Additional pro-Iran hacktivist DDoS against Western platforms</p> </td> <td> <p><strong>60%</strong></p> </td> <td> <p>72 hours</p> </td> <td> <p>Bluesky precedent + ceasefire tension escalation</p> </td> </tr> <tr> <td> <p>New CISA ICS advisory referencing Iranian PLC activity</p> </td> <td> <p><strong>40%</strong></p> </td> <td> <p>7 days</p> </td> <td> <p>Advisory cadence suggests follow-up to AA26-097A</p> </td> </tr> <tr> <td> <p><strong>Ceasefire collapse triggers wiper deployment against critical infrastructure</strong></p> </td> <td> <p><strong>15%</strong></p> </td> <td> <p>24&ndash;48 hours post-collapse</p> </td> <td> <p>Low probability but <strong>catastrophic impact</strong> &mdash; Iran possesses confirmed capability and has historically deployed wipers (Albania 2022, Israel 2023&ndash;2024)</p> </td> </tr> <tr> <td> <p>APT33 dormant DIB access activates for data exfiltration or disruption</p> </td> <td> <p><strong>25%</strong></p> </td> <td> <p>Upon ceasefire collapse or escalation</p> </td> <td> <p>52-day silence is anomalous; pre-positioning is consistent with APT33 tradecraft</p> </td> </tr> </tbody> </table> <p><strong>The single most important signal in this assessment is what we are NOT seeing.</strong> Iran's wiper arsenal remains sheathed. This restraint is deliberate and condition-dependent. The ceasefire expiry on April 23 is the most likely trigger for escalation. Every organization in the blast radius should be operating under the assumption that the restraint may end in 48 hours.</p> <h2><strong>SOC Operational Guidance&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <h3><strong>Immediate Detection Priorities</strong></h3> <ol> <li><strong> MuddyWater DinDoor/DinoDance Activity</strong></li> </ol> <ul> <li><strong>Hunt Hypothesis:</strong> Adversary is using Microsoft Teams external messages to deliver lures leading to DinDoor backdoor download from freshly registered domains.</li> <li><strong>ATT&amp;CK Techniques to Monitor:</strong></li> </ul> <ul> <li>T1566.001 (Spearphishing Attachment) &mdash; Watch for Teams messages from external tenants containing links or file attachments</li> <li>T1059.007 (JavaScript/Deno Runtime Execution) &mdash; Alert on deno.exe or Deno runtime processes spawning on endpoints</li> <li>T1055 (Process Injection) &mdash; Monitor for in-memory execution patterns following Deno process launch</li> </ul> <ul> <li><strong>Detection Logic:</strong> Create correlation rules for: Teams external message received &rarr; file download from uncategorized domain &rarr; Deno/Node.js process execution within 15 minutes</li> </ul> <ol start="2"> <li><strong> ICS/OT PLC Exploitation (Per CISA AA26-097A)</strong></li> </ol> <ul> <li><strong>Hunt Hypothesis:</strong> Iranian actors are scanning for and connecting to internet-exposed Rockwell/Allen-Bradley PLCs to manipulate process logic and extract project files.</li> <li><strong>ATT&amp;CK Techniques to Monitor:</strong></li> </ul> <ul> <li>T1190 (Exploit Public-Facing Application) &mdash; Monitor for unauthorized connections to PLCs from external IPs</li> <li>T1565.002 (Transmitted Data Manipulation) &mdash; Alert on unexpected changes to HMI/SCADA display values</li> <li>T1005 (Data from Local System) &mdash; Monitor for PLC project file access/download outside maintenance windows</li> <li>T1498/T1499 (Network/Endpoint DoS) &mdash; Watch for PLC availability degradation</li> </ul> <ul> <li><strong>Network Monitoring:</strong> Deploy packet capture or IDS rules on ports <strong>44818, 2222, 102, and 502</strong>. Any external IP connecting to these ports is a critical alert.</li> <li><strong>Baseline Comparison:</strong> Compare current PLC logic against known-good backups. Any unauthorized modification is a confirmed compromise indicator.</li> </ul> <ol start="3"> <li><strong> Void Manticore / MOIS Persona Operations</strong></li> </ol> <ul> <li><strong>Hunt Hypothesis:</strong> Despite DOJ domain seizures, the Void Manticore operation will pivot to new infrastructure. Watch for Rhadamanthys infostealer delivery via phishing impersonating F5 or other security vendor updates.</li> <li><strong>ATT&amp;CK Techniques to Monitor:</strong></li> </ul> <ul> <li>T1190 (SharePoint Exploitation) &mdash; Audit SharePoint instances for exploitation attempts and unauthorized access</li> <li>T1566.001 (Spearphishing) &mdash; Monitor for emails impersonating F5 Networks, Fortinet, or other security vendors with executable attachments</li> <li>T1485 (Data Destruction) &mdash; <strong>Pre-position wiper detection</strong>: alert on mass file deletion, MBR/VBR modification, or volume shadow copy deletion (vssadmin delete shadows)</li> <li>T1583.001 (Domain Acquisition) &mdash; Monitor certificate transparency logs for new domains mimicking seized infrastructure patterns</li> </ul> <ul> <li><strong>Blocking Actions:</strong> Block the following seized domains (and monitor for DNS resolution attempts, which indicate compromised endpoints trying to phone home):</li> </ul> <ul> <li>Handala-Hack[.]to</li> <li>Karmabelow80[.]org</li> <li>Justicehomeland[.]org</li> <li>Handala-Redwanted[.]to</li> </ul> <ol start="4"> <li><strong> Wiper Readiness Posture</strong></li> </ol> <ul> <li><strong>Hunt Hypothesis:</strong> If ceasefire collapses, Iranian actors will deploy destructive wipers within 24&ndash;48 hours against pre-positioned footholds.</li> <li><strong>Pre-Incident Detection:</strong></li> </ul> <ul> <li>T1486 (Data Encrypted for Impact) &mdash; Ensure ransomware/wiper canary files are deployed across critical file shares</li> <li>T1529 (System Shutdown/Reboot) &mdash; Alert on unexpected mass reboots across infrastructure</li> <li>T1542.001 (System Firmware Modification) &mdash; Monitor for BIOS/UEFI integrity changes</li> </ul> <ul> <li><strong>Preparation:</strong> Verify offline backup integrity <strong>today</strong>. Confirm backup restoration procedures are tested and documented. Ensure incident response retainer is active and provider is briefed on Iranian wiper TTPs.</li> </ul> <ol start="5"> <li><strong> Russia-Iran Infrastructure Overlap</strong></li> </ol> <ul> <li><strong>Hunt Hypothesis:</strong> Russian APT infrastructure operating from Iranian ASN space may be used for reconnaissance or access operations against Western targets.</li> <li><strong>IOC to Monitor:</strong>172.94.9[.]253 (APT28-tagged, Iranian ASN 213790) &mdash; monitor for any connections to/from this IP in network telemetry</li> </ul> <h3><strong>Hunting Queries to Deploy This Week</strong></h3> <table> <thead> <tr> <th> <p>Hunt</p> </th> <th> <p>Data Source</p> </th> <th> <p>What to Look For</p> </th> </tr> </thead> <tbody> <tr> <td> <p>Deno runtime execution</p> </td> <td> <p>EDR / process telemetry</p> </td> <td> <p>deno.exe, deno process, or Deno-related command-line arguments on any endpoint</p> </td> </tr> <tr> <td> <p>Teams external lure delivery</p> </td> <td> <p>M365 audit logs</p> </td> <td> <p>External tenant messages containing URLs to uncategorized or newly registered domains</p> </td> </tr> <tr> <td> <p>PLC unauthorized access</p> </td> <td> <p>OT network monitoring / firewall logs</p> </td> <td> <p>Any external IP connecting to ports 44818, 2222, 102, 502</p> </td> </tr> <tr> <td> <p>Webshell persistence (DIB hunt)</p> </td> <td> <p>Web server logs, file integrity monitoring</p> </td> <td> <p>ASPXSPY, ANTAK, TUNNA, CHOPPER, REGEORG webshells; files with Farsi names (kharpedar, nanash, arbab)</p> </td> </tr> <tr> <td> <p>Rhadamanthys infostealer</p> </td> <td> <p>EDR / sandbox</p> </td> <td> <p>Rhadamanthys behavioral signatures; phishing attachments impersonating F5 updates</p> </td> </tr> <tr> <td> <p>Wiper precursors</p> </td> <td> <p>EDR / Windows event logs</p> </td> <td> <p>vssadmin delete shadows, mass file rename/overwrite, MBR write attempts, bcdedit modifications</p> </td> </tr> </tbody> </table> <h2><strong>Sector-Specific Defensive Priorities</strong></h2> <h3><strong>Financial Services</strong></h3> <p>Iranian actors have historically targeted financial institutions for both espionage and disruption (the 2012&ndash;2013 Operation Ababil DDoS campaign against US banks set the precedent). In the current conflict:</p> <ul> <li><strong>Primary threat:</strong> MuddyWater espionage via Teams social engineering and DinDoor backdoor. Financial sector employees are high-value targets for credential harvesting.</li> <li><strong>Secondary threat:</strong> Pro-Iran hacktivist DDoS against customer-facing platforms (following the Bluesky pattern).</li> <li><strong>Actions:</strong></li> </ul> <ul> <li>Restrict Microsoft Teams external federation to approved partner tenants only</li> <li>Ensure DDoS mitigation services are active and tested for customer-facing web applications and APIs</li> <li>Monitor for Rhadamanthys infostealer indicators &mdash; financial credentials are a primary target for commercial infostealers</li> <li>Review SWIFT and core banking system access logs for anomalous authentication patterns</li> </ul> <h3><strong>Energy</strong></h3> <p>Energy is the <strong>highest-risk sector</strong> in this threat environment. Iranian actors are actively exploiting PLCs in energy facilities per CISA AA26-097A.</p> <ul> <li><strong>Primary threat:</strong> CyberAv3ngers and affiliated actors exploiting Rockwell/Allen-Bradley PLCs &mdash; active process interference, not theoretical.</li> <li><strong>Secondary threat:</strong> MuddyWater/APT34 espionage targeting energy sector networks for intelligence collection and potential pre-positioning.</li> <li><strong>Actions:</strong></li> </ul> <ul> <li><strong>Immediately</strong> audit all PLCs for internet exposure and remove any direct internet-facing configurations</li> <li>Deploy monitoring on ports 44818, 2222, 102, 502 at OT network boundaries</li> <li>Verify OT/IT network segmentation &mdash; the current Iranian campaign exploits architectural exposure, not zero-days. Segmentation is the primary mitigation</li> <li>Compare PLC logic against known-good baselines; any deviation is a compromise indicator</li> <li>Ensure Safety Instrumented Systems (SIS) are independent of compromised PLC networks</li> <li>Pre-position incident response for OT environments &mdash; general IT IR teams may lack ICS expertise</li> </ul> <h3><strong>Healthcare</strong></h3> <p>Healthcare organizations face collateral risk from both targeted espionage and wiper deployment:</p> <ul> <li><strong>Primary threat:</strong> Void Manticore (Handala/Karma/Homeland Justice) has deployed wipers against civilian infrastructure historically. Healthcare is a high-impact target if escalation occurs.</li> <li><strong>Secondary threat:</strong> Rhadamanthys infostealer targeting healthcare credentials and patient data.</li> <li><strong>Actions:</strong></li> </ul> <ul> <li>Verify offline backup integrity for electronic health record (EHR) systems <strong>today</strong></li> <li>Ensure wiper detection canaries are deployed on critical file shares</li> <li>Patch Microsoft SharePoint instances &mdash; Void Manticore uses SharePoint exploitation for initial access</li> <li>Review and restrict administrative access to medical device networks</li> <li>Activate or confirm incident response retainer with a provider experienced in healthcare environments</li> </ul> <h3><strong>Government</strong></h3> <p>Government networks are the primary target for Iranian espionage operations and the most likely target for retaliatory cyber operations if the ceasefire collapses:</p> <ul> <li><strong>Primary threat:</strong> MuddyWater DinDoor/DinoDance espionage via Teams social engineering &mdash; government employees are the highest-priority targets.</li> <li><strong>Secondary threat:</strong> APT42/Charming Kitten credential harvesting targeting policy officials and diplomats involved in ceasefire negotiations.</li> <li><strong>Tertiary threat:</strong> Wiper deployment against government systems upon ceasefire collapse.</li> <li><strong>Actions:</strong></li> </ul> <ul> <li>Deploy Microsoft Teams external message monitoring and restrict external federation</li> <li>Block DinDoor C2 domains at all network egress points</li> <li>Conduct proactive threat hunt for Iranian webshell persistence (ASPXSPY, ANTAK, TUNNA, CHOPPER, REGEORG)</li> <li>Brief personnel involved in Iran policy/negotiations on APT42 credential harvesting TTPs</li> <li>Ensure continuity of operations (COOP) plans account for destructive cyberattack scenario</li> </ul> <h3><strong>Aviation and Logistics</strong></h3> <p>The defense industrial base and aviation/logistics sectors face a unique risk profile &mdash; the 52-day intelligence gap on APT33/Peach Sandstorm activity:</p> <ul> <li><strong>Primary threat:</strong> APT33/Refined Kitten is the primary DIB-targeting actor and has been <strong>silent for 52 days</strong> despite active conflict. This absence is assessed as potentially indicating pre-positioned dormant access rather than operational pause.</li> <li><strong>Secondary threat:</strong> UNC1549/Imperial Kitten targeting aerospace and defense in the Middle East.</li> <li><strong>Actions:</strong></li> </ul> <ul> <li><strong>Immediately</strong> initiate threat hunt for APT33 indicators: dormant webshells, Farsi-named artifacts, unauthorized VPN access, anomalous service accounts</li> <li>Audit all internet-facing VPN appliances and remote access infrastructure &mdash; Pioneer Kitten/UNC757 specializes in VPN exploitation and access brokering</li> <li>Review supply chain access: audit contractor VPN accounts, third-party remote access sessions, and privileged access from external entities</li> <li>Monitor for data staging and exfiltration indicators &mdash; APT33's historical objective is intellectual property theft from aerospace and defense contractors</li> </ul> <h2><strong>Prioritized Defense Recommendations</strong></h2> <h3><strong>IMMEDIATE (Within 24 Hours)</strong></h3> <table> <thead> <tr> <th> <p>Priority</p> </th> <th> <p>Owner</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p>1</p> </td> <td> <p>IT Ops / OT</p> </td> <td> <p>Audit ALL Rockwell Automation/Allen-Bradley PLCs for internet exposure. Monitor ports 44818, 2222, 102, 502 for unauthorized connections. Remove any PLC with direct internet-facing configuration per CISA AA26-097A</p> </td> </tr> <tr> <td> <p>2</p> </td> <td> <p>SOC</p> </td> <td> <p>Block seized MOIS domains: Handala-Hack[.]to, Karmabelow80[.]org, Justicehomeland[.]org, Handala-Redwanted[.]to. Monitor for DNS resolution attempts (indicates compromised endpoint)</p> </td> </tr> <tr> <td> <p>3</p> </td> <td> <p>SOC</p> </td> <td> <p>Monitor for APT28-tagged IP 172.94.9[.]253 in all network telemetry</p> </td> </tr> <tr> <td> <p>4</p> </td> <td> <p>IT Ops</p> </td> <td> <p>Verify offline backup integrity for all critical systems. Confirm restoration procedures are tested. This is wiper preparedness &mdash; not routine maintenance</p> </td> </tr> <tr> <td> <p>5</p> </td> <td> <p>CISO / IR</p> </td> <td> <p>Confirm incident response retainer is active and provider is briefed on Iranian wiper TTPs (BiBiWiper, ZeroShred, GoneXML behavioral patterns)</p> </td> </tr> </tbody> </table> <h3><strong>7-DAY</strong></h3> <table> <thead> <tr> <th> <p>Priority</p> </th> <th> <p>Owner</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p>1</p> </td> <td> <p>SOC / M365 Admin</p> </td> <td> <p>Deploy Microsoft Teams external message monitoring rules. Detect MuddyWater social engineering via Teams &mdash; DinDoor/DinoDance delivery uses Teams as initial lure vector. Consider restricting external federation to approved tenants</p> </td> </tr> <tr> <td> <p>2</p> </td> <td> <p>IT Ops / Network</p> </td> <td> <p>Audit Cisco, Juniper, Fortinet, MikroTik firmware versions across all network infrastructure. Verify firmware integrity against vendor-published hashes. Iranian backdoor claims are unverified but firmware hygiene is prudent</p> </td> </tr> <tr> <td> <p>3</p> </td> <td> <p>CTI / Hunt Team</p> </td> <td> <p>Execute proactive threat hunt for APT33/Peach Sandstorm in DIB and aerospace networks. Focus on dormant webshells (ASPXSPY, ANTAK, TUNNA, CHOPPER, REGEORG) and Farsi-named artifacts. 52 days of silence during active conflict is anomalous</p> </td> </tr> <tr> <td> <p>4</p> </td> <td> <p>SOC</p> </td> <td> <p>Deploy Deno runtime detection across all endpoints &mdash; alert on any deno.exe or Deno-related process execution</p> </td> </tr> <tr> <td> <p>5</p> </td> <td> <p>IT Ops</p> </td> <td> <p>Patch all Microsoft SharePoint instances &mdash; Void Manticore uses SharePoint exploitation for initial access</p> </td> </tr> </tbody> </table> <h3><strong>30-DAY</strong></h3> <table> <thead> <tr> <th> <p>Priority</p> </th> <th> <p>Owner</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p>1</p> </td> <td> <p>CISO / OT Engineering</p> </td> <td> <p>Commission assessment of OT network segmentation posture across all facilities with Rockwell/Allen-Bradley PLCs. Current Iranian campaign exploits architectural exposure, not zero-days &mdash; segmentation is the primary strategic mitigation</p> </td> </tr> <tr> <td> <p>2</p> </td> <td> <p>CISO / Executive</p> </td> <td> <p>Conduct tabletop exercise simulating ceasefire collapse + coordinated Iranian wiper deployment against IT and OT environments simultaneously. Test COOP activation, backup restoration, OT manual override procedures</p> </td> </tr> <tr> <td> <p>3</p> </td> <td> <p>CISO / Legal</p> </td> <td> <p>Review cyber insurance policy coverage for state-sponsored destructive attacks. Confirm "act of war" exclusion language and whether current conflict triggers exclusions</p> </td> </tr> <tr> <td> <p>4</p> </td> <td> <p>CTI</p> </td> <td> <p>Develop collection plan for monitoring Iran's "Internet Pro" / White SIM selective access architecture &mdash; identify observable traffic patterns that could reveal Iranian APT C2 maintaining connectivity during the ongoing internet blackout</p> </td> </tr> <tr> <td> <p>5</p> </td> <td> <p>CISO / Supply Chain</p> </td> <td> <p>Audit all npm/Node.js dependencies in production applications following CISA advisory on Axios supply chain compromise. Pin critical dependencies to verified commit SHAs</p> </td> </tr> </tbody> </table> <h2><strong>The Bottom Line&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <p>Two days from now, the ceasefire expires. Cyber was never included in it.</p> <p>Iran's two cyber commands &mdash; IRGC and MOIS &mdash; are operating at full tempo. MuddyWater registered fresh C2 infrastructure <em>today</em>. CyberAv3ngers are actively manipulating PLCs in US water and energy facilities <em>right now</em>. The MOIS operation behind Handala, Karma, and Homeland Justice has been unmasked as a single coordinated actor with confirmed wiper capability that it is choosing &mdash; for the moment &mdash; not to use.</p> <p>That restraint is the most important signal in this entire assessment. Iran possesses the capability to deploy destructive wipers against critical infrastructure. It has done so before &mdash; against Albania in 2022, against Israel in 2023 and 2024. The decision not to deploy wipers during the ceasefire is a calculated choice, not a capability gap. And calculated choices can be reversed in hours.</p> <p>The 52-day silence from APT33 against defense industrial base targets is the second most important signal. During an active armed conflict, the absence of visible activity from Iran's primary DIB-targeting group is not reassuring &mdash; it is alarming. Pre-positioned access is invisible until it activates.</p> <p>The ceasefire bought time. Use it.</p>

FEATURED RESOURCES

April 21, 2026
Anomali Cyber Watch

Iran's Cyber War Didn't Stop When the Ceasefire Started — And the Next 72 Hours Are Critical

Read More
April 21, 2026
Anomali Cyber Watch
Public Sector

When Supply Chains, Zero-Days, and Ransomware Converge: A Threat Briefing for State Government IT Leaders

Read More
April 20, 2026
Anomali Cyber Watch

Iran’s Cyber War Didn’t Stop When the Bombs Did — Why the Ceasefire Is the Most Dangerous Phase Yet

Read More
Explore All