All Posts
Anomali Cyber Watch
1
min read

State Cyber Threat Picture Just Changed

Published on
March 13, 2026
Table of Contents
<p> The convergence of threats facing U.S. state governments this week is unlike anything we've tracked in recent memory. An Iran-linked group just demonstrated it can brick 200,000 devices by weaponizing the same endpoint management tool your agencies rely on every day. A Chinese espionage campaign has been quietly operating inside government and critical infrastructure networks across 40 countries &mdash; for nearly a decade. A CVSS 9.9 vulnerability in a popular automation platform is being actively exploited in the wild. And the federal agency states depend on most for cyber support &mdash; CISA &mdash; is operating at reduced capacity during all of it. </p> <p> This is not a theoretical risk briefing. These are operational realities that demand decisions from state IT leadership this week. </p> <h2> <strong> What Changed </strong> </h2> <p> Five developments in the past two weeks have materially altered the risk calculus for state government IT: </p> <ol> <li> <br /> <strong> Microsoft Intune was weaponized as a destructive tool for the first time at scale. </strong> The Iran-linked hacktivist group Handala (also tracked as BANISHED KITTEN, UNC5203, Cotton Sandstorm, and Haywire Kitten) compromised Intune administrator credentials at Stryker Corporation &mdash; a $20 billion medical device manufacturer &mdash; and issued remote wipe commands across the enterprise. The group claims 200,000 devices were rendered inoperable and 50 terabytes of data exfiltrated. Every state agency running Intune for mobile device management has the same exposure. <br /> <br /> </li> <li> <br /> <strong> CISA added CVE-2025-68613 to the Known Exploited Vulnerabilities catalog. </strong> This is a CVSS 9.9 remote code execution flaw in n8n, an open-source workflow automation platform increasingly adopted by government IT shops. Over 24,700 instances remain internet-exposed, and the Zerobot malware is actively targeting them. <br /> <br /> </li> <li> <br /> <strong> CISA itself is operating under a partial DHS shutdown. </strong> The acting CISA director has been reassigned. Threat advisory staffing is reduced. The CIRCIA cyber incident reporting rule &mdash; which would have established mandatory reporting requirements &mdash; is delayed indefinitely. States are increasingly on their own. <br /> <br /> </li> <li> <br /> <strong> A nine-year Chinese espionage campaign was disclosed targeting government, telecom, energy, and utilities. </strong> Google/Mandiant revealed GRIDTIDE, attributed to China-nexus actor UNC2814, with 53 confirmed victims across 40 countries. The campaign's command-and-control channel &mdash; Google Sheets API traffic &mdash; evades most standard network monitoring. <br /> <br /> </li> <li> <br /> <strong> Trojanized VPN client installers are targeting government workers via search engine poisoning. </strong> Microsoft disclosed that threat actor Storm-2561 is distributing digitally signed malicious Ivanti and SonicWall VPN installers that deploy the Bumblebee loader and Hyrax credential stealer. The fake installers bypass application whitelisting controls. <br /> <br /> </li> </ol> <h2> <strong> Threat Timeline: Key Events (26 February &ndash; 13 March 2026) </strong> </h2> <table> <thead> <tr> <th> <p> <strong> Date </strong> </p> </th> <th> <p> <strong> Event </strong> </p> </th> <th> <p> <strong> Severity </strong> </p> </th> </tr> </thead> <tbody> <tr> <td> <p> 26 Feb </p> </td> <td> <p> Google/Mandiant reveals <strong> GRIDTIDE </strong> espionage campaign by China-nexus actor <strong> UNC2814 </strong> &mdash; active since 2017, 53 victims across 40 countries targeting government, telecom, energy, and utilities </p> </td> <td> <p> 🔴 High </p> </td> </tr> <tr> <td> <p> 2 Mar </p> </td> <td> <p> DHS partial shutdown begins; CISA staffing reductions take effect </p> </td> <td> <p> 🟡 Elevated </p> </td> </tr> <tr> <td> <p> 3 Mar </p> </td> <td> <p> SecurityWeek reports Iranian hacktivist activity surging but state-sponsored operations remain below expected levels &mdash; a gap that historically closes within 2&ndash;4 weeks </p> </td> <td> <p> 🟡 Elevated </p> </td> </tr> <tr> <td> <p> 3 Mar </p> </td> <td> <p> CNBC: <em> "The lead U.S. cyber agency is stretched thin as Iran hacking threat escalates" </em> </p> </td> <td> <p> 🟡 Elevated </p> </td> </tr> <tr> <td> <p> 9&ndash;11 Mar </p> </td> <td> <p> Billington Cybersecurity Summit convenes state CISOs; federal attribution/sanctions legislation proposed </p> </td> <td> <p> 🔵 Informational </p> </td> </tr> <tr> <td> <p> 11 Mar </p> </td> <td> <p> <strong> Handala claims destructive wiper attack on Stryker Corporation </strong> via Microsoft Intune abuse; Stryker files SEC 8-K </p> </td> <td> <p> 🔴 Critical </p> </td> </tr> <tr> <td> <p> 11 Mar </p> </td> <td> <p> <strong> CISA adds CVE-2025-68613 </strong> (n8n RCE, CVSS 9.9) to KEV; Zerobot malware actively exploiting </p> </td> <td> <p> 🔴 Critical </p> </td> </tr> <tr> <td> <p> 12 Mar </p> </td> <td> <p> Microsoft discloses <strong> Storm-2561 </strong> campaign distributing trojanized VPN clients (Ivanti, SonicWall) via SEO poisoning, deploying <strong> Bumblebee </strong> loader and <strong> Hyrax </strong> credential stealer </p> </td> <td> <p> 🟠 High </p> </td> </tr> </tbody> </table> <h2> <strong> Threat Analysis </strong> </h2> <h3> <strong> 1. Iranian Destructive Operations: Handala and the Intune Threat </strong> </h3> <p> <strong> What happened: </strong> Handala &mdash; an Iran-linked hacktivist group with 146 claimed victims since 2024 and government as their second most-targeted sector &mdash; compromised Microsoft Intune administrator credentials at Stryker Corporation and used the platform's legitimate remote wipe capability to destroy endpoints at scale. This is not malware. This is the abuse of an authorized management tool, which makes it exceptionally difficult to detect with traditional security controls. </p> <p> <strong> Why it matters for state government: </strong> Microsoft Intune is the standard MDM platform across most state agencies. A compromised Intune Global Administrator account &mdash; obtained through phishing, token theft, or a misconfigured conditional access policy &mdash; gives an attacker the ability to wipe every managed device in the environment in minutes. There is no malware to detect. There is no lateral movement to observe. The wipe command is a legitimate platform function. </p> <p> Handala's operational tempo has accelerated dramatically since the Iran conflict began: 15+ claimed operations in March 2026 alone, including attacks on Verifone, Hebrew University, Jerusalem municipal cameras, water infrastructure, and Saudi Aramco. Across the broader Iranian hacktivist ecosystem, 149 DDoS attacks have been recorded across 16 countries. </p> <p> <strong> The deeper concern: </strong> Handala and similar hacktivist groups are the vanguard. Iran's state-sponsored cyber operators &mdash; <strong> MuddyWater </strong> (STATIC KITTEN), <strong> OilRig </strong> (APT34), and <strong> Charming Kitten </strong> (APT42) &mdash; have not yet fully engaged against U.S. domestic targets in this conflict cycle. Historical patterns show state-sponsored operations lag hacktivist activity by 2&ndash;4 weeks as targeting packages are developed. When they engage, expect targeted spear-phishing, credential harvesting, and potential destructive attacks against OT/SCADA systems &mdash; including water treatment, transportation management, and emergency services. </p> <p> <strong> Key IOCs: </strong> <br /> - Handala data leak sites: handala-hack.to (active, behind DDoS-Guard) and .onion mirror <br /> - Telegram channel: t.me/HANDALA_HPR2 </p> <h3> <strong> 2. GRIDTIDE: A Nine-Year Chinese Espionage Campaign You May Already Be Inside </strong> </h3> <p> <strong> What happened: </strong> Google Threat Intelligence Group and Mandiant disclosed <strong> GRIDTIDE </strong> , a campaign attributed to China-nexus actor <strong> UNC2814 </strong> that has been operating since <strong> 2017 </strong> with at least 53 confirmed victims across 40 countries. The campaign targets energy, government, telecommunications, and utilities &mdash; four sectors that map directly to state government responsibilities. </p> <p> <strong> The detection problem: </strong> GRIDTIDE's backdoor conceals command-and-control traffic within <strong> Google Sheets API activity </strong> . To your network monitoring tools, this looks like a legitimate user interacting with a Google productivity application. It will pass through web proxies, bypass URL filtering, and generate no alerts in most SIEM configurations. Google has disrupted the operation, but residual access in compromised networks likely persists. </p> <p> <strong> Why state government is in the target set: </strong> State networks sit at the intersection of government administration, utilities oversight (water/wastewater SCADA), telecom coordination, and energy regulation &mdash; all four GRIDTIDE target sectors. The campaign's nine-year operational history means that the absence of known state government victims may reflect detection gaps, not non-targeting. </p> <h3> <strong> 3. Critical Vulnerabilities in the State Technology Stack </strong> </h3> <p> Multiple critical vulnerabilities are being actively exploited in technologies commonly deployed across state government: </p> <table> <thead> <tr> <th> <p> <strong> CVE </strong> </p> </th> <th> <p> <strong> Product </strong> </p> </th> <th> <p> <strong> CVSS </strong> </p> </th> <th> <p> <strong> Status </strong> </p> </th> <th> <p> <strong> State Government Relevance </strong> </p> </th> </tr> </thead> <tbody> <tr> <td> <p> <strong> CVE-2025-68613 </strong> </p> </td> <td> <p> n8n workflow automation </p> </td> <td> <p> <strong> 9.9 </strong> </p> </td> <td> <p> CISA KEV; Zerobot actively exploiting; 24,700 instances exposed </p> </td> <td> <p> Adopted by IT shops for helpdesk, data integration, and alert routing automation </p> </td> </tr> <tr> <td> <p> <strong> CVE-2025-55182 </strong> </p> </td> <td> <p> React Server Components ("React2Shell") </p> </td> <td> <p> <strong> 10.0 </strong> </p> </td> <td> <p> China-nexus exploitation reported </p> </td> <td> <p> Citizen-facing web portals commonly built on React </p> </td> </tr> <tr> <td> <p> <strong> CVE-2025-31324 </strong> </p> </td> <td> <p> SAP NetWeaver </p> </td> <td> <p> <strong> 10.0 </strong> </p> </td> <td> <p> Actively exploited </p> </td> <td> <p> State ERP/financial systems frequently run SAP </p> </td> </tr> <tr> <td> <p> <strong> CVE-2025-2783 </strong> </p> </td> <td> <p> Google Chrome (sandbox escape) </p> </td> <td> <p> <strong> 8.3 </strong> </p> </td> <td> <p> Actively exploited </p> </td> <td> <p> Chromium-based browsers standard on state endpoints </p> </td> </tr> <tr> <td> <p> Multiple </p> </td> <td> <p> Fortinet, WatchGuard products </p> </td> <td> <p> Various </p> </td> <td> <p> Actively exploited </p> </td> <td> <p> Common state network edge devices </p> </td> </tr> </tbody> </table> <h3> <strong> 4. Trojanized VPN Clients Targeting Government Workers </strong> </h3> <p> Microsoft disclosed that threat actor <strong> Storm-2561 </strong> is using SEO poisoning to place trojanized VPN client installers &mdash; specifically mimicking <strong> Ivanti </strong> and <strong> SonicWall </strong> products &mdash; at the top of search engine results. The attack chain is elegant and dangerous: </p> <ol> <li> Employee searches for "Ivanti VPN client download" or "SonicWall VPN installer" </li> <li> Attacker-controlled site or compromised GitHub repository appears in top results </li> <li> Employee downloads a <strong> digitally signed </strong> malicious MSI installer (bypasses application whitelisting) </li> <li> Installer sideloads a malicious DLL, deploying the <strong> Bumblebee </strong> loader and <strong> Hyrax </strong> credential stealer </li> <li> A fake VPN login dialog captures the employee's real VPN credentials </li> <li> Credentials are exfiltrated; persistence is established via the Windows RunOnce registry key </li> </ol> <p> This is particularly dangerous for state government because VPN client installation is a routine, expected activity &mdash; especially for remote and hybrid workers. The digital signing of the malicious installer means it may bypass security controls designed to prevent unauthorized software installation. </p> <h3> <strong> 5. Federal Cyber Support Is Degraded at the Worst Possible Time </strong> </h3> <p> The partial DHS shutdown has reduced CISA's operational capacity across threat advisories, vulnerability coordination, and state/local support. The CIRCIA cyber incident reporting rule &mdash; which would have established mandatory reporting timelines for critical infrastructure operators &mdash; is delayed indefinitely. This creates two compounding problems: </p> <ul> <li> <strong> Reduced intelligence flow: </strong> States that rely on CISA and MS-ISAC for threat indicators, vulnerability alerts, and incident response support will experience gaps. </li> <li> <strong> Regulatory uncertainty: </strong> The incident reporting framework that state agencies and critical infrastructure operators were preparing to comply with is now in limbo. </li> </ul> <p> Meanwhile, 99 state-level cybersecurity bills were passed in 2025, and a March 2025 Executive Order directed improvements in state and local cyber efficiency. The legislative and policy landscape is shifting rapidly even as federal operational support contracts. </p> <h2> <strong> Predictive Analysis: What to Expect in the Next 7&ndash;14 Days </strong> </h2> <table> <thead> <tr> <th> <p> <strong> Scenario </strong> </p> </th> <th> <p> <strong> Probability </strong> </p> </th> <th> <p> <strong> Basis </strong> </p> </th> </tr> </thead> <tbody> <tr> <td> <p> Additional Iranian hacktivist attacks (DDoS, defacement) against U.S. government websites and public services </p> </td> <td> <p> <strong> 70&ndash;80% </strong> </p> </td> <td> <p> Handala alone has claimed 15+ operations in March; 149 hacktivist DDoS attacks recorded across 16 countries; state government portals are accessible, high-visibility targets </p> </td> </tr> <tr> <td> <p> Iranian state-sponsored actors (MuddyWater, OilRig, Charming Kitten) begin targeting U.S. government infrastructure directly </p> </td> <td> <p> <strong> 40&ndash;60% </strong> </p> </td> <td> <p> Historical 2&ndash;4 week lag behind hacktivist activity; current absence of state-sponsored operations is consistent with targeting development phase </p> </td> </tr> <tr> <td> <p> Ransomware group successfully hits a U.S. state or local government entity </p> </td> <td> <p> <strong> 40&ndash;60% </strong> </p> </td> <td> <p> Connecticut municipalities hit Jan&ndash;Feb 2026; Taos County (2TB exfiltrated); Mississippi health system breached Feb 2026; Qilin, Akira, Play, Medusa, and Lynx all actively targeting government </p> </td> </tr> <tr> <td> <p> Discovery of GRIDTIDE-related compromise in U.S. state government networks </p> </td> <td> <p> <strong> 25&ndash;40% </strong> </p> </td> <td> <p> Campaign active since 2017 across 40 countries; Google Sheets C2 evades standard monitoring; absence of known state victims likely reflects detection gaps </p> </td> </tr> </tbody> </table> <h2> <strong> SOC Operational Guidance </strong> </h2> <h3> <strong> Detection Priorities </strong> </h3> <p> <strong> Priority 1 &mdash; Microsoft Intune Abuse (Handala TTP) </strong> <br /> - <strong> ATT&amp;CK: </strong> T1078.004 (Valid Accounts: Cloud Accounts), T1485 (Data Destruction), T1098 (Account Manipulation) <br /> - <strong> Hunting hypothesis: </strong> An attacker who compromises an Intune Global Administrator account will issue bulk device wipe or retire commands. Hunt for: Intune audit logs showing wipeDevice, retireDevice, or deleteDevice actions against more than 10 devices within a 1-hour window; new Intune admin role assignments; Intune admin sign-ins from anomalous locations, IP addresses, or non-compliant devices; conditional access policy modifications that weaken MFA requirements. <br /> - <strong> Detection rule: </strong> Alert on any DeviceManagement audit event where the action is wipeDevice AND the count exceeds your baseline threshold within a rolling 60-minute window. Correlate with Entra ID sign-in logs for the initiating admin account. </p> <p> <strong> Priority 2 &mdash; Google Sheets C2 (GRIDTIDE TTP) </strong> <br /> - <strong> ATT&amp;CK: </strong> T1071.001 (Application Layer Protocol: Web Protocols), T1102.002 (Web Service: Bidirectional Communication) <br /> - <strong> Hunting hypothesis: </strong> A compromised endpoint communicating with GRIDTIDE infrastructure will make high-frequency Google Sheets API calls (sheets.googleapis.com) from a non-browser process or with an anomalous user-agent string. Hunt for: processes other than Chrome/Edge making HTTPS connections to sheets.googleapis.com; Google Sheets API calls with service account credentials from endpoints (not servers); unusually large or frequent read/write operations to Google Sheets from a single endpoint. <br /> - <strong> Detection rule: </strong> Monitor DNS and proxy logs for sheets.googleapis.com requests. Baseline normal volume per endpoint. Alert on endpoints exceeding 2 standard deviations above baseline, particularly outside business hours. </p> <p> <strong> Priority 3 &mdash; SEO Poisoning / Trojanized Installers (Storm-2561) </strong> <br /> - <strong> ATT&amp;CK: </strong> T1608.006 (SEO Poisoning), T1218.007 (Msiexec), T1574.002 (DLL Side-Loading), T1056.002 (GUI Input Capture), T1547.001 (Registry Run Keys) <br /> - <strong> Hunting hypothesis: </strong> An employee who downloads a trojanized VPN installer will execute an MSI that sideloads a malicious DLL, creates a RunOnce persistence key, and presents a fake credential dialog. Hunt for: msiexec.exe executions from user Downloads or Temp directories for packages not in your approved software inventory; new RunOnce registry entries created by non-standard processes; DLL loads from the same directory as a recently installed MSI where the DLL is not signed by the expected vendor; network connections to unknown C2 infrastructure shortly after MSI execution. <br /> - <strong> IOC monitoring: </strong> Block or alert on the Handala infrastructure domains listed above. Monitor for Bumblebee and Hyrax malware signatures in your EDR platform. </p> <p> <strong> Priority 4 &mdash; n8n Exploitation (CVE-2025-68613) </strong> <br /> - <strong> ATT&amp;CK: </strong> T1190 (Exploit Public-Facing Application), T1059 (Command and Scripting Interpreter) <br /> - <strong> Hunting hypothesis: </strong> An attacker exploiting CVE-2025-68613 will send crafted expression payloads to n8n's workflow evaluation endpoint, resulting in arbitrary code execution under the n8n service account. Hunt for: n8n process spawning child processes (especially sh, bash, cmd.exe, powershell.exe); outbound network connections from n8n to known Zerobot C2 infrastructure; n8n webhook endpoints receiving unusual POST payloads. </p> <h3> <strong> Prioritized IOCs for Immediate Blocking/Monitoring </strong> </h3> <table> <thead> <tr> <th> <p> <strong> IOC </strong> </p> </th> <th> <p> <strong> Type </strong> </p> </th> <th> <p> <strong> Context </strong> </p> </th> <th> <p> <strong> Action </strong> </p> </th> </tr> </thead> <tbody> <tr> <td> <p> handala-hack[.]to </p> </td> <td> <p> Domain </p> </td> <td> <p> Handala data leak site (active) </p> </td> <td> <p> Block at DNS/proxy </p> </td> </tr> <tr> <td> <p> t[.]me/HANDALA_HPR2 </p> </td> <td> <p> URL </p> </td> <td> <p> Handala Telegram channel </p> </td> <td> <p> Monitor for new claims </p> </td> </tr> <tr> <td> <p> 7e851829ee37bc0cf65a268d1d1baa7a </p> </td> <td> <p> MD5 hash </p> </td> <td> <p> Lynx ransomware sample (active, targeting U.S. government) </p> </td> <td> <p> Block in EDR; hunt in endpoint telemetry </p> </td> </tr> <tr> <td> <p> 0e521e0452f113cdf8b5c2fa6580db1f </p> </td> <td> <p> MD5 hash </p> </td> <td> <p> Lynx ransomware sample (active, targeting U.S. government) </p> </td> <td> <p> Block in EDR; hunt in endpoint telemetry </p> </td> </tr> <tr> <td> <p> sheets[.]googleapis[.]com (anomalous patterns) </p> </td> <td> <p> Network behavior </p> </td> <td> <p> GRIDTIDE C2 channel </p> </td> <td> <p> Baseline and alert on anomalies (do NOT block) </p> </td> </tr> </tbody> </table> <h2> <strong> Sector-Specific Defensive Priorities </strong> </h2> <h3> <strong> Financial Services (Revenue, Taxation, Treasury) </strong> </h3> <p> State revenue and taxation systems process millions of taxpayer records containing SSNs, financial data, and banking information &mdash; making them prime targets for both ransomware operators seeking maximum extortion leverage and espionage actors seeking bulk PII. </p> <ul> <li> <strong> Immediate: </strong> Verify SAP NetWeaver patching status for CVE-2025-31324 (CVSS 10.0). State financial systems running SAP are at critical risk. </li> <li> <strong> 7-day: </strong> Review all API integrations between tax/revenue systems and external services. GRIDTIDE's use of legitimate cloud APIs for C2 means that compromised integrations could exfiltrate financial data through approved channels. </li> <li> <strong> 30-day: </strong> Conduct a ransomware readiness assessment for tax filing season infrastructure. Ensure offline backups of taxpayer databases are current and tested. </li> </ul> <h3> <strong> Energy and Utilities Oversight </strong> </h3> <p> State agencies that regulate or operate water/wastewater systems, power grid coordination, and pipeline safety are explicitly in the GRIDTIDE target set and face escalating Iranian threat activity against OT/SCADA environments. </p> <ul> <li> <strong> Immediate: </strong> Segment SCADA/ICS networks from enterprise IT. Verify that no OT systems are accessible via Intune-managed devices that could be remotely wiped. </li> <li> <strong> 7-day: </strong> Audit remote access to OT environments. Iranian state-sponsored actors (MuddyWater, OilRig) historically target VPN and remote access infrastructure as initial entry points to OT networks. </li> <li> <strong> 30-day: </strong> Conduct a joint IT/OT tabletop exercise simulating an Iranian destructive attack on water treatment SCADA systems. Include scenarios for both hacktivist-level disruption (DDoS, defacement of HMI interfaces) and state-sponsored-level destruction (wiper deployment, safety system manipulation). </li> </ul> <h3> <strong> Healthcare (Health and Human Services, Medicaid, Public Health) </strong> </h3> <p> State health agencies manage Medicaid enrollment, public health surveillance, and vital records &mdash; systems that ransomware operators have repeatedly demonstrated willingness to attack. The Medusa ransomware group and Lazarus Group (North Korea) are both actively targeting healthcare. </p> <ul> <li> <strong> Immediate: </strong> Verify that Medicaid Management Information Systems (MMIS) and Electronic Health Record integrations have current, tested offline backups. </li> <li> <strong> 7-day: </strong> Review third-party vendor access to health data systems. The Stryker incident (a healthcare supply chain company) demonstrates that medical sector supply chains are actively targeted. </li> <li> <strong> 30-day: </strong> Assess compliance posture against updated HIPAA Security Rule requirements in light of the CIRCIA delay &mdash; state health agencies should not wait for federal reporting mandates to strengthen incident response capabilities. </li> </ul> <h3> <strong> Government Administration (Central IT, HR, Legal, Elections) </strong> </h3> <p> Central IT services, human resources systems, and election infrastructure represent the core administrative functions that all other agencies depend on. Compromise here has cascading effects across the entire state. </p> <ul> <li> <strong> Immediate: </strong> Enforce multi-admin approval for Intune high-impact operations. This is the single most important defensive action from this report. Audit all Entra ID Global Administrator and Intune Administrator accounts for MFA enforcement, conditional access compliance, and recent sign-in anomalies. </li> <li> <strong> 7-day: </strong> Issue a statewide advisory on the Storm-2561 trojanized VPN client campaign. Distribute official VPN client download links through internal portals. Consider blocking MSI execution from user Downloads directories for non-IT staff. </li> <li> <strong> 30-day: </strong> With election cycles approaching, conduct a focused assessment of election infrastructure isolation from enterprise IT. Ensure that a wiper attack on the enterprise Intune environment cannot cascade to election systems. </li> </ul> <h3> <strong> Aviation, Transportation, and Logistics (DOT, DMV, Transit) </strong> </h3> <p> State transportation agencies manage traffic management systems, DMV databases, transit operations, and airport coordination &mdash; systems that are both operationally critical and contain significant PII. </p> <ul> <li> <strong> Immediate: </strong> Verify that traffic management and transit SCADA systems are not accessible from Intune-managed endpoints. </li> <li> <strong> 7-day: </strong> Review DMV system access controls. DMV databases containing driver's license photos, SSNs, and addresses are high-value targets for both criminal and espionage actors. </li> <li> <strong> 30-day: </strong> Assess DDoS resilience of public-facing DMV and transit portals. Iranian hacktivist groups have demonstrated willingness to target government service portals for maximum public visibility. </li> </ul> <h2> <strong> Prioritized Defense Recommendations </strong> </h2> <h3> <strong> Immediate (Within 48&ndash;72 Hours) </strong> </h3> <table> <thead> <tr> <th> <p> <strong> # </strong> </p> </th> <th> <p> <strong> Action </strong> </p> </th> <th> <p> <strong> Owner </strong> </p> </th> </tr> </thead> <tbody> <tr> <td> <p> 1 </p> </td> <td> <p> <strong> Enforce multi-admin approval for all Microsoft Intune destructive operations </strong> (remote wipe, bulk retire, compliance policy changes). Audit every Intune admin account for MFA, conditional access, and sign-in anomalies. This is the #1 defensive priority from this report. </p> </td> <td> <p> Identity &amp; Access Management / Endpoint Management </p> </td> </tr> <tr> <td> <p> 2 </p> </td> <td> <p> <strong> Inventory and patch all n8n instances </strong> to v1.120.4+, v1.121.1+, or v1.122.0+. Include contractor and MSP environments. If patching cannot be completed within 72 hours, restrict n8n to trusted internal users and remove internet exposure. </p> </td> <td> <p> Vulnerability Management / Application Security </p> </td> </tr> <tr> <td> <p> 3 </p> </td> <td> <p> <strong> Issue a statewide employee advisory: </strong> Do not download VPN clients from search engines. Distribute official Ivanti/SonicWall/Cisco client links via internal IT portal only. </p> </td> <td> <p> Security Operations / Internal Communications </p> </td> </tr> <tr> <td> <p> 4 </p> </td> <td> <p> <strong> Deploy Lynx ransomware IOCs </strong> (MD5: 7e851829ee37bc0cf65a268d1d1baa7a, 0e521e0452f113cdf8b5c2fa6580db1f) to EDR block lists and conduct a retroactive hunt across endpoint telemetry. </p> </td> <td> <p> SOC / Endpoint Security </p> </td> </tr> </tbody> </table> <h3> <strong> 7-Day Actions (By 21 March 2026) </strong> </h3> <table> <thead> <tr> <th> <p> <strong> # </strong> </p> </th> <th> <p> <strong> Action </strong> </p> </th> <th> <p> <strong> Owner </strong> </p> </th> </tr> </thead> <tbody> <tr> <td> <p> 5 </p> </td> <td> <p> <strong> Baseline and monitor Google Sheets API traffic </strong> from state networks. Deploy detection for anomalous sheets.googleapis.com access patterns (non-browser user agents, high-frequency API calls, after-hours activity). </p> </td> <td> <p> SOC / Network Security </p> </td> </tr> <tr> <td> <p> 6 </p> </td> <td> <p> <strong> Verify patching status </strong> for CVE-2025-55182 (React Server Components, CVSS 10.0), CVE-2025-2783 (Chrome sandbox escape, CVSS 8.3), and CVE-2025-31324 (SAP NetWeaver, CVSS 10.0). Prioritize internet-facing React applications and SAP systems. </p> </td> <td> <p> Vulnerability Management </p> </td> </tr> <tr> <td> <p> 7 </p> </td> <td> <p> <strong> Conduct a tabletop exercise: </strong> "Iranian hacktivist wiper attack on state infrastructure via cloud admin compromise." Scenarios should include Intune mass wipe, Entra ID disruption, and Exchange Online defacement. Include the CISO, CIO, agency IT directors, legal counsel, and public communications. </p> </td> <td> <p> CISO Office / Incident Response </p> </td> </tr> <tr> <td> <p> 8 </p> </td> <td> <p> <strong> Review and harden conditional access policies </strong> in Entra ID. Ensure that administrative actions from non-compliant devices, unfamiliar locations, or without phishing-resistant MFA are blocked &mdash; not just challenged. </p> </td> <td> <p> Identity &amp; Access Management </p> </td> </tr> </tbody> </table> <h3> <strong> 30-Day Actions (By 13 April 2026) </strong> </h3> <table> <thead> <tr> <th> <p> <strong> # </strong> </p> </th> <th> <p> <strong> Action </strong> </p> </th> <th> <p> <strong> Owner </strong> </p> </th> </tr> </thead> <tbody> <tr> <td> <p> 9 </p> </td> <td> <p> <strong> Conduct a DDoS resilience assessment </strong> for all public-facing state web services (citizen portals, tax filing, benefits enrollment, DMV). Validate CDN and WAF configurations. Iranian hacktivist DDoS campaigns have hit government targets in 16 countries. </p> </td> <td> <p> Network Security / Web Services </p> </td> </tr> <tr> <td> <p> 10 </p> </td> <td> <p> <strong> Engage MS-ISAC for an updated threat briefing </strong> given CISA's reduced operational capacity. Identify alternative intelligence sources (state ISACs, sector ISACs, commercial threat intelligence). Assess whether current intelligence subscriptions provide adequate coverage for the elevated threat environment. </p> </td> <td> <p> CTI / CISO Office </p> </td> </tr> <tr> <td> <p> 11 </p> </td> <td> <p> <strong> Assess the state's whole-of-state cybersecurity posture </strong> against the March 2025 Executive Order requirements. Identify county and municipal dependencies that may lack independent cyber defense capability and could serve as pivot points into state networks. </p> </td> <td> <p> CISO Office / Governance </p> </td> </tr> <tr> <td> <p> 12 </p> </td> <td> <p> <strong> Review and update the state's cyber incident response plan </strong> to account for the CIRCIA delay. Ensure that internal incident reporting timelines, escalation procedures, and communication templates are current &mdash; do not wait for federal mandates to formalize what should already be operational. </p> </td> <td> <p> Incident Response / Legal </p> </td> </tr> </tbody> </table> <h2> <strong> The Bottom Line </strong> </h2> <p> The threat environment facing state government has shifted in five material ways this week. First, a proven attack technique now exists for weaponizing Microsoft Intune &mdash; the same platform managing your endpoints &mdash; as a mass-destruction tool. Second, a Chinese espionage campaign that has been operating for nine years across government, telecom, and energy networks uses a command-and-control method (Google Sheets) that most state security monitoring will not detect. Third, trojanized VPN client installers are being distributed through search engine poisoning, targeting the routine software downloads your employees perform every day. Fourth, critical vulnerabilities in n8n, SAP NetWeaver, and React Server Components are being actively exploited against internet-facing government systems. Fifth, the federal agency you depend on most for cyber support is operating at reduced capacity during the most active Iranian cyber campaign since 2020. </p> <p> None of these threats require a sophisticated zero-day exploit to succeed against a state government network. They require a compromised admin credential, an unpatched automation tool, or an employee who downloads a VPN client from a search engine instead of an internal portal. </p> <p> The decisions that matter most this week are not about buying new technology. They are about hardening the administrative controls on tools you already have (Intune multi-admin approval), patching what is already exposed (n8n, SAP, React, Chrome), and preparing your people for an incident that is statistically likely within the next 30 days. </p> <p> The window between awareness and action is narrowing. Act on the immediate recommendations within 48 hours. </p>

FEATURED RESOURCES

March 13, 2026
Anomali Cyber Watch

State Cyber Threat Picture Just Changed

Read More
March 13, 2026
Anomali Cyber Watch

The Iran Cyber War Just Hit Home: What CISOs Need to Know Right Now

Read More
March 12, 2026
Anomali Cyber Watch

Iran's Cyber War Has Gone Destructive: What CISOs Need to Know Right Now

Read More
Explore All