All Posts
Anomali Cyber Watch
1
min read

Iran's Cyber War Machine Hits Full Stride: What CISOs Must Do Right Now

Published on
April 1, 2026
Table of Contents
<p><strong>Threat Assessment Level: CRITICAL</strong></p> <p>Thirty-two days into the most intense state-on-state cyber conflict since Russia-Ukraine, Iranian cyber operations have crossed a threshold that demands immediate executive attention. Intelligence confirmed this week shows Iranian state-sponsored actors are now operating across <strong>17 countries and 7 industry verticals</strong> with custom backdoors, diversified command-and-control infrastructure, and a broadening target aperture that extends well beyond the Middle East. Meanwhile, the most dangerous signal may be what we're <em>not</em> seeing &mdash; the prolonged silence of Iran's most destructive ICS/OT attack group during the peak of the conflict.</p> <p>This is not a drill. If your organization operates edge devices, cloud services, OT/SCADA systems, or relies on open-source software supply chains, you are in the blast radius.</p> <h2><strong>What Changed&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2> <p>The past week brought several developments that shift the calculus for defenders:</p> <ul> <li><strong>Iranian APT operations confirmed at highest confidence level.</strong> Corroborated intelligence across three independent axes &mdash; tactics, infrastructure, and targeting &mdash; confirms that MOIS-affiliated groups including <strong>MuddyWater</strong> (tracked as UNC3313/UNC5667), <strong>OilRig/APT34</strong>, and <strong>UNC5203</strong> are conducting a global espionage campaign spanning energy, government, telecommunications, utilities, education, and non-profit sectors across 17 countries.</li> <li><strong>Cyber Av3ngers (HYDRO KITTEN) silent for 21+ days &mdash; ICS/OT threat at peak risk.</strong> Iran's most destructive ICS/OT attack group, affiliated with the IRGC Cyber Electronic Command, has gone dark during the most intense phase of the conflict. Every previous major ICS operation by Iranian actors was preceded by a quiet period. Combined with decentralized IRGC command following leadership decapitation, this silence is assessed as pre-operational security, not capability degradation.</li> <li><strong>Iranian actors are abandoning Cobalt Strike for open-source C2 frameworks.</strong> A Tehran-based IP address (45.147.77[.]210, ASN 51889) was independently confirmed as both an Iranian APT command-and-control node <em>and</em> an <strong>AdaptixC2</strong> server &mdash; an open-source red-team framework with lower EDR detection rates than Cobalt Strike. Organizations relying solely on Cobalt Strike signatures for Iranian APT detection now have a confirmed blind spot.</li> <li><strong>New espionage campaign targets Azerbaijan and Turkey.</strong> The <strong>TWOSTROKE</strong> malware campaign, attributed to suspected Iranian espionage actors, expanded its targeting to Azerbaijani and Turkish organizations &mdash; likely driven by Turkey's military cooperation with Israel and Azerbaijan's strategic energy infrastructure (BTC pipeline, Shah Deniz gas).</li> <li><strong>F5 BIG-IP receives new security advisory (K000160515)</strong> amid active exploitation of F5 appliances in the wild. Combined with the still-active <strong>CVE-2025-53521</strong> (CVSS 9.8, pre-auth RCE) and <strong>CVE-2026-3055</strong> (Citrix NetScaler, CVSS 9.3, SAML key leakage), the edge-device attack surface remains the single most exploited vector in this conflict.</li> <li><strong>Axios npm supply chain compromise now detectable.</strong> A Nessus detection plugin was published on 31 March for the backdoored Axios npm package (~45 million weekly downloads). The compromised version deploys a cross-platform remote access trojan. Detection is now possible &mdash; but remediation across development environments remains urgent.</li> <li><strong>OAuth authorization flow attacks documented in detail.</strong> New research confirms attackers can abuse OAuth device code grants and authorization code flows to bypass MFA entirely, obtain persistent access tokens, and maintain indefinite access &mdash; with no attacker-controlled infrastructure required. Iranian actors have been observed adopting these exact techniques against cloud environments.</li> </ul> <h2><strong>Conflict &amp; Threat Timeline&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <table> <thead> <tr> <th> <p>Date</p> </th> <th> <p>Event</p> </th> </tr> </thead> <tbody> <tr> <td> <p>28 Feb 2026</p> </td> <td> <p>Iran-US kinetic conflict begins; Iranian cyber operations activate</p> </td> </tr> <tr> <td> <p>~10 Mar 2026</p> </td> <td> <p>UNC5858 Rafael defense impersonation campaign last observed</p> </td> </tr> <tr> <td> <p>~11 Mar 2026</p> </td> <td> <p>iranat[.]click phishing infrastructure last active subdomain</p> </td> </tr> <tr> <td> <p>~18 Mar 2026</p> </td> <td> <p>Israeli strikes kill Khamenei and Larijani; IRGC command decentralizes</p> </td> </tr> <tr> <td> <p>~18 Mar 2026</p> </td> <td> <p>UNC6446 aerospace/DIB espionage (SHADYSMILE malware) last observed</p> </td> </tr> <tr> <td> <p>~24 Mar 2026</p> </td> <td> <p>CISA ICS advisories issued for WAGO switches, PTC Windchill, Anritsu, others</p> </td> </tr> <tr> <td> <p>26 Mar 2026</p> </td> <td> <p>APT42/CALANQUE TAMECAT phishing kit updated &mdash; possible infrastructure rotation</p> </td> </tr> <tr> <td> <p>27 Mar 2026</p> </td> <td> <p>Handala Hack Team breaches FBI Director's personal Gmail; 300+ emails published</p> </td> </tr> <tr> <td> <p>28&ndash;30 Mar 2026</p> </td> <td> <p>CVE-2025-53521 (F5 BIG-IP, CVSS 9.8) and CVE-2026-3055 (Citrix NetScaler, CVSS 9.3) reach active exploitation</p> </td> </tr> <tr> <td> <p>30 Mar 2026</p> </td> <td> <p>Google/Mandiant publishes Campaign 26.029: MuddyWater espionage across 17 countries with 15+ custom backdoors</p> </td> </tr> <tr> <td> <p>31 Mar 2026</p> </td> <td> <p>TWOSTROKE campaign updated &mdash; Iranian espionage expands to Azerbaijan and Turkey</p> </td> </tr> <tr> <td> <p>31 Mar 2026</p> </td> <td> <p>Axios npm supply chain Nessus detection plugin published</p> </td> </tr> <tr> <td> <p>31 Mar 2026</p> </td> <td> <p>AdaptixC2 confirmed on Iranian APT infrastructure</p> </td> </tr> <tr> <td> <p>1 Apr 2026</p> </td> <td> <p>F5 BIG-IP advisory K000160515 published; intelligence collection cutoff</p> </td> </tr> </tbody> </table> <h2><strong>Key Threat Analysis&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <h3><strong>1. MOIS Global Espionage at Scale &mdash; MuddyWater, OilRig, UNC5203</strong></h3> <p>The most significant intelligence development this cycle is the confirmation that Iran's Ministry of Intelligence and Security (MOIS) is running a <strong>global espionage campaign of unprecedented breadth</strong>. MuddyWater subclusters UNC3313 and UNC5667 are deploying 15+ custom backdoors and abusing legitimate remote access tools (T1219) across commercial, education, energy, government, non-profit, telecommunications, and utilities sectors in 17 countries.</p> <p>This is not surgical espionage &mdash; it is broad collection by a regime under existential threat, casting a wide intelligence net and selectively exploiting high-value targets after initial access.</p> <p>The confirmation that Iranian operators are now using <strong>AdaptixC2</strong> &mdash; an open-source C2 framework &mdash; alongside their traditional tooling represents a deliberate effort to evade the Cobalt Strike detection signatures that most SOCs rely on. This mirrors the tooling diversification already seen from Russian and Chinese APT groups (Sliver, Mythic, Havoc) and should be treated as a permanent shift, not an anomaly.</p> <p><strong>Named actors:</strong> MuddyWater (UNC3313, UNC5667), OilRig/APT34, UNC5203 (Handala Hack Team / Homeland Justice)</p> <p><strong>Key TTPs:</strong> T1190 (Exploit Public-Facing Application), T1059.001 (PowerShell), T1219 (Remote Access Software), T1078 (Valid Accounts), T1071.001 (Web Protocols C2), T1573.002 (Asymmetric Crypto Encrypted Channel)</p> <h3><strong>2. The Cyber Av3ngers Silence &mdash; The Most Dangerous Signal</strong></h3> <p><strong>Cyber Av3ngers</strong> (also tracked as HYDRO KITTEN), the IRGC-CEC-affiliated group responsible for the 2023 Unitronics PLC campaign against US water utilities, has been <strong>silent for 21+ days</strong> during the most intense phase of the conflict. This is not reassuring &mdash; it is alarming.</p> <p>Every previous major ICS operation by Iranian actors was preceded by a quiet period. The convergence of factors &mdash; regime decapitation creating decentralized IRGC command, CISA's reduced operational capacity, and Iran's public designation of cloud providers as kinetic targets &mdash; creates maximum opportunity for a destructive ICS/OT operation.</p> <p>The <strong>IOCONTROL</strong> malware, previously associated with Cyber Av3ngers targeting of energy infrastructure, remains confirmed active with high confidence.</p> <p><strong>Assessment:</strong> The silence is more consistent with pre-operational security than capability degradation. Probability of resurfacing (under a new persona or with a visible ICS operation) within 7 days: <strong>50%</strong>.</p> <h3><strong>3. Edge Device Exploitation &mdash; The Primary Entry Point</strong></h3> <p>Iranian actors continue to exploit internet-facing edge devices as their primary initial access vector. The active exploitation landscape includes:</p> <ul> <li><strong>CVE-2025-53521</strong> &mdash; F5 BIG-IP pre-auth RCE (CVSS 9.8), with memory-resident webshells deployed past CISA's patch deadline</li> <li><strong>CVE-2026-3055</strong> &mdash; Citrix NetScaler SAML signing key leakage (CVSS 9.3)</li> <li><strong>F5 advisory K000160515</strong> &mdash; New advisory published 1 April; CVE pending NVD assignment</li> <li>Additional tracked CVEs across Ivanti Connect Secure and Cisco SD-WAN/FMC</li> </ul> <p>Nine or more CVEs are under active tracking in this campaign. Any unpatched edge device is an open door.</p> <h3><strong>4. Supply Chain Compromise &mdash; Systemic Risk Accumulating</strong></h3> <p>Three simultaneous supply chain compromises are active:</p> <table> <thead> <tr> <th> <p>Campaign</p> </th> <th> <p>Vector</p> </th> <th> <p>Impact</p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>Axios npm backdoor</strong></p> </td> <td> <p>Compromised npm maintainer account</p> </td> <td> <p>~45M weekly downloads; cross-platform RAT deployed</p> </td> </tr> <tr> <td> <p><strong>TeamPCP / PyPI</strong></p> </td> <td> <p>Malicious Python packages</p> </td> <td> <p>Developer workstation compromise</p> </td> </tr> <tr> <td> <p><strong>GlassWorm / Solana</strong></p> </td> <td> <p>Blockchain-based C2 channel</p> </td> <td> <p>Novel exfiltration via Solana transactions</p> </td> </tr> </tbody> </table> <p>The Axios compromise is now detectable via Nessus plugin (published 31 March), but detection does not equal remediation. Any organization with JavaScript or Python dependencies should assume exposure until verified clean.</p> <h3><strong>5. OAuth and Cloud Access &mdash; MFA Is Not Enough</strong></h3> <p>Documented attacks exploiting OAuth device authorization grants and authorization code flows demonstrate that <strong>MFA can be completely bypassed</strong> through legitimate OAuth mechanisms. Attackers reuse legitimate client IDs, obtain tokens that never trigger MFA challenges, and refresh them indefinitely.</p> <p>Iranian actors &mdash; particularly <strong>APT42</strong> (IRGC-IO) and <strong>UNC5203</strong> &mdash; have been observed adopting these techniques against cloud environments. The combination of OAuth token theft (T1528), token reuse (T1550.001), and device code flow abuse (T1621) represents a fundamental challenge to identity-centric security models.</p> <h3><strong>6. TWOSTROKE &mdash; Geographic Expansion of Iranian Espionage</strong></h3> <p>The <strong>TWOSTROKE</strong> malware campaign's expansion to Azerbaijan and Turkey signals that Iranian intelligence collection is no longer confined to traditional adversaries. Azerbaijan's energy infrastructure and Turkey's military cooperation with Israel make them logical MOIS targets. This campaign uses spearphishing with themed decoys (T1566.001) and PowerShell-based execution chains (T1059.001).</p> <p><strong>Assessment:</strong> 40% probability of further expansion to Georgian or Central Asian targets following the Turkic-language targeting pattern.</p> <h2><strong>Predictive Analysis &mdash; What Comes Next</strong></h2> <table> <thead> <tr> <th> <p>Scenario</p> </th> <th> <p>Probability</p> </th> <th> <p>Timeframe</p> </th> <th> <p>Basis</p> </th> </tr> </thead> <tbody> <tr> <td> <p>MuddyWater deploys new POWERSTATS variant via AdaptixC2 against Gulf state government targets</p> </td> <td> <p><strong>70%</strong></p> </td> <td> <p>72 hours</p> </td> <td> <p>31 Mar Anomali ThreatStream Next-Gen update cadence; 17-country campaign scope; confirmed AdaptixC2 adoption</p> </td> </tr> <tr> <td> <p>Cyber Av3ngers resurface under new persona or execute visible ICS/OT operation</p> </td> <td> <p><strong>50%</strong></p> </td> <td> <p>7 days</p> </td> <td> <p>21-day silence matches pre-operation OPSEC pattern; peak conflict conditions</p> </td> </tr> <tr> <td> <p>TWOSTROKE campaign expands to Georgia or Central Asia</p> </td> <td> <p><strong>40%</strong></p> </td> <td> <p>14 days</p> </td> <td> <p>Turkic-language targeting pattern; Azerbaijan geographic proximity</p> </td> </tr> <tr> <td> <p>APT42/CALANQUE resumes nuclear sector espionage with rotated infrastructure</p> </td> <td> <p><strong>30%</strong></p> </td> <td> <p>14 days</p> </td> <td> <p>TAMECAT phishing kit updated 26 Mar suggests preparation, not abandonment</p> </td> </tr> <tr> <td> <p>ClickFix social engineering technique adopted by Iranian actors</p> </td> <td> <p><strong>25%</strong></p> </td> <td> <p>30 days</p> </td> <td> <p>13 global ClickFix campaigns tracked; Iranian actors historically rapid adopters</p> </td> </tr> </tbody> </table> <h2><strong>SOC Operational Guidance&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <h3><strong>What to Hunt For</strong></h3> <p><strong>Hypothesis 1: AdaptixC2 beaconing from internal hosts</strong> Iranian APTs have confirmed use of AdaptixC2 on Tehran-based infrastructure. Hunt for:</p> <ul> <li>Outbound connections to ports 50443, 8010, 4444 (AdaptixC2 defaults)</li> <li>JA3/JA4 fingerprints associated with AdaptixC2 TLS handshakes</li> <li>HTTP/S beaconing with regular intervals to IPs in ASN 51889 or ASN 44208</li> <li><strong>ATT&amp;CK:</strong> T1071.001, T1573.002</li> </ul> <p><strong>Hypothesis 2: Cyber Av3ngers ICS pre-positioning</strong> The 21-day silence demands proactive hunting, not passive waiting:</p> <ul> <li>Scan for Unitronics Vision/Samba PLC reconnaissance from Iranian ASNs</li> <li>Monitor Shodan/Censys for scanning of Unitronics and Schneider Electric devices from Iranian IP ranges</li> <li><strong>ATT&amp;CK:</strong> T1190, T0883 (Internet Accessible Device), T0855 (Unauthorized Command Message)</li> </ul> <p><strong>Hypothesis 3: SHADYSMILE developer platform compromise</strong> UNC6446 aerospace espionage has been quiet for 14 days &mdash; long dwell times are expected for this actor:</p> <ul> <li>Audit internal GitHub/GitLab for dormant accounts matching UNC6446 TTPs</li> <li>Search for SHADYSMILE indicators on developer workstations</li> <li>Review repository access logs for unusual cloning or forking patterns</li> <li><strong>ATT&amp;CK:</strong> T1195.002, T1199 (Trusted Relationship)</li> </ul> <p><strong>Hypothesis 4: OAuth device code flow abuse</strong></p> <ul> <li>Alert on unusual device code authorization grants in Azure AD/Entra ID, especially from non-device endpoints</li> <li>Monitor for token refresh patterns from unexpected geolocations</li> <li>Search for applications with excessive OAuth scopes granted via consent flows</li> <li><strong>ATT&amp;CK:</strong> T1528, T1550.001, T1621</li> </ul> <h3><strong>Detection Rules to Prioritize</strong></h3> <ul> <li><strong>Edge device exploitation:</strong> Ensure IDS/IPS signatures are current for CVE-2025-53521 (F5 BIG-IP) and CVE-2026-3055 (Citrix NetScaler). Monitor for post-exploitation webshell indicators on F5 appliances.</li> <li><strong>PowerShell-based backdoors:</strong> Enhance logging and alerting for T1059.001 &mdash; MuddyWater's POWERSTATS lineage relies heavily on PowerShell. Enable Script Block Logging and Constrained Language Mode where feasible.</li> <li><strong>Legitimate RAT abuse:</strong> Alert on unexpected installations of remote access tools (AnyDesk, ScreenConnect, Atera) &mdash; Iranian actors use these as living-off-the-land persistence (T1219).</li> <li><strong>Supply chain indicators:</strong> Run npm audit across all JavaScript projects; cross-reference Axios package versions against the Nessus plugin for the backdoored release.</li> </ul> <h2><strong>Sector-Specific Defensive Priorities</strong></h2> <h3><strong>Financial Services</strong></h3> <p>Iranian state actors have historically targeted financial institutions for both espionage and destructive attacks (the 2012&ndash;2013 Operation Ababil DDoS campaign set the precedent). In the current conflict:</p> <ul> <li><strong>Priority:</strong> OAuth and cloud identity security. Financial institutions' heavy reliance on cloud services and federated identity makes them prime targets for the OAuth device code flow attacks documented this cycle. Audit all OAuth application consents in your tenant. Revoke overly permissive grants. Implement conditional access policies that restrict device code flow to managed devices only.</li> <li><strong>Priority:</strong> Monitor for DDoS-for-hire escalation. The Aisuru-Kimwolf botnet remains available to pro-Iranian hacktivists; financial services are a traditional target for retaliatory DDoS during geopolitical escalation.</li> <li><strong>ATT&amp;CK focus:</strong> T1528, T1550.001, T1621, T1498 (Network Denial of Service)</li> </ul> <h3><strong>Energy</strong></h3> <p>This sector faces the highest risk of destructive attack in the current threat environment:</p> <ul> <li><strong>Priority:</strong> ICS/OT network segmentation validation. The Cyber Av3ngers silence is most dangerous for energy operators. Validate that SCADA systems are not directly reachable from IT networks. Specifically hunt for IOCONTROL malware indicators (SHA-256 hash above) on any system that bridges IT/OT boundaries.</li> <li><strong>Priority:</strong> Edge device patching. Energy companies running F5 BIG-IP or Citrix NetScaler for remote access to operational networks must treat CVE-2025-53521 and CVE-2026-3055 as emergency patches &mdash; these are confirmed entry points for Iranian operators targeting this sector.</li> <li><strong>Priority:</strong> Monitor for TWOSTROKE targeting if you operate in Azerbaijan, Turkey, or adjacent energy corridors (BTC pipeline, Shah Deniz, TANAP).</li> <li><strong>ATT&amp;CK focus:</strong> T1190, T0883, T0855, T1078</li> </ul> <h3><strong>Healthcare</strong></h3> <p>Healthcare organizations face dual risk from both state-sponsored espionage and ransomware operators who may be operating with tacit Iranian state approval:</p> <ul> <li><strong>Priority:</strong> Supply chain hygiene. Healthcare IT environments frequently rely on JavaScript-based applications and patient portal frameworks that may include Axios as a dependency. Audit immediately.</li> <li><strong>Priority:</strong> Ransomware preparedness. The MOIS-cybercrime convergence trend (Pay2Key ransomware-as-a-service) means healthcare organizations could face ransomware attacks with state-level sophistication. Ensure offline backups are current and tested.</li> <li><strong>Priority:</strong> Phishing resilience. MuddyWater's spearphishing campaigns use themed decoys &mdash; healthcare-themed lures targeting medical research and pharmaceutical organizations are consistent with Iranian collection priorities.</li> <li><strong>ATT&amp;CK focus:</strong> T1566.001, T1195.002, T1486 (Data Encrypted for Impact)</li> </ul> <h3><strong>Government</strong></h3> <p>Government agencies &mdash; particularly those involved in defense, diplomacy, and intelligence &mdash; are primary targets:</p> <ul> <li><strong>Priority:</strong> Credential and identity security. The Handala Hack Team breach of the FBI Director's personal Gmail demonstrates that Iranian actors will target personal accounts of government officials to bypass institutional security controls. Brief all senior officials on personal account security, including hardware security keys and separation of personal/professional communications.</li> <li><strong>Priority:</strong> DIB contractor oversight. UNC6446's SHADYSMILE campaign targeting aerospace contractors through developer platforms has been quiet for 14 days &mdash; which for a pre-positioning operation may indicate successful dwell, not abandonment. Require DIB contractors to report anomalous developer platform activity.</li> <li><strong>Priority:</strong> Diplomatic communications security. With no ceasefire negotiations visible, expect Iranian intelligence collection against diplomatic channels to intensify.</li> <li><strong>ATT&amp;CK focus:</strong> T1078, T1199, T1195.002, T1114 (Email Collection)</li> </ul> <h3><strong>Aviation &amp; Logistics</strong></h3> <p>Aviation and logistics organizations face espionage risk from Iranian actors seeking intelligence on military supply chains and sanctions evasion:</p> <ul> <li><strong>Priority:</strong> Developer platform security. UNC6446's targeting of aerospace organizations through GitHub/GitLab makes this sector a direct target. Audit repository access controls, review for dormant or suspicious accounts, and monitor for unusual code access patterns.</li> <li><strong>Priority:</strong> Edge device hardening. Aviation logistics networks frequently use VPN concentrators and load balancers (F5, Citrix, Ivanti) for partner connectivity &mdash; all of which are under active Iranian exploitation.</li> <li><strong>Priority:</strong> Third-party risk. Aviation supply chains involve numerous subcontractors and logistics partners. Any partner running unpatched edge devices or compromised npm dependencies becomes an entry point.</li> <li><strong>ATT&amp;CK focus:</strong> T1190, T1199, T1195.002, T1041 (Exfiltration Over C2 Channel)</li> </ul> <h2><strong>Prioritized Defense Recommendations</strong></h2> <h3><strong>IMMEDIATE (Within 24 Hours)</strong></h3> <table> <thead> <tr> <th> <p>Action</p> </th> <th> <p>Owner</p> </th> </tr> </thead> <tbody> <tr> <td> <p>Deploy AdaptixC2 detection signatures &mdash; JA3/JA4 fingerprints, default beacon ports (50443, 8010, 4444). Iranian APTs confirmed using this framework on Tehran-based infrastructure.</p> </td> <td> <p>SOC</p> </td> </tr> <tr> <td> <p>Review F5 BIG-IP APM patch status against advisory K000160515 (published 1 April) and CVE-2025-53521. Confirm no memory-resident webshells on F5 appliances.</p> </td> <td> <p>IT Ops</p> </td> </tr> <tr> <td> <p>Verify Citrix NetScaler patching against CVE-2026-3055. Rotate any SAML signing keys that may have been exposed.</p> </td> <td> <p>IT Ops</p> </td> </tr> <tr> <td> <p>Brief executive leadership and board on current threat level. Iranian actors have demonstrated willingness to target senior officials' personal accounts (Handala/FBI Director breach). Recommend hardware security keys for all C-suite personal email.</p> </td> <td> <p>CISO / Executive</p> </td> </tr> </tbody> </table> <h3><strong>7-DAY</strong></h3> <table> <thead> <tr> <th> <p>Action</p> </th> <th> <p>Owner</p> </th> </tr> </thead> <tbody> <tr> <td> <p>Audit all npm projects for Axios package integrity. Run npm audit and cross-reference against the published Nessus detection plugin. Extend to PyPI dependencies (TeamPCP indicators).</p> </td> <td> <p>DevOps</p> </td> </tr> <tr> <td> <p>Implement OAuth device code flow monitoring in Azure AD/Entra ID. Alert on device code grants from non-device endpoints and unusual token refresh patterns.</p> </td> <td> <p>SOC / Identity Team</p> </td> </tr> <tr> <td> <p>Conduct proactive threat hunt for Cyber Av3ngers / HYDRO KITTEN ICS activity &mdash; Unitronics/Schneider PLC scanning, IOCONTROL C2 callbacks, and the IOCONTROL hash listed above.</p> </td> <td> <p>SOC / OT Security</p> </td> </tr> <tr> <td> <p>Hunt for SHADYSMILE indicators on internal GitHub/GitLab instances and developer workstations. Audit for dormant accounts matching UNC6446 TTPs.</p> </td> <td> <p>SOC / DevOps</p> </td> </tr> <tr> <td> <p>Validate incident response playbooks for destructive ICS/OT attack scenarios. Ensure OT-specific IR procedures exist and are exercised &mdash; do not assume IT IR playbooks transfer to OT environments.</p> </td> <td> <p>IR Team</p> </td> </tr> <tr> <td> <p>Review and restrict OAuth application consents across cloud tenants. Revoke unnecessary scopes. Implement admin consent workflow for new application registrations.</p> </td> <td> <p>Identity / Cloud Team</p> </td> </tr> </tbody> </table> <h3><strong>30-DAY</strong></h3> <table> <thead> <tr> <th> <p>Action</p> </th> <th> <p>Owner</p> </th> </tr> </thead> <tbody> <tr> <td> <p>Commission assessment of ICS/OT network segmentation. Validate that SCADA/PLC systems are isolated from IT networks and that monitoring covers the IT/OT boundary. The Cyber Av3ngers silence may precede a major operation.</p> </td> <td> <p>CISO / OT Security</p> </td> </tr> <tr> <td> <p>Migrate from Cobalt Strike-only C2 detection to multi-framework coverage. Add detection for AdaptixC2, Sliver, Havoc, and Mythic. Iranian (and Russian/Chinese) APTs are permanently diversifying beyond Cobalt Strike.</p> </td> <td> <p>SOC / Detection Engineering</p> </td> </tr> <tr> <td> <p>Evaluate supply chain security tooling (Socket.dev, Snyk, or equivalent) for continuous monitoring of open-source dependencies across development environments. Three simultaneous supply chain compromises represent systemic risk.</p> </td> <td> <p>DevOps / AppSec</p> </td> </tr> <tr> <td> <p>Conduct tabletop exercise simulating a combined Iranian cyber-kinetic scenario: simultaneous edge device exploitation, ICS/OT disruption, and hacktivist data leak. Test cross-functional coordination between IT security, OT operations, legal, and communications.</p> </td> <td> <p>CISO / Executive</p> </td> </tr> <tr> <td> <p>Reassess threat intelligence collection coverage for defense industrial base (DIB) pre-positioning. 14+ days without visibility into UNC6446 aerospace espionage is a gap that needs active closure, not passive monitoring.</p> </td> <td> <p>CTI / CISO</p> </td> </tr> </tbody> </table> <h2><strong>The Bottom Line&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <p>We are 32 days into a conflict that has produced the most intense Iranian cyber operations ever documented. The intelligence picture is clear:</p> <p><strong>Iran's MOIS has gone broad.</strong> Seventeen countries, seven industries, 15+ custom backdoors. This is not targeted espionage &mdash; it is a regime under existential threat conducting mass collection. Your organization does not need to be a primary target to be caught in this net.</p> <p><strong>Iran's IRGC is going quiet &mdash; and that's worse.</strong> The Cyber Av3ngers' 21-day silence during peak conflict conditions, combined with decentralized IRGC command after leadership decapitation, creates the conditions for an uncontrolled destructive ICS/OT operation. If you operate critical infrastructure, the time to validate your OT segmentation and IR readiness is now &mdash; not after the attack.</p> <p><strong>Your detection stack has a blind spot.</strong> The confirmed adoption of AdaptixC2 by Iranian operators means Cobalt Strike-centric detection is no longer sufficient. The same shift is happening with supply chain attacks &mdash; three active compromises across npm and PyPI mean your developers' npm install is an attack surface.</p> <p><strong>MFA is necessary but not sufficient.</strong> OAuth device code flow attacks bypass MFA entirely through legitimate mechanisms. Identity security must evolve beyond "did they pass MFA?" to "is this token grant pattern normal?"</p> <p>The absence of ceasefire signals 32 days into this conflict is itself intelligence. There is no off-ramp visible. Cyber operations will intensify, not moderate. Act accordingly.</p>

FEATURED RESOURCES

April 1, 2026
Anomali Cyber Watch

Iran's Cyber War Machine Hits Full Stride: What CISOs Must Do Right Now

Read More
April 1, 2026
Public Sector
Anomali Cyber Watch

When Federal Cyber Defenses Shrink, State Governments Stand in the Crossfire

Read More
March 31, 2026
Anomali Cyber Watch

Iran Cyber War, Day 32: FBI Director Breached, Critical Infrastructure Under Siege, and the Silence That Should Worry You Most

Read More
Explore All