All Posts
Anomali Cyber Watch
1
min read

Iran's Cyber War Is Here: What CISOs Need to Know Right Now

Published on
March 11, 2026
Table of Contents
<p>Less than two weeks ago, the United States and Israel launched the most significant military operations against Iran in decades. Today, the cyber retaliation campaign that every security leader feared is no longer hypothetical &mdash; it's underway, it's multi-domain, and it's accelerating.</p> <p>Iranian state-sponsored actors are exploiting industrial control systems. Drones have physically destroyed cloud data centers. A CVSS 10.0 vulnerability in Cisco SD-WAN is being mass-exploited. And the most capable Iranian APT groups are conspicuously quiet &mdash; a pattern that historically precedes their most devastating attacks.</p> <p>Meanwhile, CISA &mdash; the U.S. government's primary cyber defense coordinator &mdash; is operating under partial shutdown with leadership in flux.</p> <p><strong>The window for defensive preparation is closing. This is what you need to know and what you need to do.</strong></p> <h2><strong>What Changed This Week</strong></h2> <p>The intelligence picture has shifted decisively from "Will Iran retaliate in cyberspace?" to "Iran is retaliating &mdash; where and how hard?" Here are the developments that should be driving your security posture decisions today:</p> <ul> <li><strong>First-ever kinetic strike on cloud infrastructure.</strong> Iranian drones destroyed two of three AWS availability zones in the UAE and Bahrain (regions me-central-1 and me-south-1), taking Gulf banking and payment systems offline. This is an unprecedented escalation that redefines cloud risk.</li> <li><strong>Cisco SD-WAN exploitation has gone from zero-day to mass exploitation.</strong> Three CVEs are now actively exploited, led by CVE-2026-20127 (CVSS 10.0), now on the CISA Known Exploited Vulnerabilities catalog. SecurityWeek assesses it as "widely exploited."</li> <li><strong>IRGC-affiliated group HYDRO KITTEN confirmed on industrial control systems.</strong> The group is exploiting CVE-2021-22681 to bypass authentication on Rockwell Automation Allen Bradley PLCs &mdash; and they're sharing wiper toolkits with a second IRGC unit.</li> <li><strong>OAuth device code phishing has exploded.</strong> Over 180 phishing URLs detected in a single week abusing Microsoft's legitimate device authorization flow &mdash; a technique that bypasses traditional phishing detection and MFA.</li> <li><strong>Russian hacktivist groups are joining the Iranian cyber campaign</strong>, expanding the threat coalition beyond Iran's traditional proxy network.</li> <li><strong>MuddyWater confirmed inside U.S. critical infrastructure.</strong> The MOIS-linked group breached a U.S. airport, bank, software company, and NGO using a new backdoor called Dindoor &mdash; the first confirmed Iranian APT compromise of named U.S. CI sectors since the conflict began.</li> <li><strong>Iranian defense-sector espionage is active through at least 10 March</strong>, with UNC5858 (Black Shadow) impersonating Israel's Rafael Advanced Defense Systems in ongoing spear-phishing operations.</li> </ul> <h2><strong>Conflict &amp; Threat Timeline</strong></h2> <table> <tbody> <tr> <td> <p><strong>Date</strong></p> </td> <td> <p><strong>Event</strong></p> </td> <td> <p><strong>Significance</strong></p> </td> </tr> <tr> <td> <p>28 Feb 2026</p> </td> <td> <p>U.S.-Israel launch Operation Epic Fury and Operation Roaring Lion</p> </td> <td> <p>Largest military strikes against Iran in decades</p> </td> </tr> <tr> <td> <p>2&ndash;8 Mar</p> </td> <td> <p>Iranian drones destroy AWS data centers in UAE/Bahrain</p> </td> <td> <p>First kinetic attack on cloud infrastructure in history</p> </td> </tr> <tr> <td> <p>25 Feb &ndash; 10 Mar</p> </td> <td> <p>Cisco SD-WAN CVE-2026-20127 exploitation escalates; two additional CVEs confirmed</p> </td> <td> <p>Mass exploitation of CVSS 10.0 vulnerability across enterprises</p> </td> </tr> <tr> <td> <p>Late Feb</p> </td> <td> <p>HYDRO KITTEN exploits Rockwell Automation PLCs (CVE-2021-22681)</p> </td> <td> <p>IRGC unit confirmed on industrial control systems</p> </td> </tr> <tr> <td> <p>3 Mar</p> </td> <td> <p>Iran's internet at 1&ndash;4% capacity; actors pivot to Starlink</p> </td> <td> <p>Cyber operators reconstituting via satellite infrastructure</p> </td> </tr> <tr> <td> <p>3&ndash;10 Mar</p> </td> <td> <p>149+ hacktivist attacks across 16 countries; Russian groups join</p> </td> <td> <p>Broadening coalition of disruptive actors</p> </td> </tr> <tr> <td> <p>6 Mar</p> </td> <td> <p>MuddyWater confirmed inside U.S. airport, bank, software company, and NGO using Dindoor backdoor</p> </td> <td> <p>First confirmed Iranian APT breach of named U.S. CI sectors during conflict</p> </td> </tr> <tr> <td> <p>7 Mar</p> </td> <td> <p>GitHub fake resume lures targeting aerospace/DIB sector</p> </td> <td> <p>Supply chain espionage vector active</p> </td> </tr> <tr> <td> <p>10 Mar</p> </td> <td> <p>UNC5858/Black Shadow last IOC observed; Rafael impersonation active</p> </td> <td> <p>Defense industrial base espionage ongoing</p> </td> </tr> <tr> <td> <p>10 Mar</p> </td> <td> <p>U.S. Intelligence Community issues private warnings on Iranian cyber ops</p> </td> <td> <p>Government anticipates escalation</p> </td> </tr> <tr> <td> <p>9&ndash;10 Mar</p> </td> <td> <p>180+ OAuth device code phishing URLs detected in one week</p> </td> <td> <p>Scalable MFA-bypass technique proliferating</p> </td> </tr> <tr> <td> <p>10 Mar</p> </td> <td> <p>CISA operating under partial shutdown, leadership in flux</p> </td> <td> <p>U.S. cyber defense coordination degraded at worst possible time</p> </td> </tr> </tbody> </table> <h2><strong>Threat Analysis: The Five Fronts of Iran's Cyber Retaliation</strong></h2> <h3><strong>1. MuddyWater's Dindoor Backdoor &mdash; Inside U.S. Critical Infrastructure</strong></h3> <p><strong>Actor:</strong> MuddyWater (aliases: Mango Sandstorm, Seedworm, Static Kitten, TA450, MERCURY, COBALT ULSTER, TEMP.Zagros)</p> <p><strong>Affiliation:</strong> Ministry of Intelligence and Security (MOIS), Iran</p> <p><strong>Malware:</strong> Dindoor (new backdoor, successor to POWERSTATS)</p> <p>MuddyWater &mdash; one of Iran's most prolific cyber espionage groups &mdash; has breached the networks of a U.S. regional airport, a bank, a software company, and an NGO using a previously undocumented backdoor called Dindoor. Reported independently by The Hacker News and Cybernews on 6 March, this represents the first publicly confirmed Iranian APT compromise of named U.S. critical infrastructure sectors since the conflict began.</p> <p>Dindoor follows the lineage of MuddyWater's POWERSTATS toolkit &mdash; expect PowerShell-based command-and-control, spearphishing attachments as the initial access vector, and lateral movement via valid credentials.</p> <p><strong>Known IOCs:</strong></p> <ul> <li>5.160.228.186 (ASN 42337, Respina Networks, Tehran) &mdash; tagged as Rampant Kitten / APT / phishing infrastructure. Severity: very high.</li> <li>62.60.130.247 &mdash; Iran-geolocated APT infrastructure, tagged for manufacturing sector targeting.</li> </ul> <p><strong>Why this matters:</strong> MuddyWater doesn't typically conduct destructive operations &mdash; they establish persistent access. The concern is that this access could be handed off to destructive units (like HYDRO KITTEN) or activated for data destruction if the conflict escalates further. Four confirmed victims are almost certainly not the full scope.</p> <h3><strong>2. Industrial Control Systems Under Direct Attack</strong></h3> <p><strong>Actor:</strong> HYDRO KITTEN (also tracked as Cyber Av3ngers, BAUXITE, SoldiersOfSolomon) &mdash; an IRGC Cyber-Electronic Command (IRGC-CEC) sub-unit.</p> <p>This group has confirmed access to Rockwell Automation Allen Bradley PLCs via CVE-2021-22681, an authentication bypass in RSLogix 5000 (versions 20&ndash;38). Their arsenal is purpose-built for destruction:</p> <table> <tbody> <tr> <td> <p><strong>Malware</strong></p> </td> <td> <p><strong>Function</strong></p> </td> </tr> <tr> <td> <p>IOControl</p> </td> <td> <p>Custom ICS backdoor for persistent access to industrial systems</p> </td> </tr> <tr> <td> <p>Crucio</p> </td> <td> <p>Ransomware designed for operational technology environments</p> </td> </tr> <tr> <td> <p>C++/Golang Wiper Toolkit</p> </td> <td> <p>Multi-component destructive capability with persistence mechanisms</p> </td> </tr> </tbody> </table> <p>Critically, this wiper toolkit is shared with IMPERIAL KITTEN (UNC3890), a second IRGC-affiliated group. This means ICS disruption capability is distributed across multiple Iranian operational units &mdash; neutralizing one group does not eliminate the threat.</p> <p>HYDRO KITTEN's broader vulnerability exploitation portfolio is extensive: CVE-2025-0282 (Ivanti), CVE-2024-55591 (FortiOS), CVE-2024-47575 (FortiManager), CVE-2024-0012 and CVE-2024-9474 (PAN-OS), CVE-2024-45519 (Zimbra), CVE-2024-8068/8069 (Citrix), CVE-2024-53704 (SonicWall), and more than ten others.</p> <h3><strong>3. Network Infrastructure: Cisco SD-WAN Under Mass Exploitation</strong></h3> <p>Three vulnerabilities in Cisco Catalyst SD-WAN Manager are now actively exploited in the wild:</p> <table> <tbody> <tr> <td> <p><strong>CVE</strong></p> </td> <td> <p><strong>CVSS</strong></p> </td> <td> <p><strong>Impact</strong></p> </td> </tr> <tr> <td> <p>CVE-2026-20127</p> </td> <td> <p>10.0 (Critical)</p> </td> <td> <p>Peering authentication bypass &rarr; full admin access to SD-WAN controller</p> </td> </tr> <tr> <td> <p>CVE-2026-20128</p> </td> <td> <p>7.5 (High)</p> </td> <td> <p>DCA credential file exposure &rarr; privilege escalation across systems</p> </td> </tr> <tr> <td> <p>CVE-2026-20122</p> </td> <td> <p>5.4 (Medium)</p> </td> <td> <p>API file overwrite &rarr; vManage user privilege escalation</p> </td> </tr> </tbody> </table> <p>CVE-2026-20127 has been exploited since 2023 and is now on the CISA KEV catalog with a mandatory patching deadline. Any organization running unpatched Cisco Catalyst SD-WAN Manager (versions prior to 20.18) is at critical risk.</p> <h3><strong>4. Defense Industrial Base Espionage Is Active and Expanding</strong></h3> <p><strong>Actor:</strong> UNC5858 / Black Shadow &mdash; Iranian espionage group tracked by Israel's National Cyber Directorate (INCD).</p> <p>This actor is impersonating Rafael Advanced Defense Systems, Israel's premier defense technology company, in an ongoing spear-phishing campaign. Emails are sent from potentially compromised Rafael-affiliated addresses containing malicious URLs that deliver a data-harvesting backdoor. The campaign's most recent indicator of compromise was observed on 10 March 2026 &mdash; confirming it remains active during the conflict.</p> <p>Separately, GitHub-based fake resume lures targeting the aerospace sector were detected on 7 March, representing a parallel supply chain espionage vector against defense industrial base contractors.</p> <h3><strong>5. Identity Infrastructure: OAuth Device Code Phishing at Scale</strong></h3> <p>A surge of 180+ phishing URLs in a single week is exploiting Microsoft's OAuth Device Authorization Grant flow. The attack is elegant and dangerous:</p> <ol> <li>Victim receives a phishing link (often hosted on workers.dev domains)</li> <li>The page displays a user_code and directs the victim to the legitimate microsoft.com/devicelogin</li> <li>Victim authenticates and completes MFA on Microsoft's real infrastructure</li> <li>Attacker receives OAuth access and refresh tokens &mdash; persistent access without credentials</li> </ol> <p>Because the authentication occurs entirely on legitimate Microsoft infrastructure over encrypted HTTPS, traditional email security gateways and phishing detection tools do not flag this activity.</p> <h2><strong>The Silence Is the Signal: Why the Quiet APTs Are the Real Danger</strong></h2> <p>The most important finding in this intelligence cycle is not what Iranian actors are doing &mdash; it's what they're not doing.</p> <p>Despite nearly two weeks of active military conflict, Iran's most capable destructive cyber units &mdash; BANISHED KITTEN (Cotton Sandstorm/UNC5203) &mdash; have not deployed wipers. No new IOControl malware samples have been observed from HYDRO KITTEN despite confirmed PLC access. APT42's nuclear-sector espionage thread has gone dormant.</p> <p>Multiple intelligence sources confirm that Iranian state APTs are "laying low" while hacktivist proxies generate noise with DDoS attacks and defacements across 16 countries.</p> <p><strong>This pattern is consistent with pre-positioning for a high-impact strike, not restraint.</strong> State actors are conserving their most destructive capabilities for a strategic moment &mdash; likely tied to ceasefire negotiations, a major kinetic escalation, or a specific retaliatory target. The hacktivist noise is the distraction. The state capability held in reserve is the real threat.</p> <h2><strong>Predictive Analysis: What Comes Next</strong></h2> <table> <tbody> <tr> <td> <p><strong>Scenario</strong></p> </td> <td> <p><strong>Probability</strong></p> </td> <td> <p><strong>Timeframe</strong></p> </td> <td> <p><strong>Basis</strong></p> </td> </tr> <tr> <td> <p>Iranian state APTs launch significant cyber operation against U.S. critical infrastructure</p> </td> <td> <p>70%</p> </td> <td> <p>1&ndash;14 days</p> </td> <td> <p>MuddyWater already active; HYDRO KITTEN pre-positioned on PLCs; IC issuing private warnings; "quiet period" pattern ending</p> </td> </tr> <tr> <td> <p>Wiper attack against Israeli or Gulf state energy/financial infrastructure</p> </td> <td> <p>50%</p> </td> <td> <p>1&ndash;14 days</p> </td> <td> <p>BANISHED KITTEN and HYDRO KITTEN both possess wiper capability; shared toolkit doubles deployment options; Gulf infrastructure already kinetically targeted</p> </td> </tr> <tr> <td> <p>Iranian actors adopt OAuth device code phishing for targeted government/military operations</p> </td> <td> <p>30%</p> </td> <td> <p>14&ndash;30 days</p> </td> <td> <p>Technique proven at scale (180+ URLs/week); Iranian actors have demonstrated AI-enhanced phishing and OAuth abuse capability</p> </td> </tr> <tr> <td> <p>Additional kinetic strikes on cloud/data center infrastructure in the Gulf or Israel</p> </td> <td> <p>20%</p> </td> <td> <p>7&ndash;30 days</p> </td> <td> <p>Precedent established with AWS UAE/Bahrain strikes; AWS il-central-1 (Israel) is a logical next target</p> </td> </tr> </tbody> </table> <h2><strong>SOC Operational Guidance</strong></h2> <h3><strong>Priority Hunting Hypotheses</strong></h3> <p><strong>Hunt 1 &mdash; MuddyWater Dindoor Backdoor (ATT&amp;CK: T1566.001, T1059.001, T1071.001, T1105)</strong></p> <ul> <li>Search for PowerShell script block logs with Base64-encoded commands, Invoke-WebRequest / Invoke-RestMethod to unusual destinations</li> <li>Alert on any connections to 5.160.228.186 or 62.60.130.247 in proxy, DNS, or firewall logs &mdash; check the past 90 days</li> <li>Hunt for anomalous scheduled task creation via PowerShell (Dindoor persistence mechanism)</li> <li>Prioritize airports, financial institutions, software companies, and NGOs &mdash; the confirmed victim profile</li> </ul> <p><strong>Hunt 2 &mdash; OAuth Device Code Abuse (ATT&amp;CK: T1528, T1078.004, T1550.001, T1621)</strong></p> <ul> <li>Search email logs for links to microsoft.com/devicelogin preceded by unfamiliar workers.dev domains</li> <li>Search proxy/web logs for requests to /api/device/start and /api/device/status endpoints</li> <li>Alert on the HTTP header X-Antibot-Token &mdash; a distinctive marker of the phishing kit in use</li> <li>Review Azure AD sign-in logs for Device Code authentication from unexpected locations or devices</li> </ul> <p><strong>Hunt 3 &mdash; Cisco SD-WAN Compromise (ATT&amp;CK: T1190, T1078, T1068, T1021)</strong></p> <ul> <li>Audit all Cisco Catalyst SD-WAN Manager instances for version &lt; 20.18</li> <li>Search for anomalous NETCONF access or unexpected admin sessions on SD-WAN controllers</li> <li>Review DCA credential file access logs for signs of CVE-2026-20128 exploitation</li> <li>Monitor for lateral movement originating from SD-WAN management infrastructure</li> </ul> <p><strong>Hunt 4 &mdash; ICS/PLC Reconnaissance and Pre-Positioning (ATT&amp;CK: T1190, T0831, T0816)</strong></p> <ul> <li>Audit Rockwell Automation RSLogix 5000 deployments (versions 20&ndash;38) for CVE-2021-22681 exposure</li> <li>Monitor for unauthorized authentication attempts or configuration changes on Allen Bradley PLCs</li> <li>Search for indicators of IOControl, Crucio, or the C++/Golang wiper toolkit in OT network segments</li> <li>Baseline normal PLC communication patterns and alert on deviations</li> </ul> <p><strong>Hunt 5 &mdash; Defense Industrial Base Spear-Phishing (ATT&amp;CK: T1566.002, T1586.002, T1204.001)</strong></p> <ul> <li>Search email logs for messages purporting to originate from Rafael Advanced Defense Systems</li> <li>Alert on inbound emails from previously unseen Rafael-affiliated domains</li> <li>Monitor for GitHub-hosted payloads delivered via fake resume or job application lures targeting aerospace/defense personnel</li> </ul> <h3><strong>Prioritized IOCs for Blocking and Detection</strong></h3> <p><strong>IPs &mdash; Block Immediately:</strong></p> <ul> <li>5.160.228.186 (ASN 42337, Respina Networks, Tehran) &mdash; MuddyWater / Rampant Kitten C2 infrastructure. Confidence: high.</li> <li>62.60.130.247 &mdash; Iran-geolocated APT infrastructure, tagged for manufacturing sector targeting.</li> </ul> <p><strong>Domains &mdash; Block Immediately:</strong></p> <ul> <li>singer-bodners-bau-at-s-account.workers.dev (OAuth phishing)</li> <li>aiinnovationsfly.com (OAuth phishing)</li> <li>Additional workers.dev subdomains associated with OAuth device code phishing (11+ identified)</li> </ul> <p><strong>CVEs &mdash; Verify Patching Status Immediately:</strong></p> <table> <tbody> <tr> <td> <p><strong>CVE</strong></p> </td> <td> <p><strong>Product</strong></p> </td> <td> <p><strong>CVSS</strong></p> </td> <td> <p><strong>Status</strong></p> </td> </tr> <tr> <td> <p>CVE-2026-20127</p> </td> <td> <p>Cisco Catalyst SD-WAN Manager</p> </td> <td> <p>10.0</p> </td> <td> <p>CISA KEV &mdash; mandatory patch</p> </td> </tr> <tr> <td> <p>CVE-2026-20128</p> </td> <td> <p>Cisco Catalyst SD-WAN Manager</p> </td> <td> <p>7.5</p> </td> <td> <p>Actively exploited</p> </td> </tr> <tr> <td> <p>CVE-2026-20122</p> </td> <td> <p>Cisco Catalyst SD-WAN Manager</p> </td> <td> <p>5.4</p> </td> <td> <p>Actively exploited</p> </td> </tr> <tr> <td> <p>CVE-2021-22681</p> </td> <td> <p>Rockwell Automation RSLogix 5000</p> </td> <td> <p>9.8</p> </td> <td> <p>Exploited by HYDRO KITTEN; CISA KEV deadline 26 Mar</p> </td> </tr> <tr> <td> <p>CVE-2025-0282</p> </td> <td> <p>Ivanti</p> </td> <td> <p>&mdash;</p> </td> <td> <p>In HYDRO KITTEN arsenal</p> </td> </tr> <tr> <td> <p>CVE-2024-55591</p> </td> <td> <p>FortiOS</p> </td> <td> <p>&mdash;</p> </td> <td> <p>In HYDRO KITTEN arsenal</p> </td> </tr> <tr> <td> <p>CVE-2024-47575</p> </td> <td> <p>FortiManager</p> </td> <td> <p>&mdash;</p> </td> <td> <p>In HYDRO KITTEN arsenal</p> </td> </tr> <tr> <td> <p>CVE-2024-0012 / CVE-2024-9474</p> </td> <td> <p>PAN-OS</p> </td> <td> <p>&mdash;</p> </td> <td> <p>In HYDRO KITTEN arsenal</p> </td> </tr> <tr> <td> <p>CVE-2024-53704</p> </td> <td> <p>SonicWall</p> </td> <td> <p>&mdash;</p> </td> <td> <p>In HYDRO KITTEN arsenal</p> </td> </tr> </tbody> </table> <h2><strong>Sector-Specific Defensive Priorities</strong></h2> <h3><strong>Financial Services</strong></h3> <p>The Gulf banking disruption from the AWS kinetic strikes is a preview of what a cyber-enabled attack could achieve against financial infrastructure globally. Priority actions:</p> <ul> <li>Verify that no critical payment processing, trading, or core banking workloads depend solely on AWS Middle East regions</li> <li>Implement enhanced monitoring for MuddyWater TTPs (the group is confirmed active against U.S. banks)</li> <li>Review SWIFT and interbank messaging system resilience against wiper scenarios</li> <li>Accelerate Cisco SD-WAN patching &mdash; financial institutions are heavy SD-WAN adopters</li> </ul> <h3><strong>Energy</strong></h3> <p>HYDRO KITTEN's confirmed PLC exploitation makes energy the highest-risk sector in this threat environment. Priority actions:</p> <ul> <li>Conduct emergency audit of all Rockwell Automation RSLogix 5000 deployments (versions 20&ndash;38)</li> <li>Verify network segmentation between IT and OT environments &mdash; assume the IT perimeter is already compromised</li> <li>Review and test manual override procedures for critical processes controlled by Allen Bradley PLCs</li> <li>Coordinate with E-ISAC and ICS-CERT for HYDRO KITTEN-specific detection signatures</li> </ul> <h3><strong>Healthcare</strong></h3> <p>Healthcare organizations are collateral damage targets in nation-state conflicts. Priority actions:</p> <ul> <li>Ensure offline backups of electronic health record systems are current and tested</li> <li>Verify that medical device networks are segmented from enterprise IT</li> <li>Monitor for Crucio ransomware indicators</li> <li>Review OAuth and Microsoft 365 Conditional Access policies to mitigate device code phishing risk</li> </ul> <h3><strong>Government</strong></h3> <p>U.S. government agencies face the dual challenge of being primary targets while CISA's coordination capacity is degraded. Priority actions:</p> <ul> <li>Do not wait for CISA guidance &mdash; increase reliance on commercial threat intelligence and sector-specific ISACs</li> <li>Hunt proactively for OAuth device code phishing targeting government Microsoft 365 tenants</li> <li>Brief personnel with access to classified or sensitive systems on the Rafael impersonation campaign and GitHub-based lures</li> <li>Review cloud workload placement &mdash; any government systems hosted in Middle East cloud regions require immediate geographic diversification assessment</li> </ul> <h3><strong>Aviation &amp; Logistics</strong></h3> <p>The defense industrial base espionage campaigns directly target this sector. Priority actions:</p> <ul> <li>Issue targeted phishing awareness alerts for personnel in aerospace engineering, defense contracting, and supply chain management roles</li> <li>Monitor for spear-phishing emails impersonating Rafael Advanced Defense Systems or other Israeli/U.S. defense contractors</li> <li>Review GitHub access policies &mdash; restrict or monitor access to repositories from unverified accounts offering job-related content</li> <li>Audit supply chain vendor access to ensure compromised DIB partners cannot provide lateral access to your environment</li> </ul> <h2><strong>Prioritized Defense Recommendations&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong></h2> <h3><strong>Immediate (24&ndash;48 Hours)</strong></h3> <ul> <li><strong>Patch Cisco Catalyst SD-WAN Manager</strong> to version 20.18+ &mdash; CVE-2026-20127 is CVSS 10.0, on the CISA KEV, and mass-exploited. This is non-negotiable. Owner: Network Operations / Vulnerability Management</li> <li><strong>Block MuddyWater IOCs</strong> (5.160.228.186, 62.60.130.247) at firewall, proxy, and DNS. Hunt for any historical connections in the past 90 days. Owner: SOC / Network Defense</li> <li><strong>Initiate threat hunt for MuddyWater Dindoor</strong> &mdash; focus on PowerShell-based C2, anomalous scheduled tasks, and connections to Iranian IP ranges. Owner: Threat Hunting / SOC</li> <li><strong>Initiate threat hunt for OAuth device code phishing</strong> &mdash; search for the IOCs and patterns described in the SOC Guidance section above. Owner: Threat Hunting / SOC</li> <li><strong>Brief executive leadership</strong> on the kinetic cloud infrastructure precedent and the probability of escalating Iranian cyber operations in the next 14 days. Owner: CISO / Executive Communications</li> </ul> <h3><strong>7-Day Actions</strong></h3> <ul> <li><strong>Audit all Rockwell Automation RSLogix 5000 deployments</strong> (versions 20&ndash;38) for CVE-2021-22681 exposure. Implement compensating authentication controls on Allen Bradley PLCs. Owner: ICS/OT Security</li> <li><strong>Patch Ivanti Endpoint Manager</strong> per CISA KEV directive. Verify VMware Aria Operations patched for CVE-2026-22719. Owner: Vulnerability Management</li> <li><strong>Assess cloud infrastructure resilience</strong> for any workloads in AWS Middle East regions. Owner: Cloud Architecture / Business Continuity</li> <li><strong>Conduct targeted spear-phishing awareness training</strong> for DIB, aerospace, and defense personnel. Owner: Security Awareness</li> <li><strong>Validate incident response playbooks</strong> for wiper/destructive malware scenarios. Owner: Incident Response</li> </ul> <h3><strong>30-Day Actions</strong></h3> <ul> <li><strong>Develop and deploy detection signatures</strong> for HYDRO KITTEN malware: IOControl, Crucio, C++/Golang wiper toolkit. Owner: Detection Engineering / Threat Intelligence</li> <li><strong>Restrict OAuth Device Code flow</strong> in Microsoft 365 Conditional Access policies to managed devices only. Owner: Identity &amp; Access Management</li> <li><strong>Establish Starlink-based C2 detection capability.</strong> Owner: Advanced Threat Hunting</li> <li><strong>Conduct tabletop exercise</strong> simulating a coordinated Iranian cyber attack. Owner: CISO / IR / Business Continuity</li> <li><strong>Review and diversify intelligence sources</strong> &mdash; with CISA operating at reduced capacity, ensure your organization has commercial threat intelligence, ISAC membership, and direct relationships with sector-specific CERTs. Owner: Threat Intelligence / CISO</li> </ul> <h2><strong>The Bottom Line</strong></h2> <p>We are in the most dangerous period for Iranian cyber operations since the 2012 Shamoon attacks against Saudi Aramco &mdash; and arguably more dangerous, because the threat is broader, the actors are more capable, and the U.S. defensive coordination infrastructure is degraded.</p> <p>The pattern we're seeing &mdash; loud hacktivists in the foreground, quiet state APTs in the background &mdash; is not a sign that the worst is over. It's a sign that the worst hasn't started yet. HYDRO KITTEN is on industrial control systems. MuddyWater is active against U.S. financial and transportation infrastructure. Wiper toolkits are shared across multiple IRGC units. And the most capable destructive actors haven't played their hand.</p> <p><strong>You have days, not weeks, to harden your environment.</strong> Patch the Cisco SD-WAN vulnerability today. Hunt for OAuth device code abuse today. Audit your ICS/PLC exposure this week. Brief your board on the threat this week. Test your wiper response playbook this month.</p> <p>The intelligence is clear. The threat actors are positioned. The question is whether your defenses are ready.</p>

FEATURED RESOURCES

March 11, 2026
Anomali Cyber Watch

Iran's Cyber War Is Here: What CISOs Need to Know Right Now

Read More
March 10, 2026
Anomali Cyber Watch

The Iran Conflict’s Cyber Front Is Escalating - And the Most Dangerous Phase Is Still Ahead

Read More
March 9, 2026
Anomali Cyber Watch

The Silence Before the Storm: Iran's Cyber War Has Moved From Warning to Confirmed Compromise

Read More
Explore All