All Posts
Anomali Cyber Watch
1
min read

Iran's Cyber War Enters a New Phase: State-directed Destruction, Synchronized Strikes, and the 24-Hour Reconstitution Problem

Published on
March 23, 2026
Table of Contents
<table> <tbody> <tr> <td> <p><strong>Threat Assessment Level: CRITICAL</strong><em>(Maintained from prior assessment. Justification: Three converging developments - USG formal attribution of Handala to the Iranian government, Iran's first confirmed synchronized kinetic-cyber-IO triad strike, and an explicit IRGC conditional threat against global technology centers - sustain the highest threat level. No evidence supports a downgrade.)</em></p> </td> </tr> </tbody> </table> <p>Twenty-two days into the US-Israel-Iran kinetic conflict that began with Operation Epic Fury on 28 February 2026, the cyber dimension of this war has crossed a threshold that every security leader needs to understand. Iran's cyber operations are no longer deniable, no longer improvised, and no longer limited to the immediate theater of conflict. They are state-directed, pre-planned, globally scoped, and accelerating.</p> <p>This week delivered three developments that, taken together, represent the most significant shift in the Iranian cyber threat since hostilities began: the US government officially attributed the Handala hacktivist group to Iran's Ministry of Intelligence and Security (MOIS), confirming what analysts long suspected - these are not independent activists but state-directed operators. Iran executed its first publicly confirmed synchronized missile, cyber, and information operation strike against Israel. And the Islamic Revolutionary Guard Corps (IRGC) issued an explicit conditional threat to strike "global tech centers" if Iranian power plants are targeted.</p> <p>If your organization touches US critical infrastructure, defense, healthcare, energy, financial services, or cloud technology - or if you operate in Israel, the EU, or the Gulf states - this is your threat environment now.</p> <h2><strong>What Changed This Week</strong></h2> <p>The period of 18-22 March 2026 produced a rapid sequence of escalatory events that fundamentally altered the operational picture.</p> <p><strong>Handala: From "Hacktivist" to Confirmed State Weapon.</strong> On 19 March, the FBI seized two domains used by Handala (also tracked as UNC5203, Void Manticore, and Red Sandstorm) for its data leak operations following the devastating wiper attack on US medical device manufacturer Stryker - an attack that destroyed approximately 80,000 endpoints and exfiltrated 50 terabytes of data. On 20 March, the Department of Justice formally attributed Handala to the Iranian government - specifically to MOIS - for the first time, collapsing the "faketavist" model that had provided Iran plausible deniability. By 21 March - less than 24 hours after the FBI takedown - Handala had reconstituted its online presence on pre-staged infrastructure. The message was unmistakable: state resources mean state resilience.</p> <p><strong>The Triad Strike.</strong> On 19 March, Iran launched a simultaneous missile strike, cyberattack, and disinformation campaign targeting Israel. This is the first publicly confirmed instance of Iran executing a synchronized kinetic-cyber-information operations triad in this conflict. The doctrine that analysts have been tracking since Day 1 is now operational reality, not theoretical planning.</p> <p><strong>The IRGC Conditional Threat.</strong> On 22 March, the IRGC issued an explicit warning: "Global tech centers will be hit if Iran's power plants are attacked." This follows US and Israeli strikes that have already destroyed critical water supply networks and struck the South Pars gas field - the world's largest natural gas reserve. The trajectory of kinetic escalation (water &rarr; energy &rarr; potentially power) makes this conditional trigger increasingly plausible. "Global tech centers" could mean cloud data centers, semiconductor fabrication facilities, or internet exchange points.</p> <p><strong>Ireland Spillover.</strong> Ireland's National Cyber Security Centre warned on 22 March that Iran-linked cyber activity poses a direct threat to Irish organizations, citing Stryker's Cork-based manufacturing and R&amp;D operations as proof of concept. The Handala wiper attack on Stryker's US headquarters propagated to its Irish facilities - demonstrating that Iranian actors will follow US companies' global footprint. This is no longer a US-Israel problem. It is a transatlantic problem.</p> <p><strong>Pre-Positioned Infrastructure Confirmed.</strong> SecurityWeek published analysis on 19 March confirming that Iranian hackers built strike-ready cyber infrastructure - command-and-control servers, credential harvesting platforms, and wiper deployment mechanisms - months before Operation Epic Fury began. Current operations are executing pre-planned playbooks, not improvised responses.</p> <p><strong>MuddyWater Deploys AI-Assisted Malware.</strong> Unit 42 reported on 18 March that MOIS-affiliated MuddyWater has deployed four new AI-assisted malware families - BlackBeard, LampoRAT, Nuso, and UDPGangster - targeting Gulf diplomatic and energy organizations. AI-assisted development accelerates iteration cycles and produces more evasive payloads, raising the bar for detection.</p> <p><strong>Cyber Av3ngers Go Silent.</strong> The IRGC-CEC-affiliated Cyber Av3ngers - known for ICS/OT attacks including the 2023 Pennsylvania water authority incident - have been operationally silent for 22+ consecutive days during the most intense period of the conflict. This anomalous absence, coinciding with seven new Schneider Electric ICS advisories from CISA, is assessed as the highest-priority absence signal in the current threat landscape.</p> <p><strong>MOIS-Cybercrime Convergence Confirmed.</strong> Reporting from Dark Reading (12 March) confirmed that MOIS-affiliated actors are actively colluding with ransomware and malware-as-a-service operators, blurring the line between state espionage and criminal extortion and complicating attribution for defenders.</p> <p><strong>Critical Vulnerabilities Under Active Exploitation.</strong> CVE-2026-1340 (Ivanti EPMM RCE, CVSS 9.8) and CVE-2026-20963 (SharePoint RCE, CVSS 8.8) are confirmed actively exploited. The Storm-2561 SEO poisoning campaign is distributing fake VPN installers via GitHub to harvest enterprise credentials. Immediate patching is required.</p> <h2><strong>Conflict &amp; Threat Timeline</strong></h2> <table> <thead> <tr> <th> <p><strong>Date</strong></p> </th> <th> <p><strong>Event</strong></p> </th> <th> <p><strong>Significance</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p>28 Feb 2026</p> </td> <td> <p>Operation Epic Fury / Roaring Lion begins</p> </td> <td> <p>US-Israel kinetic operations against Iran commence; cyber conflict activates</p> </td> </tr> <tr> <td> <p>~1 Mar 2026</p> </td> <td> <p>Cyber Av3ngers (IRGC-CEC-affiliated) last confirmed activity</p> </td> <td> <p>ICS/OT-focused group goes silent - now 22+ consecutive days</p> </td> </tr> <tr> <td> <p>5 Mar 2026</p> </td> <td> <p>GMI reports 2,000-3,000 cyber attacks per minute</p> </td> <td> <p>Establishes scale of cyber conflict</p> </td> </tr> <tr> <td> <p>~8 Mar 2026</p> </td> <td> <p>Reported IDF strike on IRGC cyber headquarters</p> </td> <td> <p>Possible cause of Cyber Av3ngers operational disruption</p> </td> </tr> <tr> <td> <p>10 Mar 2026</p> </td> <td> <p>Nextgov reports Russian-linked groups joining Iran's cyber front</p> </td> <td> <p>Cross-state cyber alliance forming; impact assessed as "murky"</p> </td> </tr> <tr> <td> <p>12 Mar 2026</p> </td> <td> <p>Microsoft publishes Storm-2561 SEO poisoning campaign</p> </td> <td> <p>Fake VPN installers (Fortinet, Ivanti, Cisco) distributing Hyrax credential stealer</p> </td> </tr> <tr> <td> <p>12 Mar 2026</p> </td> <td> <p>Dark Reading reports MOIS-cybercrime convergence</p> </td> <td> <p>Iranian state actors colluding with ransomware and malware-as-a-service operators</p> </td> </tr> <tr> <td> <p>16 Mar 2026</p> </td> <td> <p>Akamai reports 245% increase in cybercrime since conflict began</p> </td> <td> <p>Quantifies the operational noise environment</p> </td> </tr> <tr> <td> <p>18 Mar 2026</p> </td> <td> <p>Unit 42 publishes MuddyWater AI-assisted malware findings</p> </td> <td> <p>Four new families: BlackBeard, LampoRAT, Nuso, UDPGangster targeting Gulf diplomatic/energy</p> </td> </tr> <tr> <td> <p>18 Mar 2026</p> </td> <td> <p>US/Israeli strikes hit South Pars gas field</p> </td> <td> <p>Escalation of kinetic targeting to energy infrastructure</p> </td> </tr> <tr> <td> <p>19 Mar 2026</p> </td> <td> <p>Iran executes synchronized missile + cyber + IO triad strike</p> </td> <td> <p>First confirmed kinetic-cyber-IO synchronization in this conflict</p> </td> </tr> <tr> <td> <p>19 Mar 2026</p> </td> <td> <p>FBI seizes two Handala domains</p> </td> <td> <p>Disruption attempt against MOIS-directed leak operations</p> </td> </tr> <tr> <td> <p>19 Mar 2026</p> </td> <td> <p>SecurityWeek confirms pre-positioned Iranian cyber infrastructure</p> </td> <td> <p>Current ops are pre-planned, not improvised</p> </td> </tr> <tr> <td> <p>19 Mar 2026</p> </td> <td> <p>CISA adds CVE-2026-20963 (SharePoint RCE) to KEV</p> </td> <td> <p>Active exploitation confirmed</p> </td> </tr> <tr> <td> <p>19 Mar 2026</p> </td> <td> <p>CISA releases 7 ICS advisories (Schneider, Mitsubishi, others)</p> </td> <td> <p>Schneider Modicon/EcoStruxure advisories relevant to Iranian ICS targeting history</p> </td> </tr> <tr> <td> <p>20 Mar 2026</p> </td> <td> <p>DOJ formally attributes Handala to Iranian government (MOIS)</p> </td> <td> <p>"Faketavist" model collapses; state direction confirmed</p> </td> </tr> <tr> <td> <p>20 Mar 2026</p> </td> <td> <p>CISA adds 5 new entries to Known Exploited Vulnerabilities catalog</p> </td> <td> <p>Expanding active exploitation landscape</p> </td> </tr> <tr> <td> <p>21 Mar 2026</p> </td> <td> <p>Handala reconstitutes on new infrastructure (~24 hours post-seizure)</p> </td> <td> <p>Demonstrates state-backed resilience and pre-staged fallback infrastructure</p> </td> </tr> <tr> <td> <p>22 Mar 2026</p> </td> <td> <p>IRGC threatens "global tech centers" if power plants attacked</p> </td> <td> <p>New conditional escalation trigger; names cloud/tech infrastructure as targets</p> </td> </tr> <tr> <td> <p>22 Mar 2026</p> </td> <td> <p>US/Israeli strikes destroy critical water supply networks</p> </td> <td> <p>Further kinetic escalation increases retaliatory calculus</p> </td> </tr> <tr> <td> <p>22 Mar 2026</p> </td> <td> <p>Ireland NCSC warns of Iran spillover to EU organizations</p> </td> <td> <p>Geographic expansion of cyber conflict effects to Western Europe</p> </td> </tr> </tbody> </table> <h2><strong>Key Threat Analysis&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2> <h3><strong>The Handala Problem: State-Directed Destruction with Built-In Resilience</strong></h3> <p>Handala - now officially attributed to Iran's MOIS and tracked under multiple designations including UNC5203 (Mandiant), Void Manticore (Check Point), and Red Sandstorm (Microsoft) - represents the most operationally active destructive threat in this conflict. The Stryker attack demonstrated capabilities across the full kill chain: initial access, lateral movement, mass data exfiltration (50TB), and wiper deployment across approximately 80,000 endpoints.</p> <p>The 24-hour reconstitution after FBI domain seizure is the detail that should concern CISOs most. It means Handala maintains pre-staged fallback infrastructure - domains, hosting, and communication channels ready to activate when primary infrastructure is disrupted. This is not the behavior of an independent hacktivist collective. This is state-resourced operational planning with redundancy built in.</p> <p>The Stryker attack also demonstrated geographic reach: effects propagated from US headquarters to Cork, Ireland, prompting Ireland's NCSC to issue a national warning. Any organization with a global footprint should assume that a compromise of one facility can cascade internationally.</p> <p><strong>Key TTPs:</strong> Data Destruction (T1485), Data Encrypted for Impact (T1486), Exfiltration Over Web Service (T1567.002), Acquire Infrastructure: Domains (T1583.001), External Defacement (T1491.002)</p> <h3><strong>MuddyWater's AI-Assisted Evolution</strong></h3> <p>MuddyWater (also tracked as TEMP.Zagros, Mercury, Seedworm, and Static Kitten), an MOIS-affiliated espionage group, was the subject of a Unit 42 report on 18 March revealing deployment of four AI-assisted malware families: <strong>BlackBeard</strong>, <strong>LampoRAT</strong>, <strong>Nuso</strong>, and <strong>UDPGangster</strong>. These tools are targeting Gulf diplomatic and energy organizations. The use of AI-assisted development suggests faster iteration cycles and potentially more evasive payloads. MuddyWater's ThreatStream profile was updated as recently as 22 March, indicating ongoing operational activity.</p> <h3><strong>The Cyber Av3ngers Silence: The Loudest Signal in the Conflict</strong></h3> <p>The IRGC-CEC-affiliated group Cyber Av3ngers (also tracked as HYDRO KITTEN) - known for targeting industrial control systems, including the November 2023 attack on Unitronics PLCs at a Pennsylvania water authority - has been silent for 22+ consecutive days during the most intense period of the conflict. This is the highest-priority absence signal in the current threat landscape.</p> <p>Three explanations are possible, and none of them are reassuring:</p> <ol> <li><strong>Capability degradation</strong> from the reported ~8 March IDF strike on IRGC cyber headquarters - their operational capacity may be temporarily diminished.</li> <li><strong>Operational security tightening</strong> before a major ICS/OT operation - silence before the storm.</li> <li><strong>Pivot to supporting state APT operations</strong> rather than conducting independent hacktivist-style attacks - their capabilities may be folded into more sophisticated campaigns.</li> </ol> <p>Given the IRGC's explicit threat against "global tech centers" and the seven new ICS advisories CISA released on 19 March (including multiple Schneider Electric Modicon and EcoStruxure vulnerabilities), the possibility of a coordinated ICS/OT attack timed to a kinetic escalation event cannot be dismissed.</p> <h3><strong>The MOIS-Cybercrime Convergence</strong></h3> <p>Reporting from Dark Reading (12 March) and The Register (10 March) confirms that MOIS-affiliated actors are actively colluding with ransomware and malware-as-a-service operators. This convergence blurs the line between state espionage and criminal extortion, creating a dual-threat model: the same intrusion may serve both intelligence collection and financial objectives. For defenders, this means that what initially appears to be a routine ransomware incident may in fact be a state-directed operation - and vice versa.</p> <h3><strong>Critical Vulnerabilities Under Active Exploitation</strong></h3> <p>Two vulnerabilities demand immediate attention:</p> <ul> <li><strong>CVE-2026-1340</strong> - Ivanti Endpoint Manager Mobile (EPMM) Remote Code Execution, CVSS 9.8. A single threat actor is responsible for 83% of exploitation activity against this vulnerability. Given Iranian actors' documented preference for targeting VPN and edge devices (Fox Kitten/Lemon Sandstorm, APT34/OilRig), this vulnerability is squarely in the Iranian targeting envelope.</li> <li><strong>CVE-2026-20963</strong> - Microsoft SharePoint Remote Code Execution, CVSS 8.8. Added to CISA's Known Exploited Vulnerabilities catalog on 19 March with confirmed active exploitation.</li> </ul> <p>Additionally, the <strong>Storm-2561</strong> campaign (reported by Microsoft on 12 March) is using SEO poisoning to distribute fake VPN client installers impersonating Fortinet, Ivanti, and Cisco products via GitHub repositories. The campaign deploys <strong>Hyrax</strong> malware, which steals enterprise VPN credentials - providing initial access for follow-on operations.</p> <h3><strong>Russian Amplification: An Uncertain but Watched Variable</strong></h3> <p>Nextgov reported on 10 March that Russian-linked collectives have appeared on Iran's cyber front, though analysts offered mixed assessments of their actual impact. Twelve days later, no significant follow-up reporting has emerged. However, one data point warrants attention: a ThreatStream-tracked IP address (172.94.9[.]245) carries both APT28 (Russian) attribution tags and is associated with Iranian operational infrastructure. This could indicate infrastructure sharing between Russian and Iranian actors, misattribution, or proxy usage. It remains under investigation but underscores the potential for cross-state cyber cooperation.</p> <h2><strong>Predictive Analysis: What Comes Next</strong></h2> <p>Based on the trajectory of the conflict, confirmed capabilities, and stated intentions, the following assessments cover the next 7-14 days:</p> <table> <thead> <tr> <th> <p><strong>Scenario</strong></p> </th> <th> <p><strong>Probability</strong></p> </th> <th> <p><strong>Basis</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p>Handala or affiliated MOIS group conducts another destructive operation against a US or allied organization</p> </td> <td> <p><strong>70-75%</strong></p> </td> <td> <p>24-hour reconstitution demonstrates unbroken operational tempo; state backing confirmed; target-rich environment of US critical infrastructure and DIB</p> </td> </tr> <tr> <td> <p>CISA adds additional KEV entries related to Iranian exploitation of edge devices</p> </td> <td> <p><strong>70%</strong></p> </td> <td> <p>CVE-2026-1340 exploitation is intensifying; Storm-2561 campaign actively harvesting VPN credentials; Iranian actors historically chain edge device exploits</p> </td> </tr> <tr> <td> <p>Cyber Av3ngers break silence with an ICS/OT-focused operation</p> </td> <td> <p><strong>45-50%</strong></p> </td> <td> <p>Extended silence during peak escalation is anomalous; IRGC has explicitly threatened infrastructure retaliation; 7 new ICS advisories provide fresh attack surface</p> </td> </tr> <tr> <td> <p>Retaliatory cyber strikes on cloud/hosting infrastructure following kinetic escalation to Iranian power plants</p> </td> <td> <p><strong>35-40%</strong></p> </td> <td> <p>IRGC has stated this as explicit doctrine; kinetic targeting trajectory is escalating (water &rarr; gas &rarr; potentially power); pre-positioned infrastructure confirmed</p> </td> </tr> <tr> <td> <p>Iranian actors target EU-based subsidiaries of US companies as softer entry points</p> </td> <td> <p><strong>55-60%</strong></p> </td> <td> <p>Ireland spillover from Stryker demonstrates the model; EU subsidiaries may have weaker security postures than US headquarters; MOIS has demonstrated willingness to follow global footprints</p> </td> </tr> <tr> <td> <p>MuddyWater AI-assisted malware families appear in campaigns beyond Gulf targets</p> </td> <td> <p><strong>40-45%</strong></p> </td> <td> <p>BlackBeard, LampoRAT, Nuso, and UDPGangster are newly deployed; AI-assisted development enables rapid retargeting; MuddyWater historically expands targeting during escalation periods</p> </td> </tr> </tbody> </table> <h2><strong>SOC Operational Guidance&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <h3><strong>What to Monitor</strong></h3> <p><strong>Network Telemetry:</strong></p> <ul> <li>Outbound connections to Iranian ASNs (AS42337/Respina Networks, AS25184/AFRANET, AS202468/ArvanCloud, AS58224/Telecom Esfahan) - these hosted confirmed C2 infrastructure in this collection cycle</li> <li>Cobalt Strike beacon traffic on port 443, particularly to 188.121.123[.]185 (ArvanCloud, Tehran) - <strong>T1071.001 (Application Layer Protocol: Web Protocols)</strong></li> <li>AsyncRAT C2 communications to 91.231.222[.]220 (Go Host, Tehran) - <strong>T1095 (Non-Application Layer Protocol)</strong></li> <li>DNS queries for newly registered domains containing "handala," "banished," or known Handala-associated keywords - <strong>T1583.001 (Acquire Infrastructure: Domains)</strong></li> <li>Anomalous VPN client downloads from GitHub repositories - Storm-2561 indicator - <strong>T1189 (Drive-by Compromise)</strong>, <strong>T1608.004 (Stage Capabilities: Drive-By Target)</strong></li> </ul> <p><strong>Identity &amp; Access:</strong></p> <ul> <li>OAuth consent grant anomalies in Microsoft Entra ID / Azure AD - look for third-party applications requesting Mail.Read, Files.ReadWrite.All, or Directory.Read.All permissions without business justification - <strong>T1550.001 (Use Alternate Authentication Material: Application Access Token)</strong></li> <li>Bulk credential harvesting indicators: high-volume failed authentication attempts followed by successful logins from new geolocations, particularly Middle Eastern IP ranges - <strong>T1110 (Brute Force)</strong></li> <li>Spearphishing campaigns using war-themed lures (Iran conflict news, casualty reports, policy briefings) - <strong>T1566.002 (Phishing: Spearphishing Link)</strong></li> </ul> <p><strong>Endpoint:</strong></p> <ul> <li>Wiper indicators: mass file deletion or encryption events, MBR/VBR modification, volume shadow copy deletion (vssadmin delete shadows) - <strong>T1485 (Data Destruction)</strong>, <strong>T1490 (Inhibit System Recovery)</strong></li> <li>Execution of unknown binaries from %TEMP% or %APPDATA% directories with network callbacks to the IOCs listed below - <strong>T1204.002 (User Execution: Malicious File)</strong></li> <li>PowerShell or cmd.exe spawning from Office applications (MuddyWater's historical initial access pattern) - <strong>T1059.001 (Command and Scripting Interpreter: PowerShell)</strong></li> </ul> <p><strong>ICS/OT (Critical for Energy, Water, Manufacturing):</strong></p> <ul> <li>Anomalous PLC programming or firmware updates on Schneider Electric Modicon M241/M251/M258/M262 controllers - <strong>T0839 (Module Firmware)</strong> (ICS ATT&amp;CK)</li> <li>Unexpected connections to EcoStruxure engineering workstations from IT network segments - <strong>T0886 (Remote Services)</strong> (ICS ATT&amp;CK)</li> <li>Unitronics PLC default credential usage (Cyber Av3ngers' known TTP from 2023 water utility attacks) - <strong>T0812 (Default Credentials)</strong> (ICS ATT&amp;CK)</li> </ul> <h3><strong>Hunting Hypotheses</strong></h3> <ol> <li><strong>Hypothesis: Pre-positioned Iranian access exists in our environment via compromised edge devices.</strong> Hunt for: Ivanti EPMM instances with indicators of CVE-2026-1340 exploitation; Fortinet/Cisco VPN appliances with unauthorized configuration changes; web shells in DMZ-facing systems. Timeframe: Look back 90 days (pre-conflict staging window).</li> <li><strong>Hypothesis: Storm-2561 fake VPN installers have been downloaded by employees.</strong> Hunt for: Hyrax malware artifacts; VPN client binaries downloaded from GitHub rather than vendor portals; DNS queries to domains associated with SEO-poisoned search results for "Fortinet VPN download" or "Ivanti VPN client."</li> <li><strong>Hypothesis: Handala-style wiper pre-positioning is underway.</strong> Hunt for: Lateral movement patterns consistent with domain-wide access acquisition (DCSync, NTDS.dit extraction); staging of destructive tools in administrative shares; scheduled tasks or GPO modifications that could trigger simultaneous execution across endpoints. <strong>T1003.006 (OS Credential Dumping: DCSync)</strong>, <strong>T1053.005 (Scheduled Task/Job)</strong></li> <li><strong>Hypothesis: OAuth consent phishing has granted unauthorized application access.</strong> Hunt for: Entra ID audit logs showing consent grants to unfamiliar applications in the past 30 days; applications with delegated permissions exceeding their stated purpose; service principals created by non-admin users.</li> </ol> <h3><strong>IOC Blocking Table</strong></h3> <p>The following indicators were collected from validated intelligence feeds during this cycle. Block at perimeter firewalls, add to SIEM correlation rules, and use for retroactive log searches.</p> <table> <thead> <tr> <th> <p><strong>IOC</strong></p> </th> <th> <p><strong>Type</strong></p> </th> <th> <p><strong>Context</strong></p> </th> <th> <p><strong>Confidence</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p>188.121.123[.]185</p> </td> <td> <p>IPv4</p> </td> <td> <p>Cobalt Strike beacon C2, ArvanCloud Tehran (ASN 202468)</p> </td> <td> <p>85</p> </td> </tr> <tr> <td> <p>91.231.222[.]220</p> </td> <td> <p>IPv4</p> </td> <td> <p>AsyncRAT C2, Go Host Tehran (ASN 208191) - corroborated by Recorded Future, ThreatFox, DHS AIS</p> </td> <td> <p>98</p> </td> </tr> <tr> <td> <p>172.94.9[.]245</p> </td> <td> <p>IPv4</p> </td> <td> <p>APT infrastructure (ASN 213790), tagged T1190/T1005/T1071/T1571</p> </td> <td> <p>98</p> </td> </tr> <tr> <td> <p>5.160.228[.]186</p> </td> <td> <p>IPv4</p> </td> <td> <p>Rampant Kitten / TeleSpy malware, Respina Networks Tehran (ASN 42337)</p> </td> <td> <p>77</p> </td> </tr> <tr> <td> <p>62.60.130[.]247</p> </td> <td> <p>IPv4</p> </td> <td> <p>APT proxy infrastructure, Cipher Operations Belgrade (ASN 215930), targeting manufacturing</p> </td> <td> <p>80</p> </td> </tr> <tr> <td> <p>78.109.194[.]114</p> </td> <td> <p>IPv4</p> </td> <td> <p>Operation Cleaver legacy infrastructure, AFRANET Tehran (ASN 25184)</p> </td> <td> <p>90</p> </td> </tr> <tr> <td> <p>185.165.29[.]25</p> </td> <td> <p>IPv4</p> </td> <td> <p>LokiBot distribution, Bushehr ISP</p> </td> <td> <p>85</p> </td> </tr> <tr> <td> <p>37.255.75[.]204</p> </td> <td> <p>IPv4</p> </td> <td> <p>C2/Malware tagged, Telecom Esfahan (ASN 58224)</p> </td> <td> <p>70</p> </td> </tr> <tr> <td> <p>185.161.208[.]123</p> </td> <td> <p>IPv4</p> </td> <td> <p>Iranian threat infrastructure</p> </td> <td> <p>-</p> </td> </tr> <tr> <td> <p>2.176.206[.]42</p> </td> <td> <p>IPv4</p> </td> <td> <p>Iranian threat infrastructure</p> </td> <td> <p>-</p> </td> </tr> </tbody> </table> <p>Additional IOCs (file hashes, domains, URLs) associated with the campaigns discussed in this report are available through Anomali ThreatStream and partner feeds.</p> <h2><strong>Sector-Specific Defensive Priorities</strong></h2> <h3><strong>Financial Services</strong></h3> <p>US banks are explicitly on the target list. American Banker reported that the Iran war has brought the "cyber frontline to US banks," and Virginia Business documented targeted Iranian cyber activity against the US financial sector. Iranian actors - particularly Fox Kitten (Lemon Sandstorm) and APT34 (OilRig) - have historically targeted financial institutions for both espionage and destructive purposes.</p> <ul> <li><strong>Priority 1:</strong> Audit all SWIFT and interbank messaging system access controls. Iranian actors targeted SWIFT infrastructure during Operation Cleaver (2012-2014) and the capability has matured since.</li> <li><strong>Priority 2:</strong> Harden customer-facing web applications against credential harvesting. APT42's TAMECAT/POWERPUG phishing kit campaign (updated 19 March in ThreatStream) is actively harvesting credentials from high-value targets.</li> <li><strong>Priority 3:</strong> Review third-party fintech integrations for OAuth consent anomalies - the ConsentFix technique is designed to exploit trust relationships with financial SaaS platforms.</li> <li><strong>Priority 4:</strong> Ensure DDoS mitigation is active and tested. The synchronized triad strike model (19 March) suggests DDoS may be used as a diversionary component of more destructive operations.</li> </ul> <h3><strong>Energy</strong></h3> <p>The energy sector faces the most acute ICS/OT risk in this conflict. Cyber Av3ngers' historical targeting of Unitronics PLCs, the IRGC's explicit threat against power infrastructure, and seven new Schneider Electric ICS advisories create a convergent threat picture.</p> <ul> <li><strong>Priority 1:</strong> Immediately patch Schneider Electric Modicon M241/M251/M258/M262 and EcoStruxure Automation Expert, PME, and EPO per CISA ICS advisories ICSA-26-078-01 through ICSA-26-078-04.</li> <li><strong>Priority 2:</strong> Verify network segmentation between IT and OT environments. Iranian actors have demonstrated the ability to pivot from IT compromise to OT access.</li> <li><strong>Priority 3:</strong> Audit all remote access to OT environments - disable default credentials on all PLCs, particularly Unitronics devices. Implement multi-factor authentication for all engineering workstation access.</li> <li><strong>Priority 4:</strong> Establish or increase frequency of manual process monitoring. If digital controls are compromised, operators must be able to detect anomalies through physical observation.</li> </ul> <h3><strong>Healthcare</strong></h3> <p>The Stryker attack (attributed to Handala, MOIS-directed) demonstrated that healthcare and medical device manufacturers are priority targets. The attack destroyed 80,000 endpoints and exfiltrated 50TB of data from a company whose products are embedded in hospitals worldwide.</p> <ul> <li><strong>Priority 1:</strong> Inventory all network-connected medical devices and assess exposure to supply chain compromise from manufacturers under active Iranian targeting.</li> <li><strong>Priority 2:</strong> Segment medical device networks from administrative IT networks. Wiper propagation from corporate systems to clinical environments is the nightmare scenario.</li> <li><strong>Priority 3:</strong> Ensure offline backup and recovery procedures are tested for clinical systems. Handala's wiper attacks are designed to maximize operational disruption - recovery time is the critical metric.</li> <li><strong>Priority 4:</strong> Brief clinical staff on phishing campaigns using war-themed lures. Healthcare workers are high-value targets for credential harvesting.</li> </ul> <h3><strong>Government (Federal, State, Local)</strong></h3> <p>Government agencies are targets for both espionage (APT42/CALANQUE, MuddyWater) and destructive operations (Handala). The FBI's Handala domain seizure and DOJ attribution demonstrate that USG is actively engaged, but government networks remain in the crosshairs.</p> <ul> <li><strong>Priority 1:</strong> Enforce CISA's KEV patching mandates - CVE-2026-1340 (Ivanti EPMM, CVSS 9.8) and CVE-2026-20963 (SharePoint RCE, CVSS 8.8) are confirmed actively exploited.</li> <li><strong>Priority 2:</strong> Audit all .gov and .mil domains for indicators of Iranian reconnaissance (T1594 - Search Victim-Owned Websites). Iranian actors conducted pre-conflict reconnaissance months in advance.</li> <li><strong>Priority 3:</strong> Review and restrict OAuth application consent policies in Microsoft 365 / Entra ID environments. Government tenants are high-value targets for ConsentFix-style attacks.</li> <li><strong>Priority 4:</strong> Coordinate with CISA and sector-specific ISACs for real-time threat sharing. The 24-hour Handala reconstitution demonstrates that threat intelligence sharing speed is a critical defensive advantage.</li> </ul> <h3><strong>Aviation &amp; Logistics</strong></h3> <p>Iranian actors have historically targeted aviation and transportation (Operation Cleaver included airline targeting). The conflict's disruption of global shipping routes and airspace creates both physical and cyber risk to this sector.</p> <ul> <li><strong>Priority 1:</strong> Audit all internet-facing booking, cargo management, and flight operations systems for indicators of compromise. Focus on edge devices (VPN, remote access) as initial access vectors.</li> <li><strong>Priority 2:</strong> Review supply chain dependencies on manufacturers or service providers operating in conflict-affected regions. The Stryker/Ireland model demonstrates cascading effects through global supply chains.</li> <li><strong>Priority 3:</strong> Harden operational technology in air traffic management and ground handling systems. Ensure these systems are segmented from corporate IT networks.</li> <li><strong>Priority 4:</strong> Monitor for fake resume and job application lures - ThreatStream tracks an active Iranian campaign using fake resume lures on GitHub to distribute malware targeting aerospace organizations.</li> </ul> <h2><strong>Prioritized Defense Recommendations</strong></h2> <h3><strong>Immediate (Within 24 Hours)</strong></h3> <table> <thead> <tr> <th> <p><strong>Action</strong></p> </th> <th> <p><strong>Owner</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p>Block all 10 Iranian C2/APT IP addresses listed in the IOC table above at perimeter firewalls, proxy, and EDR. Add to SIEM correlation rules for retroactive and real-time alerting.</p> </td> <td> <p>SOC</p> </td> </tr> <tr> <td> <p>Patch CVE-2026-1340 (Ivanti EPMM RCE, CVSS 9.8) on all Ivanti Endpoint Manager Mobile instances. A single actor is responsible for 83% of exploitation.</p> </td> <td> <p>IT Ops / Vulnerability Management</p> </td> </tr> <tr> <td> <p>Patch CVE-2026-20963 (SharePoint RCE, CVSS 8.8) - added to CISA KEV on 19 March with confirmed active exploitation.</p> </td> <td> <p>IT Ops / Vulnerability Management</p> </td> </tr> <tr> <td> <p>Monitor for Handala's reconstituted leak site domains. FBI seizure was 19 March; new domains were operational by 21 March. Watch for new .onion and clearnet domains claiming Handala affiliation.</p> </td> <td> <p>SOC / Threat Intelligence</p> </td> </tr> <tr> <td> <p>Validate that wiper incident response playbooks are current and accessible. Ensure offline backups are verified and air-gapped. The next Handala-style attack could come within days.</p> </td> <td> <p>IR Team / IT Ops</p> </td> </tr> <tr> <td> <p>Brief executive leadership on the IRGC conditional threat against "global tech centers" and the confirmed synchronized kinetic-cyber-IO strike doctrine. Decision-makers need to understand that cyber incidents may coincide with kinetic events.</p> </td> <td> <p>CISO</p> </td> </tr> </tbody> </table> <h3><strong>7-Day Actions</strong></h3> <table> <thead> <tr> <th> <p><strong>Action</strong></p> </th> <th> <p><strong>Owner</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p>Apply Schneider Electric patches for Modicon M241/M251/M258/M262, EcoStruxure Automation Expert, EcoStruxure PME, and EcoStruxure EPO per CISA ICS advisories ICSA-26-078-01 through ICSA-26-078-08.</p> </td> <td> <p>OT Security / Engineering</p> </td> </tr> <tr> <td> <p>Deploy detection rules for Storm-2561 SEO poisoning campaign: fake VPN installers impersonating Fortinet, Ivanti, and Cisco distributed via GitHub repositories; Hyrax malware steals enterprise VPN credentials.</p> </td> <td> <p>SOC / Detection Engineering</p> </td> </tr> <tr> <td> <p>Audit all OAuth consent grants in Microsoft Entra ID / Azure AD. Revoke suspicious third-party application permissions, particularly those requesting Mail.Read, Files.ReadWrite.All, or Directory.Read.All.</p> </td> <td> <p>Identity &amp; Access Management</p> </td> </tr> <tr> <td> <p>Conduct a 90-day retrospective threat hunt for indicators of pre-positioned Iranian access: web shells on DMZ systems, unauthorized VPN appliance configuration changes, anomalous service principal creation in cloud tenants.</p> </td> <td> <p>Threat Hunting / SOC</p> </td> </tr> <tr> <td> <p>Test DDoS mitigation capabilities under load. The synchronized triad strike model means DDoS may be used as a diversion during destructive operations.</p> </td> <td> <p>Network Operations / SOC</p> </td> </tr> </tbody> </table> <h3><strong>30-Day Actions</strong></h3> <table> <thead> <tr> <th> <p><strong>Action</strong></p> </th> <th> <p><strong>Owner</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p>Commission a threat assessment of EU subsidiary exposure. The Ireland spillover from the Stryker attack demonstrates that Iranian actors follow US companies' global footprint. Map all EU-based operations and assess their security posture relative to headquarters.</p> </td> <td> <p>CISO / Risk Management</p> </td> </tr> <tr> <td> <p>Develop a contingency plan for IRGC-threatened "global tech center" attacks. If kinetic escalation reaches Iranian power infrastructure, retaliatory cyber strikes on cloud and hosting providers are explicitly threatened. Ensure business continuity plans account for multi-region cloud outages.</p> </td> <td> <p>CISO / Business Continuity</p> </td> </tr> <tr> <td> <p>Review and update incident response playbooks to account for combined kinetic-cyber events. The 19 March triad strike means that cyber incidents may occur simultaneously with physical security events, requiring coordinated response across security domains.</p> </td> <td> <p>CISO / IR Team / Physical Security</p> </td> </tr> <tr> <td> <p>Evaluate network segmentation between IT and OT environments. Commission a penetration test specifically targeting the IT-to-OT pivot path that Iranian actors have demonstrated in previous campaigns.</p> </td> <td> <p>OT Security / Red Team</p> </td> </tr> <tr> <td> <p>Assess intelligence collection coverage for Iranian threat actors. Ensure feeds cover MuddyWater's new AI-assisted malware families (BlackBeard, LampoRAT, Nuso, UDPGangster) and Handala's reconstituted infrastructure.</p> </td> <td> <p>Threat Intelligence</p> </td> </tr> </tbody> </table> <h2><strong>The Bottom Line&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2> <p>Twenty-two days into this conflict, three realities define the cyber threat environment:</p> <p><strong>First, the masks are off.</strong> The US government's formal attribution of Handala to Iran's MOIS ends the era of plausible deniability for Iranian "hacktivist" operations. These are state-directed destructive cyber attacks, resourced with pre-staged infrastructure that can reconstitute faster than law enforcement can disrupt it. Plan accordingly.</p> <p><strong>Second, the doctrine is proven.</strong> Iran's synchronized kinetic-cyber-IO triad strike on 19 March validated the operational concept that analysts have tracked since the conflict began. Cyber attacks will accompany kinetic operations. Your incident response plans must account for this - a cyber incident during a period of kinetic escalation is not coincidence, it is doctrine.</p> <p><strong>Third, the targeting is expanding.</strong> From US critical infrastructure to Irish manufacturing facilities, from Gulf diplomatic missions to the explicitly threatened "global tech centers" - the aperture of Iranian cyber targeting is widening with each week of conflict. The 245% increase in cybercrime since hostilities began is not background noise. It is the operating environment.</p> <p>The Cyber Av3ngers' 22-day silence remains the single most concerning signal in this conflict. When an IRGC-CEC-affiliated ICS/OT group goes quiet during the most intense period of kinetic escalation, the responsible assumption is preparation - not retirement.</p> <p>Hunt as if Iranian actors are already in your environment. The pre-positioned infrastructure confirmed this week suggests that for some organizations, they are.</p>

FEATURED RESOURCES

March 23, 2026
Anomali Cyber Watch

Iran's Cyber War Enters a New Phase: State-directed Destruction, Synchronized Strikes, and the 24-Hour Reconstitution Problem

Read More
March 23, 2026
Public Sector
Anomali Cyber Watch

When Two Nation States Strike at Once: Why State Government CISOs Must Act This Week

Read More
March 20, 2026
Anomali Cyber Watch

Iran's Cyber War Machine Is Damaged — But Still Firing. Here's What CISOs Need to Know Now.

Read More
Explore All