<p><strong>Threat Assessment Level: HIGH — ESCALATING</strong></p>
<p><em>Twenty-four days into Operation Epic Fury, Iranian state cyber units are demonstrating alarming operational resilience, adopting Russian criminal infrastructure, and shifting doctrine from espionage to destruction. The window for defensive preparation is closing.</em></p>
<h2><strong>Introduction </strong></h2>
<p>Since the United States and Israel launched Operation Epic Fury against Iran on February 28, 2026, the cyber dimension of this conflict has evolved faster than most organizations’ ability to respond. What began as hacktivist defacements and DDoS attacks has matured into a coordinated campaign of state-sponsored destruction, supply chain compromise, and cross-domain convergence between Iranian intelligence services and Russian cybercriminal infrastructure.</p>
<p>On March 24, the FBI formally attributed the Handala Hack Group — responsible for the largest confirmed destructive cyberattack of the conflict — directly to Iran’s Ministry of Intelligence and Security (MOIS). The same day, researchers revealed MuddyWater deploying a Russian-origin botnet that uses Ethereum blockchain smart contracts for command-and-control, rendering traditional IP and domain blocking useless. Meanwhile, the TeamPCP supply chain campaign expanded to compromise security tools used in 36% of all cloud environments.</p>
<p>This is not a future threat. This is the current operating environment.</p>
<h2><strong>What Changed: 23–24 March 2026</strong></h2>
<table>
<thead>
<tr>
<th>
<p>Development</p>
</th>
<th>
<p>Why It Matters</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p><strong>FBI FLASH formally links Handala to MOIS</strong></p>
</td>
<td>
<p>Removes all ambiguity — the Stryker attack (200,000 devices destroyed, 12PB wiped) was a state-sponsored operation, not hacktivism</p>
</td>
</tr>
<tr>
<td>
<p><strong>MuddyWater adopts Russian “Tsundere” botnet with blockchain C2</strong></p>
</td>
<td>
<p>Iranian state actors are now consuming Russian Malware-as-a-Service; Ethereum-based C2 defeats IOC blocklists entirely</p>
</td>
</tr>
<tr>
<td>
<p><strong>Pay2Key ransomware hits US healthcare — no data exfiltrated</strong></p>
</td>
<td>
<p>Iranian-linked ransomware group prioritized destruction over financial gain, signaling a doctrinal shift during the conflict</p>
</td>
</tr>
<tr>
<td>
<p><strong>TeamPCP supply chain cascade widens</strong></p>
</td>
<td>
<p>Checkmarx KICS, LiteLLM (36% of cloud environments), VS Code plugins, and Trivy all compromised by the same actor; LAPSUS$ collaboration reported</p>
</td>
</tr>
<tr>
<td>
<p><strong>Tycoon2FA phishing platform fully reconstituted</strong></p>
</td>
<td>
<p>20 days after Microsoft/Europol takedown, the platform responsible for 62% of phishing attempts blocked by Microsoft is back at full capacity</p>
</td>
</tr>
<tr>
<td>
<p><strong>DarkSword iOS exploit kit leaked on GitHub</strong></p>
</td>
<td>
<p>Nation-state iPhone exploitation capability is now publicly available; source regions include Iran, China, and Russia; hundreds of millions of iOS 18 devices vulnerable</p>
</td>
</tr>
<tr>
<td>
<p><strong>Cyber Av3ngers (HYDRO KITTEN) maintain operational silence; three new ICS advisories published</strong></p>
</td>
<td>
<p>IRGC-CEC unit has gone dark for 24+ days while CISA releases advisories covering Schneider Electric Foxboro DCS and Modicon PLCs — systems within the group’s known targeting scope; silence assessed as active preparation</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>Conflict Cyber Timeline: Operation Epic Fury</strong></h2>
<table>
<thead>
<tr>
<th>
<p>Date</p>
</th>
<th>
<p>Event</p>
</th>
<th>
<p>Significance</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p><strong>28 Feb 2026</strong></p>
</td>
<td>
<p>Operation Epic Fury / Roaring Lion launched</p>
</td>
<td>
<p>US/Israel kinetic operations against Iran begin; cyber retaliation expected</p>
</td>
</tr>
<tr>
<td>
<p><strong>Early Mar</strong></p>
</td>
<td>
<p>Pay2Key ransomware deployed against US healthcare organization</p>
</td>
<td>
<p>No data exfiltration — destruction-focused; payments traced through Excoino (Iranian crypto exchange)</p>
</td>
</tr>
<tr>
<td>
<p><strong>4 Mar</strong></p>
</td>
<td>
<p>Microsoft/Europol dismantle Tycoon2FA PhaaS platform</p>
</td>
<td>
<p>Temporary disruption of platform responsible for 30M+ malicious emails/month</p>
</td>
</tr>
<tr>
<td>
<p><strong>11 Mar</strong></p>
</td>
<td>
<p>Handala executes destructive attack on Stryker</p>
</td>
<td>
<p>~200,000 devices destroyed, 12PB data wiped — largest confirmed cyberattack of the conflict</p>
</td>
</tr>
<tr>
<td>
<p><strong>16 Mar</strong></p>
</td>
<td>
<p>EU sanctions Emennet Pasargad</p>
</td>
<td>
<p>Iranian cyber firm sanctioned for information operations</p>
</td>
</tr>
<tr>
<td>
<p><strong>19 Mar</strong></p>
</td>
<td>
<p>Iran conducts first synchronized kinetic-cyber-IO triad strike against Israel; CISA publishes 7 ICS advisories in single day</p>
</td>
<td>
<p>Confirms integrated doctrine combining missiles, cyberattacks, and disinformation simultaneously</p>
</td>
</tr>
<tr>
<td>
<p><strong>22 Mar</strong></p>
</td>
<td>
<p>Ireland’s NCSC warns of rising Iran-linked cyber activity</p>
</td>
<td>
<p>Spillover risk confirmed beyond US/Israel theater</p>
</td>
</tr>
<tr>
<td>
<p><strong>23 Mar</strong></p>
</td>
<td>
<p>FBI seizes Handala infrastructure; Handala reconstitutes C2 via Telegram within 24 hours; DarkSword iOS exploit kit leaked on GitHub; TeamPCP compromises Checkmarx KICS and LiteLLM</p>
</td>
<td>
<p>Demonstrates Iranian operational resilience; mobile and supply chain attack surfaces expand dramatically</p>
</td>
</tr>
<tr>
<td>
<p><strong>24 Mar</strong></p>
</td>
<td>
<p>FBI FLASH formally attributes Handala = HomeLand Justice = MOIS; MuddyWater/Tsundere blockchain C2 disclosed; CISA ICS advisories for Schneider Electric Foxboro DCS, Modicon PLCs</p>
</td>
<td>
<p>State attribution crystallizes; blockchain C2 introduces structural detection gap; ICS/OT attack surface widens</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>Key Threat Analysis</strong></h2>
<h3><strong>1. Handala / HomeLand Justice — MOIS Destructive Operations</strong></h3>
<p>The FBI’s March 24 FLASH alert (IC3 PSA 260320) is a watershed moment. It formally confirms that Handala Hack, HomeLand Justice, and the aliases UNC5203, Void Manticore, and Red Sandstorm are all the same MOIS-directed operation. This group executed the Stryker attack — the most damaging cyberattack of the conflict — and has been running a parallel espionage campaign using trojanized versions of WhatsApp, Telegram, and KeePass since late 2023.</p>
<p>A second-stage tool called <strong>MicDriver</strong> records audio and screen content during Zoom calls. Post-exploitation tools Winappx.exe and MsCache.exe handle file bundling and exfiltration. The FBI confirmed that within 24 hours of domain seizures on March 19, Handala had reconstituted command-and-control via Telegram.</p>
<p><strong>Key ATT&CK techniques:</strong> T1204.002 (Malicious File Execution), T1036.005 (Masquerading), T1123 (Audio Capture), T1113 (Screen Capture), T1041 (Exfiltration Over C2)</p>
<p><strong>Bottom line:</strong> Handala is resilient, state-backed, and has demonstrated both destructive and espionage capabilities. Expect reconstituted leak infrastructure within 7–14 days.</p>
<h3><strong>2. MuddyWater / Mango Sandstorm — Blockchain C2 Changes the Game</strong></h3>
<p>MuddyWater (also tracked as TA450, COBALT ULSTER, Earth Vetala, Boggy Serpens) — affiliated with Iran’s MOIS — has adopted the <strong>Tsundere botnet</strong>: a Russian-origin Malware-as-a-Service tool that uses <strong>EtherHiding</strong>, retrieving C2 server addresses from Ethereum blockchain smart contracts. This makes traditional takedown impossible — you cannot seize the Ethereum blockchain.</p>
<p>The malware includes a CIS-country kill switch (terminates on Russian/Ukrainian/CIS systems), confirming Russian origin. JavaScript obfuscation in the persistence module matches techniques used by North Korean DEV#POPPER campaigns, suggesting shared tooling across multiple state actors.</p>
<p><strong>Why this matters for defenders:</strong> If your detection strategy relies on blocking known malicious IPs and domains, you will miss Tsundere entirely. Ethereum JSON-RPC calls (eth_call, eth_getStorageAt) from non-cryptocurrency endpoints are the behavioral indicator — and most SOCs have zero visibility into this traffic.</p>
<p><strong>Key ATT&CK techniques:</strong> T1102.002 (Bidirectional Web Service Communication), T1059.007 (JavaScript), T1059.001 (PowerShell), T1614.001 (System Language Discovery)</p>
<h3><strong>3. Pay2Key — State-Criminal Convergence Targeting Healthcare</strong></h3>
<p>Pay2Key ransomware — linked to MOIS — struck a US healthcare organization in late February, coinciding with the start of Operation Epic Fury. The investigation by Beazley Security and Halcyon revealed a critical behavioral shift: <strong>no data was exfiltrated</strong>. The attackers compromised an administrative account, deployed encryption, and cleared all event logs. The focus was destruction, not monetization.</p>
<p>Pay2Key has been marketing on Russian cybercriminal forums since summer 2025, offering 80% affiliate splits. The operation has claimed 170 victims and $8 million in ransom payments since mid-2025, with payments routed through <strong>Excoino</strong> — an Iranian cryptocurrency exchange requiring Iranian national ID for registration.</p>
<p>This is textbook state-criminal convergence: a ransomware operation with Iranian government ties, marketed on Russian forums, shifting to destructive operations during a kinetic conflict.</p>
<h3><strong>4. TeamPCP — Supply Chain Cascade Targeting Security Tooling</strong></h3>
<p>TeamPCP has escalated from the initial Trivy GitHub Action compromise to a full ecosystem attack:</p>
<ul>
<li><strong>Checkmarx KICS GitHub Action</strong> — compromised March 23 (4-hour window)</li>
<li><strong>Checkmarx VS Code plugins</strong> on OpenVSX — compromised March 23 (3-hour window)</li>
<li><strong>LiteLLM PyPI packages</strong> — versions 1.82.7 and 1.82.8 contained infostealer payload</li>
<li><strong>Trivy</strong> — 76 of 77 GitHub Action versions poisoned; 2 Docker images compromised</li>
</ul>
<p>All share the same infostealer payload and public key for credential exfiltration. Wiz Research reports TeamPCP is collaborating with <strong>LAPSUS$</strong> and that LiteLLM is present in <strong>36% of all cloud environments</strong>.</p>
<p>The recursive irony is not lost: security scanning tools designed to find vulnerabilities are being weaponized to steal credentials and secrets from CI/CD pipelines.</p>
<h3><strong>5. Tycoon2FA — The Unkillable Phishing Platform</strong></h3>
<p>Twenty days after Microsoft and Europol dismantled Tycoon2FA on March 4, the platform is fully operational again. At its peak, Tycoon2FA accounted for <strong>62% of phishing attempts blocked by Microsoft</strong> and generated over <strong>30 million malicious emails per month</strong>. The platform intercepts live authentication sessions, capturing credentials, one-time passwords, and active session cookies to bypass MFA.</p>
<p><strong>Key ATT&CK techniques:</strong> T1556.006 (MFA Modification), T1539 (Steal Web Session Cookie), T1111 (MFA Interception), T1078.004 (Cloud Account Abuse)</p>
<h3><strong>6. DarkSword — iPhone Exploitation Goes Commodity</strong></h3>
<p>The DarkSword iOS exploit chain, targeting iOS 18, was leaked on GitHub on March 23. Originally discovered targeting users in Ukraine, Saudi Arabia, Turkey, and Malaysia, the exploit was sourced from <strong>China, Iran, and Russia</strong>. Google Threat Intelligence, iVerify, and Lookout have confirmed the threat. CISA added the exploited vulnerabilities to the Known Exploited Vulnerabilities catalog.</p>
<p>A related exploit kit, <strong>Coruna</strong>, may be wormable — capable of spreading via text message to all contacts. Hundreds of millions of iPhones running iOS 18 are vulnerable.</p>
<h3><strong>7. The Silent Threat: Cyber Av3ngers (HYDRO KITTEN)</strong></h3>
<p>The IRGC-CEC unit <strong>Cyber Av3ngers</strong> has maintained 24+ days of operational silence since the conflict began. Three new CISA ICS advisories dropped on March 24 covering Schneider Electric Foxboro DCS, Modicon M241/M251/M258/LMC058 PLCs, and Plant iT/Brewmaxx systems — all within Cyber Av3ngers’ known targeting scope.</p>
<p>This silence is assessed as active preparation, not capability destruction. Cyber Av3ngers previously demonstrated the ability to compromise Unitronics PLCs across US water systems. The combination of prolonged silence and fresh ICS vulnerability disclosures represents the highest-priority unresolved threat for critical infrastructure operators.</p>
<h2><strong>Predictive Analysis: What Comes Next</strong></h2>
<table>
<thead>
<tr>
<th>
<p>Scenario</p>
</th>
<th>
<p>Probability</p>
</th>
<th>
<p>Timeframe</p>
</th>
<th>
<p>Basis</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Handala reconstitutes leak infrastructure (new Telegram channels, mirror sites)</p>
</td>
<td>
<p><strong>>70%</strong></p>
</td>
<td>
<p>7–14 days</p>
</td>
<td>
<p>Demonstrated 24-hour C2 reconstitution after FBI seizure; historical resilience pattern</p>
</td>
</tr>
<tr>
<td>
<p>TeamPCP targets additional open-source security tools and AI/ML libraries</p>
</td>
<td>
<p><strong>>70%</strong></p>
</td>
<td>
<p>7–14 days</p>
</td>
<td>
<p>Telegram messages warn of “snowball effect”; escalating scope across each attack</p>
</td>
</tr>
<tr>
<td>
<p>Iran executes another synchronized kinetic-cyber-IO triad operation</p>
</td>
<td>
<p><strong>50–70%</strong></p>
</td>
<td>
<p>7 days</p>
</td>
<td>
<p>~5–7 day cadence observed since Feb 28; last event was March 19</p>
</td>
</tr>
<tr>
<td>
<p>Cyber Av3ngers weaponize Schneider Electric ICS vulnerabilities (Foxboro DCS, Modicon PLCs)</p>
</td>
<td>
<p><strong>50–70%</strong></p>
</td>
<td>
<p>14 days</p>
</td>
<td>
<p>Advisories published March 24; group has demonstrated ICS exploitation capability; prolonged silence suggests preparation</p>
</td>
</tr>
<tr>
<td>
<p>DarkSword exploit kit adopted by Iranian actors for mobile surveillance of military/intelligence targets</p>
</td>
<td>
<p><strong>30–50%</strong></p>
</td>
<td>
<p>30 days</p>
</td>
<td>
<p>Iran listed as source region; leaked code lowers barrier; aligns with Handala’s existing surveillance tooling</p>
</td>
</tr>
<tr>
<td>
<p>Tycoon2FA used as initial access vector for Iranian state operations</p>
</td>
<td>
<p><strong>50–70%</strong></p>
</td>
<td>
<p>14 days</p>
</td>
<td>
<p>Platform back at full capacity; MFA bypass enables credential theft at scale; Iranian actors have historically leveraged PhaaS</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>SOC Operational Guidance</strong></h2>
<h3><strong>Detection Priorities</strong></h3>
<ol>
<li><strong> Handala Fake Application Campaign</strong> - <strong>Hunt hypothesis:</strong> Executables named WhatsApp.exe, Telegram_authenticator.exe, KeePass.exe, MicDriver, Winappx.exe, or MsCache.exe executing from non-standard paths (outside Program Files, AppData<vendor>) - <strong>ATT&CK:</strong> T1204.002, T1036.005, T1123, T1113 - <strong>Detection logic:</strong> Alert on process creation events where the image name matches known masquerading filenames AND the parent process or file path is anomalous. Correlate with audio device access (T1123) and screen capture API calls (T1113) within 60 seconds of execution.</li>
<li><strong> Blockchain-Based C2 (Tsundere/EtherHiding)</strong> - <strong>Hunt hypothesis:</strong> Non-cryptocurrency applications making Ethereum JSON-RPC calls (eth_call, eth_getStorageAt) to Ethereum gateway services (Infura, Alchemy, public Ethereum nodes) - <strong>ATT&CK:</strong> T1102.002, T1071.001 - <strong>Detection logic:</strong> Monitor DNS queries and HTTP POST requests to known Ethereum RPC endpoints. Any endpoint that is not a known cryptocurrency application or wallet making these calls should be investigated immediately. This is a <strong>net-new detection capability</strong> for most SOCs — prioritize building it.</li>
<li><strong> Supply Chain Compromise Indicators (TeamPCP)</strong> - <strong>Hunt hypothesis:</strong> CI/CD pipelines that executed checkmarx/kics-github-action or aquasecurity/trivy-action during the March 23 compromise windows; Python environments with litellm==1.82.7 or litellm==1.82.8 - <strong>ATT&CK:</strong> T1195.002, T1552.004, T1528 - <strong>Detection logic:</strong> Audit GitHub Actions workflow run logs for the compromise timeframes. Search package manifests (requirements.txt, poetry.lock, Pipfile.lock) for affected LiteLLM versions. Check for unexpected outbound connections from CI/CD runners to unknown endpoints.</li>
<li><strong> Tycoon2FA MFA Bypass</strong> - <strong>Hunt hypothesis:</strong> Successful MFA authentications followed by session token usage from a different IP address or geographic location within minutes - <strong>ATT&CK:</strong> T1556.006, T1539, T1111, T1078.004 - <strong>Detection logic:</strong> Correlate Azure AD / Entra ID sign-in logs for impossible travel scenarios where MFA was satisfied. Alert on new inbox rules, mail forwarding changes, or OAuth app consent events within 30 minutes of a sign-in from a new location.</li>
<li><strong> Pay2Key / Destructive Ransomware Indicators</strong> - <strong>Hunt hypothesis:</strong> Administrative account compromise followed by event log clearing (T1070.001) and mass file encryption without prior data staging or exfiltration - <strong>ATT&CK:</strong> T1078, T1486, T1070.001, T1490 - <strong>Detection logic:</strong> Alert on wevtutil cl or Clear-EventLog commands from administrative accounts. Monitor for volume shadow copy deletion (vssadmin delete shadows). The absence of data exfiltration before encryption is itself an indicator of destruction-focused operations.</li>
<li><strong> DarkSword / iOS Exploitation</strong> - <strong>Hunt hypothesis:</strong> Managed iOS devices exhibiting anomalous network behavior, unexpected profile installations, or communication with known spyware C2 infrastructure - <strong>ATT&CK:</strong> T1203, T1429, T1512, T1636 - <strong>Detection logic:</strong> Enable Apple’s Lockdown Mode on high-value user devices. Monitor MDM telemetry for unexpected configuration profile installations. Force iOS updates to the latest patched version across all managed devices.</li>
</ol>
<h2><strong>Sector-Specific Defensive Priorities</strong></h2>
<h3><strong>Financial Services</strong></h3>
<p>The Iran conflict has brought the cyber frontline directly to US banks. Pay2Key ransomware payments are routed through the Iranian exchange Excoino, creating sanctions compliance exposure for any institution that inadvertently processes related transactions.</p>
<ul>
<li><strong>Priority 1:</strong> Enhance transaction monitoring for cryptocurrency flows involving Excoino and Iranian-linked wallets. Coordinate with FinCEN and OFAC for updated sanctions lists.</li>
<li><strong>Priority 2:</strong> Tycoon2FA’s reconstitution means MFA-bypass phishing at scale is back. Deploy phishing-resistant authentication (FIDO2/WebAuthn) for privileged banking applications. Session token anomaly detection (impossible travel, device fingerprint mismatch) is critical.</li>
<li><strong>Priority 3:</strong> MuddyWater has historically targeted financial sector organizations in the Gulf. The Tsundere botnet’s blockchain C2 will evade network-based detection — invest in endpoint behavioral analytics over network IOC blocking.</li>
</ul>
<h3><strong>Energy and Industrial Control Systems</strong></h3>
<p>Cyber Av3ngers’ 24+ days of silence is the most dangerous signal in this conflict for energy operators. Three CISA ICS advisories published on March 24 cover <strong>Schneider Electric Foxboro DCS</strong> (SEVD-2026-069-03), <strong>Modicon M241/M251/M258/LMC058 PLCs</strong>, and <strong>Plant iT/Brewmaxx</strong> — all systems within Cyber Av3ngers’ demonstrated targeting capability.</p>
<ul>
<li><strong>Priority 1:</strong> Immediately assess exposure to the March 24 Schneider Electric advisories. If you operate Foxboro DCS or Modicon PLCs, assume you are a target and apply vendor patches on an emergency basis.</li>
<li><strong>Priority 2:</strong> Segment OT networks from IT networks with unidirectional gateways where possible. Monitor for anomalous Modbus/TCP and EtherNet/IP traffic patterns.</li>
<li><strong>Priority 3:</strong> Review and restrict remote access to SCADA/DCS systems. Cyber Av3ngers previously exploited internet-facing Unitronics PLCs — any internet-exposed OT device is at elevated risk.</li>
<li><strong>Priority 4:</strong> Assess exposure to CTEK Chargeportal and Pharos Controls vulnerabilities disclosed in the same CISA advisory batch — EV charging infrastructure is an emerging OT attack surface.</li>
</ul>
<h3><strong>Healthcare</strong></h3>
<p>Healthcare is under active attack from multiple Iranian-linked operations. The Stryker destruction (200,000 devices, 12PB of data) and the Pay2Key healthcare incident demonstrate that Iranian actors view medical organizations as legitimate retaliatory targets.</p>
<ul>
<li><strong>Priority 1:</strong> Assume you are a target. Review administrative account hygiene — Pay2Key gained initial access through a compromised admin account days before deploying ransomware. Enforce just-in-time privileged access and monitor for dormant admin account reactivation.</li>
<li><strong>Priority 2:</strong> CISA’s March 24 advisory on <strong>GDCM medical imaging library</strong> vulnerabilities affects DICOM processing systems across healthcare. Audit medical imaging infrastructure for exposure.</li>
<li><strong>Priority 3:</strong> The Handala/MOIS surveillance campaign using fake WhatsApp and KeePass installers targets individuals — brief clinical leadership and research staff on the threat. Executives, researchers with Iranian connections, and anyone involved in defense-adjacent medical research are high-value targets.</li>
<li><strong>Priority 4:</strong> Ensure offline, immutable backups of electronic health records and critical clinical systems. The destruction-over-exfiltration shift means recovery capability is more important than data loss prevention during this conflict.</li>
</ul>
<h3><strong>Government and Defense</strong></h3>
<p>The FBI FLASH on Handala/MOIS confirms that Iranian state intelligence is conducting both destructive and espionage operations simultaneously. Government agencies and defense industrial base (DIB) contractors face the full spectrum of Iranian cyber capability.</p>
<ul>
<li><strong>Priority 1:</strong> DIB contractor pre-positioning is the highest-priority intelligence gap. Iranian actors may be using fake developer tools (as demonstrated by Handala’s KeePass/WhatsApp campaign) to target defense contractor employees. Conduct proactive threat hunts against contractor GitHub repositories, dormant VPN accounts, and developer workstations.</li>
<li><strong>Priority 2:</strong> APT42 (CALANQUE) credential harvesting campaigns targeting government and nuclear research institutions have gone quiet — this is anomalous during an active conflict and may indicate operational preparation rather than cessation. Review OAuth application consent logs and conditional access policies.</li>
<li><strong>Priority 3:</strong> The DarkSword iOS exploit kit’s leak, with Iran as a source region, creates mobile surveillance risk for government officials and military personnel. Enforce iOS updates and enable Lockdown Mode on devices used by senior officials.</li>
<li><strong>Priority 4:</strong> Monitor for UNC5858 campaigns using Israeli defense contractor impersonation lures (e.g., Rafael Advanced Defense Systems). These social engineering campaigns should be intensifying during active conflict.</li>
</ul>
<h3><strong>Aviation and Logistics</strong></h3>
<p>While no direct aviation-sector attacks were reported in this cycle, the conflict’s spillover dynamics and supply chain compromise campaigns create material risk.</p>
<ul>
<li><strong>Priority 1:</strong> TeamPCP’s supply chain cascade affects CI/CD pipelines across all sectors. Aviation and logistics organizations using Trivy, Checkmarx KICS, or LiteLLM in their software development or container security pipelines must audit and rotate secrets immediately.</li>
<li><strong>Priority 2:</strong> Ivanti EPMM (CVE-2026-1340, CVSS 9.8) is under active exploitation — one actor is responsible for 83% of observed exploitation. Aviation organizations using Ivanti for mobile device management must patch on an emergency basis.</li>
<li><strong>Priority 3:</strong> The CanisterWorm wiper targets systems configured for Iran’s time zone or Farsi language settings. Airlines and logistics companies with operations in the Middle East or Farsi-speaking staff should audit endpoint configurations and ensure cloud environments are hardened against worm propagation.</li>
</ul>
<h2><strong>Prioritized Defense Recommendations</strong></h2>
<h3><strong>Immediate (Within 24 Hours)</strong></h3>
<table>
<thead>
<tr>
<th>
<p>Action</p>
</th>
<th>
<p>Owner</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Create detection rules for executables named WhatsApp.exe, Telegram_authenticator.exe, KeePass.exe, MicDriver, Winappx.exe, MsCache.exe executing from non-standard paths (FBI FLASH — Handala/MOIS)</p>
</td>
<td>
<p>SOC / Detection Engineering</p>
</td>
</tr>
<tr>
<td>
<p>Audit all CI/CD pipelines for checkmarx/kics-github-action, aquasecurity/trivy-action, and litellm versions 1.82.7 or 1.82.8. Pin GitHub Actions to verified commit SHAs. Rotate all CI/CD secrets that may have been exposed during the March 23 compromise windows</p>
</td>
<td>
<p>DevOps / DevSecOps</p>
</td>
</tr>
<tr>
<td>
<p>Force iOS update to latest patched version on all managed mobile devices; enable Lockdown Mode on iPhones used by executives, security staff, and anyone with access to sensitive systems</p>
</td>
<td>
<p>IT Ops / Mobile Security</p>
</td>
</tr>
<tr>
<td>
<p>Brief executive leadership on the FBI’s formal MOIS attribution of Handala and the destruction-over-exfiltration doctrinal shift — this changes the risk calculus from data breach to operational destruction</p>
</td>
<td>
<p>CISO</p>
</td>
</tr>
</tbody>
</table>
<h3><strong>7-Day Actions</strong></h3>
<table>
<thead>
<tr>
<th>
<p>Action</p>
</th>
<th>
<p>Owner</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Deploy behavioral detection for Ethereum JSON-RPC calls (eth_call, eth_getStorageAt) from non-cryptocurrency endpoints to detect Tsundere/EtherHiding C2 resolution</p>
</td>
<td>
<p>SOC / Detection Engineering</p>
</td>
</tr>
<tr>
<td>
<p>Patch Ivanti EPMM to remediate CVE-2026-1340 (CVSS 9.8, unauthenticated RCE) — one actor responsible for 83% of exploitation</p>
</td>
<td>
<p>IT Ops</p>
</td>
</tr>
<tr>
<td>
<p>Patch Microsoft SharePoint for CVE-2026-20963 (CVSS 8.8, deserialization RCE, in CISA KEV)</p>
</td>
<td>
<p>IT Ops</p>
</td>
</tr>
<tr>
<td>
<p>Deploy phishing-resistant authentication (FIDO2/WebAuthn) for all privileged accounts and high-value applications to counter Tycoon2FA MFA bypass</p>
</td>
<td>
<p>Identity & Access Management</p>
</td>
</tr>
<tr>
<td>
<p>Validate offline, immutable backup integrity for critical systems — test restoration procedures given the destruction-focused threat posture</p>
</td>
<td>
<p>IT Ops / DR Team</p>
</td>
</tr>
<tr>
<td>
<p>Review and restrict all OAuth application consents in Azure AD / Entra ID; revoke suspicious grants; implement admin consent workflow</p>
</td>
<td>
<p>Identity & Access Management</p>
</td>
</tr>
</tbody>
</table>
<h3><strong>30-Day Actions</strong></h3>
<table>
<thead>
<tr>
<th>
<p>Action</p>
</th>
<th>
<p>Owner</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Commission proactive threat hunt against DIB contractor GitHub repositories, dormant VPN/RDP accounts, and developer workstations for Iranian pre-positioning indicators</p>
</td>
<td>
<p>CISO / Threat Hunting</p>
</td>
</tr>
<tr>
<td>
<p>Assess exposure to Schneider Electric Foxboro DCS, Modicon M241/M251/M258/LMC058, and Plant iT/Brewmaxx vulnerabilities; apply vendor patches before Cyber Av3ngers weaponize</p>
</td>
<td>
<p>OT Security</p>
</td>
</tr>
<tr>
<td>
<p>Implement network segmentation between OT and IT environments with unidirectional gateways where feasible; eliminate internet-facing OT devices</p>
</td>
<td>
<p>OT Security / Network Engineering</p>
</td>
</tr>
<tr>
<td>
<p>Establish blockchain-abuse intelligence collection capability — integrate feeds from Chainalysis, Elliptic, or equivalent for Ethereum transaction monitoring</p>
</td>
<td>
<p>CTI Team</p>
</td>
</tr>
<tr>
<td>
<p>Conduct tabletop exercise simulating a synchronized kinetic-cyber-IO attack scenario, including simultaneous ransomware deployment, wiper activation, and disinformation campaign</p>
</td>
<td>
<p>CISO / IR Team / Executive Leadership</p>
</td>
</tr>
<tr>
<td>
<p>Review and update incident response playbooks to account for destruction-focused attacks where the goal is environmental damage rather than data theft — traditional breach response procedures are insufficient</p>
</td>
<td>
<p>IR Team</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>Bottom Line</strong></h2>
<p>Twenty-four days into this conflict, the pattern is unmistakable: Iranian cyber operations are not degrading in proportion to kinetic pressure — they are adapting. MOIS units are consuming Russian criminal infrastructure. Ransomware groups are abandoning financial motives for destructive ones. Security tools themselves are being weaponized through supply chain compromise. And the most capable ICS/OT threat actor in Iran’s arsenal — Cyber Av3ngers — hasn’t made a sound in over three weeks.</p>
<p>The organizations that will weather this conflict are the ones acting now: rotating compromised CI/CD secrets today, building blockchain C2 detection this week, and hunting for pre-positioned access in their networks this month. The intelligence is clear. The attribution is confirmed. The only variable left is your response time.</p>