<p><em>Sixteen days into the most significant state-on-state cyber-kinetic conflict since Russia’s invasion of Ukraine, the Iran theater has crossed thresholds that no security playbook anticipated. Drones have struck cloud data centers. A single hacktivist front group wiped 200,000 endpoints at a Fortune 500 medical device company. Iran’s new Supreme Leader has publicly named Amazon, Google, Microsoft, and Palantir as military targets. And the quietest actors on the board — Iran’s state-sponsored APTs — are almost certainly already inside networks that haven’t detected them yet.</em></p>
<p><em>This is not a future scenario. This is the week of 10–15 March 2026.</em></p>
<p><em>If your organization touches healthcare, defense, energy, financial services, cloud infrastructure, or industrial control systems, this briefing is for you. The decisions you make in the next 72 hours will determine whether you’re a headline or a bystander.</em></p>
<h2><strong>What Changed This Week</strong></h2>
<p>The 2026 Iran conflict — triggered by Operation Epic Fury’s US-Israel kinetic strikes beginning 28 February — entered a dangerous new phase this week. Here are the seven developments that should be on every CISO’s radar:</p>
<ol>
<li><strong>Handala destroyed 200,000 devices at Stryker Corporation</strong> (11–13 March), exfiltrating 50TB of data and causing a global network outage. This is the largest confirmed Iranian-linked destructive cyberattack against a US company to date. Stryker’s stock dropped 3.6%.</li>
<li><strong>Iran’s new Supreme Leader, Mojtaba Khamenei</strong>, issued his first public statement vowing continued Strait of Hormuz closure and attacks on US interests — eliminating near-term diplomatic off-ramps and sustaining maximum escalation pressure.</li>
<li><strong>Cisco SD-WAN exploitation widened</strong> with two new CVEs (CVE-2026-20122, CVE-2026-20128) under active attack, bringing the total to eight vulnerabilities in this campaign. CISA added them to the Known Exploited Vulnerabilities catalog with enhanced reporting requirements.</li>
<li><strong>Eight ICS/OT advisories dropped in three days</strong>, including a critical remote code execution flaw in Inductive Automation Ignition (SCADA/HMI) and high-severity vulnerabilities in Siemens S7-1500 PLCs, Honeywell building management systems, and Trane HVAC controllers.</li>
<li><strong>Russia-aligned hacktivists joined the Iranian cyber front.</strong> Quantified for the first time: 149 DDoS attacks against 110 organizations across 16 countries by 12 groups — with Keymous+, DieNet, and NoName057(16) responsible for nearly 75% of all activity.</li>
<li><strong>Iranian state APTs are maintaining a conspicuously quiet posture.</strong> MuddyWater’s Dindoor backdoor campaign was confirmed in US airport, bank, software company, and NGO networks — one of the few state operations detected. The broader silence from MuddyWater (MOIS), APT42 (IRGC-IO), UNC1549, and BANISHED KITTEN (IRGC) is consistent with Iranian pre-positioning doctrine: proxies generate noise while state operators preserve access for decisive strikes.</li>
<li><strong>IRGC drone strikes hit three AWS data centers in UAE and Bahrain</strong> (5 March), marking the first-ever kinetic attack on cloud computing infrastructure. Iran subsequently named AWS, Google, Microsoft, and Palantir as military targets — a doctrinal shift with direct implications for any organization dependent on cloud services.</li>
</ol>
<h2><strong>Conflict Timeline: 28 February – 15 March 2026</strong></h2>
<table>
<thead>
<tr>
<th>
<p>Date</p>
</th>
<th>
<p>Event</p>
</th>
<th>
<p>Cyber/Kinetic</p>
</th>
<th>
<p>Impact</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>28 Feb</p>
</td>
<td>
<p>Operation Epic Fury launches — US-Israel strikes on Iran</p>
</td>
<td>
<p>Kinetic</p>
</td>
<td>
<p>Supreme Leader Khamenei killed; Iranian internet collapses to 1–4% capacity</p>
</td>
</tr>
<tr>
<td>
<p>1–4 Mar</p>
</td>
<td>
<p>Pro-Iran hacktivist swarm activates (Handala, DieNet, Keymous+, 313 Team, Cyber Toufan)</p>
</td>
<td>
<p>Cyber</p>
</td>
<td>
<p>DDoS, defacement, and wiper attacks against US and allied targets begin</p>
</td>
</tr>
<tr>
<td>
<p>3 Mar</p>
</td>
<td>
<p>SecurityWeek reports state-sponsored APT activity stays “quiet” while hacktivists spike</p>
</td>
<td>
<p>Cyber (assessment)</p>
</td>
<td>
<p>Pattern consistent with Iranian doctrine: proxies provide cover for state operators</p>
</td>
</tr>
<tr>
<td>
<p>4 Mar</p>
</td>
<td>
<p>The Hacker News quantifies hacktivist campaign: 149 attacks, 110 orgs, 16 countries, 12 groups</p>
</td>
<td>
<p>Cyber</p>
</td>
<td>
<p>Healthcare, government, financial services most targeted</p>
</td>
</tr>
<tr>
<td>
<p>5 Mar</p>
</td>
<td>
<p>IRGC drone strikes hit 3 AWS data centers in UAE and Bahrain</p>
</td>
<td>
<p>Kinetic</p>
</td>
<td>
<p>First-ever kinetic attack on cloud infrastructure; 2 of 3 availability zones in AWS me-central-1 go offline</p>
</td>
</tr>
<tr>
<td>
<p>5–6 Mar</p>
</td>
<td>
<p>Cisco SD-WAN zero-day exploitation begins spreading; The Register reports additional bugs under attack</p>
</td>
<td>
<p>Cyber</p>
</td>
<td>
<p>CVE-2026-20122 and CVE-2026-20128 confirmed actively exploited</p>
</td>
</tr>
<tr>
<td>
<p>8 Mar</p>
</td>
<td>
<p>IRGC publicly states Bahrain AWS facility targeted because it hosts US military workloads</p>
</td>
<td>
<p>Kinetic (declaration)</p>
</td>
<td>
<p>Cloud providers reclassified as military targets by a nation-state</p>
</td>
</tr>
<tr>
<td>
<p>10–12 Mar</p>
</td>
<td>
<p>CISA publishes 8 ICS advisories: Siemens S7-1500, Ignition SCADA, Honeywell BMS, Trane HVAC, Heliox EV chargers</p>
</td>
<td>
<p>Vulnerability disclosure</p>
</td>
<td>
<p>Critical attack surface expansion for ICS/OT environments</p>
</td>
</tr>
<tr>
<td>
<p>11 Mar</p>
</td>
<td>
<p>CISA adds Cisco SD-WAN and Ivanti EPM to KEV catalog with enhanced reporting</p>
</td>
<td>
<p>Cyber (regulatory)</p>
</td>
<td>
<p>Federal agencies and CI operators under mandatory patching timelines</p>
</td>
</tr>
<tr>
<td>
<p>11–13 Mar</p>
</td>
<td>
<p>Handala wiper attack on Stryker Corporation: 200K devices wiped, 50TB exfiltrated, global outage</p>
</td>
<td>
<p>Cyber (destructive)</p>
</td>
<td>
<p>Largest confirmed Iranian-linked destructive attack on a US company</p>
</td>
</tr>
<tr>
<td>
<p>12 Mar</p>
</td>
<td>
<p>Mojtaba Khamenei (new Supreme Leader) vows continued Hormuz closure and attacks on US interests</p>
</td>
<td>
<p>Geopolitical</p>
</td>
<td>
<p>Diplomatic off-ramps eliminated; sustained escalation posture confirmed</p>
</td>
</tr>
<tr>
<td>
<p>13 Mar</p>
</td>
<td>
<p>Iran publicly names AWS, Google, Microsoft, and Palantir as military targets (CBS News)</p>
</td>
<td>
<p>Geopolitical (declaration)</p>
</td>
<td>
<p>Doctrinal shift: tech companies themselves — not just their customers — are now declared targets</p>
</td>
</tr>
<tr>
<td>
<p>13 Mar</p>
</td>
<td>
<p>Handala claims attack on Verifone (payment systems); Verifone denies breach</p>
</td>
<td>
<p>Cyber (disputed)</p>
</td>
<td>
<p>Conflicting reports — Handala claims breach; Verifone says “no evidence”</p>
</td>
</tr>
<tr>
<td>
<p>15 Mar</p>
</td>
<td>
<p>BANISHED KITTEN threat actor record updated in ThreatStream</p>
</td>
<td>
<p>Intelligence update</p>
</td>
<td>
<p>Continued tracking of Iranian state-linked destructive operations</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>Threat Analysis: The Three Layers of Iran’s Cyber Campaign</strong></h2>
<h3><strong>Layer 1 — The Hacktivist Shield (Loud, Visible, Deniable)</strong></h3>
<p>The most visible activity comes from pro-Iran hacktivist groups, many of which serve as fronts for Iranian intelligence services. <strong>Handala</strong> — linked to MOIS/Emennet Pasargad — is the most capable, having executed the Stryker wiper attack using techniques consistent with BiBiWiper derivatives. Other active groups include <strong>DieNet</strong>, <strong>Keymous+</strong>, <strong>313 Team</strong>, <strong>Cyber Toufan</strong>, <strong>Cyber Isnaad Front</strong>, and <strong>Nation of Saviors</strong>.</p>
<p>The Russia-Iran convergence adds a new dimension. <strong>NoName057(16)</strong> and <strong>Z-Pentest</strong> — both Russian-aligned — have appeared on the Iranian cyber front. Whether this represents genuine operational coordination or opportunistic bandwagoning remains debated among analysts, but the effect is the same: a larger, more distributed attack surface for defenders to cover.</p>
<p><strong>The numbers are stark:</strong> 149 DDoS attacks against 110 organizations across 16 countries in the first week of the conflict alone, with three groups (Keymous+, DieNet, NoName057(16)) accounting for 74.6% of all activity. H-ISAC has issued a specific warning to US hospitals to prepare for DDoS.</p>
<h3><strong>Layer 2 — The State APT Undercurrent (Quiet, Persistent, Dangerous)</strong></h3>
<p>Here is the paradox that should keep CISOs awake: while hacktivist activity has spiked dramatically, <strong>state-sponsored APT activity has stayed conspicuously quiet</strong>. This is not reassuring — it is alarming.</p>
<p>Iranian doctrine uses hacktivist proxies for visible, deniable disruption while state operators — <strong>MuddyWater</strong> (MOIS), <strong>APT42/CALANQUE</strong> (IRGC-IO), <strong>UNC1549/Imperial Kitten</strong> (IRGC), and <strong>BANISHED KITTEN</strong> (IRGC) — maintain quiet access for decisive strikes. MuddyWater’s Dindoor backdoor campaign against US airports, banks, software companies, and NGOs was one of the few state operations detected. The implication: other operations are likely ongoing but below the detection threshold.</p>
<p>Key malware families in active use or assessed as deployment-ready include <strong>IOCONTROL</strong> (ICS-specific), <strong>ZeroCleare</strong> (wiper), <strong>Meteor</strong> (wiper), <strong>StrifeWater</strong> (RAT), and <strong>Dindoor</strong> (backdoor). The Handala/Stryker attack likely used a new wiper variant not yet publicly named by researchers.</p>
<h3><strong>Layer 3 — Kinetic Strikes on Digital Infrastructure (Unprecedented)</strong></h3>
<p>The IRGC drone strikes on three AWS data centers in UAE and Bahrain represent a <strong>first in the history of armed conflict</strong>: the deliberate kinetic destruction of cloud computing infrastructure. Iran’s subsequent public naming of AWS, Google, Microsoft, and Palantir as military targets represents a doctrinal shift — these companies are no longer collateral; they are declared combatants in Iran’s strategic calculus.</p>
<p>This has immediate implications for any organization running workloads in Middle East cloud regions (AWS me-central-1, me-south-1; and potentially Azure/GCP equivalents). It also raises the question of whether Iran will extend targeting to these companies’ <em>global</em> infrastructure through cyber means.</p>
<h2><strong>Vulnerability Landscape: What’s Being Exploited Right Now</strong></h2>
<table>
<thead>
<tr>
<th>
<p>Vulnerability</p>
</th>
<th>
<p>CVSS</p>
</th>
<th>
<p>Status</p>
</th>
<th>
<p>Risk Context</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p><strong>CVE-2026-20122</strong> — Cisco Catalyst SD-WAN Manager API file overwrite</p>
</td>
<td>
<p>5.4</p>
</td>
<td>
<p><strong>Actively exploited; CISA KEV</strong></p>
</td>
<td>
<p>Privilege escalation to vmanage; part of 8-CVE SD-WAN campaign</p>
</td>
</tr>
<tr>
<td>
<p><strong>CVE-2026-20128</strong> — Cisco Catalyst SD-WAN DCA credential exposure</p>
</td>
<td>
<p>7.5</p>
</td>
<td>
<p><strong>Actively exploited; CISA KEV</strong></p>
</td>
<td>
<p>Credential harvesting enables lateral movement</p>
</td>
</tr>
<tr>
<td>
<p><strong>CVE-2025-68613</strong> — n8n workflow automation RCE</p>
</td>
<td>
<p>9.9</p>
</td>
<td>
<p><strong>Actively exploited; CISA KEV</strong></p>
</td>
<td>
<p>ZeroBot malware targeting n8n instances; full instance compromise</p>
</td>
</tr>
<tr>
<td>
<p><strong>CVE-2022-42475</strong> — FortiOS/FortiGate heap overflow</p>
</td>
<td>
<p>9.8</p>
</td>
<td>
<p><strong>Actively exploited (ongoing)</strong></p>
</td>
<td>
<p>Siemens RUGGEDCOM APE1808 advisory references this; Iranian actors have historically exploited FortiOS</p>
</td>
</tr>
<tr>
<td>
<p><strong>Inductive Automation Ignition RCE</strong> (ICSA-26-071-06)</p>
</td>
<td>
<p>Critical</p>
</td>
<td>
<p><strong>Advisory published; exploitation imminent</strong></p>
</td>
<td>
<p>OS-level code execution on SCADA/HMI systems</p>
</td>
</tr>
<tr>
<td>
<p><strong>Siemens SIMATIC S7-1500 code injection</strong> (ICSA-26-071-04)</p>
</td>
<td>
<p>High</p>
</td>
<td>
<p><strong>Advisory published</strong></p>
</td>
<td>
<p>Malicious project import enables PLC code injection</p>
</td>
</tr>
<tr>
<td>
<p><strong>Honeywell IQ4x BMS Controller</strong> (ICSA-26-069-03)</p>
</td>
<td>
<p>High</p>
</td>
<td>
<p><strong>Advisory published</strong></p>
</td>
<td>
<p>Unauthorized access to building management systems</p>
</td>
</tr>
<tr>
<td>
<p><strong>Trane Tracer SC/SC+</strong> (ICSA-26-071-01)</p>
</td>
<td>
<p>High</p>
</td>
<td>
<p><strong>Advisory published</strong></p>
</td>
<td>
<p>Info disclosure + arbitrary command execution on HVAC controllers</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>Predictive Analysis: What Comes Next</strong></h2>
<p>Based on the current trajectory of the conflict, Iranian operational patterns, and the expanding attack surface, the Anomali CTI Desk assesses the following probabilities over the next 7–30 days:</p>
<table>
<thead>
<tr>
<th>
<p>Probability</p>
</th>
<th>
<p>Scenario</p>
</th>
<th>
<p>Basis</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p><strong>~70%</strong></p>
</td>
<td>
<p><strong>Additional Handala wiper attacks against US companies</strong> in healthcare, defense supply chain, or financial services. Stryker was a proof of concept; the group will seek to replicate at scale.</p>
</td>
<td>
<p>Handala’s operational tempo, MOIS backing, stated retaliatory intent, and demonstrated capability against hardened targets</p>
</td>
</tr>
<tr>
<td>
<p><strong>~60%</strong></p>
</td>
<td>
<p><strong>Iranian state APTs (MuddyWater, UNC1549) activate pre-positioned access</strong> in US critical infrastructure networks for disruptive operations, timed to kinetic escalation milestones.</p>
</td>
<td>
<p>Quiet state APT posture is consistent with pre-positioning doctrine; MuddyWater/Dindoor already confirmed in US networks</p>
</td>
</tr>
<tr>
<td>
<p><strong>~50%</strong></p>
</td>
<td>
<p><strong>Russia-aligned hacktivists expand coordination</strong> with pro-Iran groups, broadening DDoS targeting to NATO member government services and critical infrastructure.</p>
</td>
<td>
<p>NoName057(16) already active on Iran’s cyber front; geopolitical alignment of interests between Moscow and Tehran</p>
</td>
</tr>
<tr>
<td>
<p><strong>~40%</strong></p>
</td>
<td>
<p><strong>Iranian operators attempt exploitation of newly disclosed ICS vulnerabilities</strong> (Ignition RCE, S7-1500, Honeywell BMS) against US water or energy infrastructure within 30 days.</p>
</td>
<td>
<p>Cyber Av3ngers/Unitronics precedent; IOCONTROL malware designed for ICS; 8 new advisories expand attack surface</p>
</td>
</tr>
<tr>
<td>
<p><strong>~35%</strong></p>
</td>
<td>
<p><strong>Cyber operations targeting cloud provider global infrastructure</strong> (not just ME-region physical assets) — OAuth token theft, API key compromise, or service account abuse against AWS, Azure, or GCP management planes.</p>
</td>
<td>
<p>Iran’s public naming of cloud providers as targets signals intent beyond physical strikes; IRGC has demonstrated willingness to cross escalation thresholds</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>SOC Operational Guidance</strong></h2>
<h3><strong>What to Hunt For Now</strong></h3>
<p><strong>Hypothesis 1: Wiper pre-staging in your environment</strong> Iranian-linked wipers (BiBiWiper variants, ZeroCleare, Meteor, StrifeWater) typically stage before detonation. Hunt for: - Mass file deletion patterns or MBR/VBR modification attempts (<strong>T1485 — Data Destruction</strong>, <strong>T1561.001 — Disk Wipe: MBR</strong>) - Unusual service stops across multiple endpoints simultaneously (<strong>T1489 — Service Stop</strong>) - New or modified scheduled tasks with destructive payloads (<strong>T1053.005 — Scheduled Task</strong>) - Lateral movement via valid accounts following credential theft (<strong>T1078 — Valid Accounts</strong>, <strong>T1021 — Remote Services</strong>)</p>
<p><strong>Hypothesis 2: Cisco SD-WAN compromise as a beachhead</strong> If your organization runs Cisco Catalyst SD-WAN, assume exploitation attempts are occurring: - Monitor SD-WAN Manager API endpoints for anomalous file write operations (<strong>T1190 — Exploit Public-Facing Application</strong>) - Audit DCA credential files for unauthorized access (<strong>T1083 — File and Directory Discovery</strong>, <strong>T1078 — Valid Accounts</strong>) - Look for lateral movement from SD-WAN management hosts to internal networks (<strong>T1021.001 — Remote Desktop Protocol</strong>, <strong>T1068 — Exploitation for Privilege Escalation</strong>)</p>
<p><strong>Hypothesis 3: ICS/OT reconnaissance and initial access</strong> Iranian ICS operators (Cyber Av3ngers, HYDRO KITTEN (IRGC-CEC)) have demonstrated capability against Unitronics PLCs and water systems. With 8 new ICS advisories: - Monitor for scanning of Ignition web interfaces (default port 8088/8043) (<strong>T1190</strong>) - Audit Siemens S7-1500 project imports for unauthorized modifications (<strong>T0839 — Module Firmware</strong>) - Check Honeywell BMS and Trane Tracer controllers for unauthorized sessions (<strong>T0816 — Device Restart/Shutdown</strong>) - Verify network segmentation between IT and OT/BMS/HVAC networks</p>
<p><strong>Hypothesis 4: DDoS as a smokescreen for intrusion</strong> The 149-attack hacktivist swarm is not just nuisance — DDoS often serves as cover for simultaneous intrusion attempts: - Correlate DDoS events with concurrent authentication anomalies (<strong>T1498 — Network Denial of Service</strong> + <strong>T1078</strong>) - Monitor for credential stuffing or brute-force attempts during DDoS windows (<strong>T1110 — Brute Force</strong>) - Watch for data exfiltration attempts timed to DDoS-induced monitoring blind spots (<strong>T1041 — Exfiltration Over C2 Channel</strong>)</p>
<h3><strong>Prioritized IOC Watchlist</strong></h3>
<table>
<thead>
<tr>
<th>
<p>Type</p>
</th>
<th>
<p>Indicator / Family</p>
</th>
<th>
<p>Context</p>
</th>
<th>
<p>Action</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Malware family</p>
</td>
<td>
<p><strong>BiBiWiper</strong> (and variants: ZeroShred, GoneXML)</p>
</td>
<td>
<p>Handala’s primary destructive tool; likely used in Stryker attack</p>
</td>
<td>
<p>Deploy signatures; hunt for artifacts</p>
</td>
</tr>
<tr>
<td>
<p>Malware family</p>
</td>
<td>
<p><strong>ZeroCleare</strong></p>
</td>
<td>
<p>Iranian wiper historically used against energy sector</p>
</td>
<td>
<p>Ensure detection rules current</p>
</td>
</tr>
<tr>
<td>
<p>Malware family</p>
</td>
<td>
<p><strong>Meteor</strong></p>
</td>
<td>
<p>Iranian wiper used in rail/government attacks</p>
</td>
<td>
<p>Ensure detection rules current</p>
</td>
</tr>
<tr>
<td>
<p>Malware family</p>
</td>
<td>
<p><strong>IOCONTROL</strong></p>
</td>
<td>
<p>ICS-specific malware attributed to Iranian actors</p>
</td>
<td>
<p>Priority for any OT environment</p>
</td>
</tr>
<tr>
<td>
<p>Malware family</p>
</td>
<td>
<p><strong>StrifeWater</strong></p>
</td>
<td>
<p>RAT used by Moses Staff / Iranian operators</p>
</td>
<td>
<p>Hunt for C2 beaconing patterns</p>
</td>
</tr>
<tr>
<td>
<p>Malware family</p>
</td>
<td>
<p><strong>Dindoor</strong></p>
</td>
<td>
<p>MuddyWater (MOIS) backdoor; confirmed in US airport/bank/NGO networks</p>
</td>
<td>
<p>Hunt for persistence mechanisms</p>
</td>
</tr>
<tr>
<td>
<p>Malware family</p>
</td>
<td>
<p><strong>ZeroBot</strong></p>
</td>
<td>
<p>Actively targeting n8n instances (CVE-2025-68613)</p>
</td>
<td>
<p>Block known C2 infrastructure</p>
</td>
</tr>
<tr>
<td>
<p>CVE</p>
</td>
<td>
<p><strong>CVE-2026-20122, CVE-2026-20128</strong></p>
</td>
<td>
<p>Cisco SD-WAN — actively exploited</p>
</td>
<td>
<p>Patch immediately or mitigate</p>
</td>
</tr>
<tr>
<td>
<p>CVE</p>
</td>
<td>
<p><strong>CVE-2025-68613</strong></p>
</td>
<td>
<p>n8n RCE (CVSS 9.9) — actively exploited</p>
</td>
<td>
<p>Patch to v1.122.0+</p>
</td>
</tr>
<tr>
<td>
<p>CVE</p>
</td>
<td>
<p><strong>CVE-2022-42475</strong></p>
</td>
<td>
<p>FortiOS — Iranian actors have exploited historically</p>
</td>
<td>
<p>Verify patched; hunt for post-exploitation</p>
</td>
</tr>
<tr>
<td>
<p>Infrastructure</p>
</td>
<td>
<p>AWS <strong>me-central-1</strong> (UAE), <strong>me-south-1</strong> (Bahrain)</p>
</td>
<td>
<p>Degraded due to kinetic strikes; failover risk</p>
</td>
<td>
<p>Assess workload dependencies</p>
</td>
</tr>
<tr>
<td>
<p>Threat groups</p>
</td>
<td>
<p><strong>Handala, DieNet, Keymous+, NoName057(16), 313 Team, Cyber Toufan</strong></p>
</td>
<td>
<p>Most active hacktivist groups this conflict</p>
</td>
<td>
<p>Monitor Telegram channels for targeting claims</p>
</td>
</tr>
</tbody>
</table>
<h3><strong>Detection Engineering Priorities</strong></h3>
<ol>
<li><strong>Wiper detonation detection:</strong> Signature and behavioral rules for BiBiWiper, ZeroCleare, Meteor, and IOCONTROL. Supplement with behavioral detection for mass file system changes (>1,000 files modified in <60 seconds).</li>
<li><strong>SD-WAN API abuse:</strong> Custom detection for anomalous API calls to Cisco vManage endpoints, especially file write operations and credential file access.</li>
<li><strong>ICS protocol anomalies:</strong> If running Siemens S7 or Ignition, deploy OT-specific detection for unauthorized project uploads, firmware modifications, and anomalous Modbus/S7comm traffic.</li>
<li><strong>DDoS-correlated intrusion:</strong> Alert logic that triggers enhanced monitoring when DDoS events coincide with authentication spikes or VPN anomalies.</li>
</ol>
<h2><strong>Sector-Specific Defensive Priorities</strong></h2>
<h3><strong>Financial Services</strong></h3>
<p>Financial institutions are in the primary target set for both Iranian state APTs and hacktivist groups. MuddyWater’s (MOIS) Dindoor campaign has already confirmed compromises at US banks.</p>
<ul>
<li><strong>Immediate:</strong> Verify DDoS mitigation for online banking, payment processing, and API gateways. Hacktivist groups (DieNet, Keymous+) have specifically targeted financial services with volumetric and application-layer DDoS.</li>
<li><strong>This week:</strong> Hunt for Dindoor backdoor indicators across endpoint telemetry. Audit privileged access to SWIFT and core banking systems for anomalous sessions.</li>
<li><strong>This month:</strong> Conduct a wiper impact assessment — model the business impact of a Stryker-scale wiper event (200,000 endpoints) against your environment. Validate offline backup integrity and recovery time objectives.</li>
<li><strong>Executive action:</strong> Brief the board on the elevated threat to financial infrastructure. Coordinate with FS-ISAC for sector-specific indicators and defensive playbooks.</li>
</ul>
<h3><strong>Energy</strong></h3>
<p>Energy infrastructure — particularly oil and gas — faces the highest risk of Iranian ICS/OT targeting. The Strait of Hormuz closure has already disrupted global energy markets; cyber attacks on Western energy infrastructure would amplify this leverage.</p>
<ul>
<li><strong>Immediate:</strong> Patch or isolate Inductive Automation Ignition instances (critical RCE). Verify segmentation between IT and OT networks. Audit Siemens S7-1500 PLCs for unauthorized project modifications.</li>
<li><strong>This week:</strong> Deploy IOCONTROL malware signatures across OT monitoring infrastructure. Review Honeywell BMS and Trane HVAC controller access logs for unauthorized sessions. Patch Siemens RUGGEDCOM APE1808 FortiOS components (CVE-2022-42475 context).</li>
<li><strong>This month:</strong> Conduct an ICS-specific tabletop exercise simulating simultaneous cyber-kinetic disruption (e.g., wiper on IT + PLC manipulation on OT + physical supply chain disruption from Hormuz closure).</li>
<li><strong>Executive action:</strong> Engage with DOE/CESER and E-ISAC. Ensure OT incident response retainers are active and tested.</li>
</ul>
<h3><strong>Healthcare</strong></h3>
<p>Healthcare is explicitly in the crosshairs. Handala’s Stryker attack targeted a medical device company. H-ISAC has warned US hospitals to prepare for DDoS. Iranian actors have historically targeted healthcare as “soft” critical infrastructure.</p>
<ul>
<li><strong>Immediate:</strong> Verify DDoS protection for patient-facing portals, EHR systems, and telehealth platforms. Audit medical device network segmentation — Stryker’s 200,000-device wiper demonstrates the blast radius of connected medical devices.</li>
<li><strong>This week:</strong> Hunt for wiper pre-staging indicators (BiBiWiper, ZeroCleare signatures) across clinical and administrative networks. Review Stryker product advisories for any downstream impact to devices in your environment.</li>
<li><strong>This month:</strong> Assess medical device inventory for Iranian-targeted vulnerabilities (Siemens, Honeywell components in building management and clinical engineering). Update business continuity plans for extended IT outage scenarios.</li>
<li><strong>Executive action:</strong> Coordinate with H-ISAC. Brief clinical leadership on the potential for medical device disruption. Ensure downtime procedures are current and tested.</li>
</ul>
<h3><strong>Government (Federal, State, Local)</strong></h3>
<p>Government agencies are primary targets for both espionage (APT42 (IRGC-IO), MuddyWater (MOIS)) and disruptive operations (hacktivists). CISA’s enhanced reporting requirements for Cisco SD-WAN and Ivanti EPM apply directly.</p>
<ul>
<li><strong>Immediate:</strong> Comply with CISA KEV patching timelines for CVE-2026-20122, CVE-2026-20128 (Cisco SD-WAN), and CVE-2025-68613 (n8n). Verify .gov DDoS mitigation posture.</li>
<li><strong>This week:</strong> Hunt for MuddyWater/Dindoor and APT42 indicators across agency networks. Audit Ivanti Connect Secure and FortiGate VPN appliances for signs of compromise (these are historically favored Iranian initial access vectors).</li>
<li><strong>This month:</strong> Review cloud workload placement — any workloads in AWS me-central-1/me-south-1 or Azure/GCP Middle East regions require failover planning. Assess contractor and supply chain access for signs of pre-positioning (PIR-007 context: Iranian espionage via developer platforms and fake resume lures on GitHub).</li>
<li><strong>Executive action:</strong> Elevate to CISA Shield-Up posture. Ensure cross-agency coordination with FBI, NSA, and sector-specific ISACs.</li>
</ul>
<h3><strong>Aviation & Logistics</strong></h3>
<p>MuddyWater (MOIS) has confirmed compromises at US airports. The Strait of Hormuz closure is disrupting global shipping and logistics. Aviation and logistics companies face both direct cyber targeting and cascading supply chain disruption.</p>
<ul>
<li><strong>Immediate:</strong> Hunt for Dindoor backdoor across airport IT and OT systems. Verify DDoS protection for flight operations, booking systems, and cargo management platforms.</li>
<li><strong>This week:</strong> Audit SD-WAN infrastructure (widely deployed in distributed logistics networks) for CVE-2026-20122/20128 exploitation. Review building management systems (Honeywell, Trane) at airport and warehouse facilities.</li>
<li><strong>This month:</strong> Model supply chain disruption scenarios combining Hormuz closure (physical) with cyber attacks on logistics IT (wiper/DDoS). Assess single-cloud-provider risk for operations-critical workloads.</li>
<li><strong>Executive action:</strong> Coordinate with A-ISAC and TSA. Brief operations leadership on the dual kinetic-cyber threat to supply chain continuity.</li>
</ul>
<h2><strong>Prioritized Defense Recommendations </strong></h2>
<h3><strong>🔴 Immediate (Next 24–48 Hours)</strong></h3>
<table>
<thead>
<tr>
<th>
<p>#</p>
</th>
<th>
<p>Action</p>
</th>
<th>
<p>Owner</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>1</p>
</td>
<td>
<p><strong>Patch Cisco Catalyst SD-WAN Manager</strong> for CVE-2026-20122 and CVE-2026-20128. If patching is not possible within 48 hours, restrict API access to trusted IPs only and audit DCA credential files for unauthorized access.</p>
</td>
<td>
<p>Network Operations / Vulnerability Management</p>
</td>
</tr>
<tr>
<td>
<p>2</p>
</td>
<td>
<p><strong>Patch or isolate Inductive Automation Ignition</strong> servers. This is a critical RCE with OS-level privileges on SCADA/HMI systems. No internet-facing Ignition instance should remain unpatched.</p>
</td>
<td>
<p>ICS/OT Security</p>
</td>
</tr>
<tr>
<td>
<p>3</p>
</td>
<td>
<p><strong>Verify DDoS mitigation</strong> is active and tested for all internet-facing services. Confirm CDN/WAF configurations. Brief SOC analysts on hacktivist DDoS patterns — expect both volumetric floods and application-layer attacks.</p>
</td>
<td>
<p>SOC / Network Operations</p>
</td>
</tr>
<tr>
<td>
<p>4</p>
</td>
<td>
<p><strong>Deploy wiper detection signatures</strong> for BiBiWiper (and variants ZeroShred, GoneXML), ZeroCleare, Meteor, and IOCONTROL. Supplement with behavioral detection for mass file system changes and MBR/VBR modifications.</p>
</td>
<td>
<p>Threat Hunting / Detection Engineering</p>
</td>
</tr>
<tr>
<td>
<p>5</p>
</td>
<td>
<p><strong>Validate offline backup integrity.</strong> Confirm that critical system backups are air-gapped, recent, and tested for restoration. A Stryker-scale wiper event (200,000 endpoints) will render online backups useless if they are reachable from the production network.</p>
</td>
<td>
<p>IT Operations / Backup Administration</p>
</td>
</tr>
</tbody>
</table>
<h3><strong>🟠 7-Day Actions</strong></h3>
<table>
<thead>
<tr>
<th>
<p>#</p>
</th>
<th>
<p>Action</p>
</th>
<th>
<p>Owner</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>6</p>
</td>
<td>
<p><strong>Assess cloud provider concentration risk</strong> for workloads in AWS me-central-1, me-south-1, or any Middle East cloud region. Develop failover plans. Iran has physically struck these facilities and publicly declared cloud providers as military targets.</p>
</td>
<td>
<p>Cloud Architecture / Business Continuity</p>
</td>
</tr>
<tr>
<td>
<p>7</p>
</td>
<td>
<p><strong>Patch Siemens SIMATIC S7-1500 firmware</strong> and restrict project imports to trusted, verified sources. Patch RUGGEDCOM APE1808 FortiOS components. Audit Honeywell BMS and Trane Tracer controllers for unauthorized access and segment BMS/HVAC networks from IT.</p>
</td>
<td>
<p>ICS/OT Security / Facilities</p>
</td>
</tr>
<tr>
<td>
<p>8</p>
</td>
<td>
<p><strong>Patch n8n</strong> to version 1.122.0 or later (CVE-2025-68613, CVSS 9.9). ZeroBot malware is actively targeting exposed instances. If patching is delayed, restrict workflow creation to trusted users and harden OS-level privileges.</p>
</td>
<td>
<p>DevOps / IT Operations</p>
</td>
</tr>
<tr>
<td>
<p>9</p>
</td>
<td>
<p><strong>Conduct threat hunt</strong> for MuddyWater/Dindoor, APT42, and BANISHED KITTEN indicators across the enterprise. Focus on: VPN appliances (Ivanti, FortiGate), email infrastructure, and endpoints with privileged access to critical systems.</p>
</td>
<td>
<p>Threat Hunting / IR</p>
</td>
</tr>
<tr>
<td>
<p>10</p>
</td>
<td>
<p><strong>Review and test incident response playbooks</strong> for wiper, DDoS, and ICS/OT scenarios. Ensure playbooks account for simultaneous multi-vector attacks (wiper + DDoS + ICS disruption).</p>
</td>
<td>
<p>CISO / IR Team</p>
</td>
</tr>
</tbody>
</table>
<h3><strong>🟡 30-Day Actions</strong></h3>
<table>
<thead>
<tr>
<th>
<p>#</p>
</th>
<th>
<p>Action</p>
</th>
<th>
<p>Owner</p>
</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>11</p>
</td>
<td>
<p><strong>Conduct a tabletop exercise</strong> simulating simultaneous kinetic-cyber attack: cloud region outage + enterprise wiper + DDoS + ICS disruption. Include business continuity, disaster recovery, legal, communications, and executive leadership. This is no longer a theoretical scenario.</p>
</td>
<td>
<p>CISO / BCP / Executive Leadership</p>
</td>
</tr>
<tr>
<td>
<p>12</p>
</td>
<td>
<p><strong>Audit DIB contractor access and developer platform security.</strong> Review GitHub-hosted development workflows for dormant accounts, unusual SSH keys, and anomalous repository access. Iranian espionage groups (UNC6446) have used fake resume lures and developer platform infiltration for pre-positioning.</p>
</td>
<td>
<p>Supply Chain Security / Engineering</p>
</td>
</tr>
<tr>
<td>
<p>13</p>
</td>
<td>
<p><strong>Establish monitoring for cloud management plane attacks.</strong> Implement detection for OAuth token theft, API key compromise, service account abuse, and anomalous cross-tenant activity. Iran’s public targeting of cloud providers signals potential operations against management infrastructure, not just customer workloads.</p>
</td>
<td>
<p>Cloud Security / IAM</p>
</td>
</tr>
<tr>
<td>
<p>14</p>
</td>
<td>
<p><strong>Reassess cyber insurance coverage</strong> in light of the conflict. Many policies contain war exclusion clauses. The Stryker attack — conducted by a group linked to Iranian intelligence during an active armed conflict — will test these exclusions. Engage legal counsel and your broker now, not after an incident.</p>
</td>
<td>
<p>CISO / Legal / Risk Management</p>
</td>
</tr>
<tr>
<td>
<p>15</p>
</td>
<td>
<p><strong>Engage with your sector ISAC</strong> (FS-ISAC, H-ISAC, E-ISAC, A-ISAC, IT-ISAC) for conflict-specific indicators, playbooks, and coordination. The threat is sector-wide; the defense must be too.</p>
</td>
<td>
<p>CISO / Threat Intelligence</p>
</td>
</tr>
</tbody>
</table>
<h2><strong>The Bottom Line</strong></h2>
<p>We are 16 days into a conflict that has already produced the first kinetic attack on cloud infrastructure, the largest Iranian-linked destructive cyberattack against a US company, and a new Iranian Supreme Leader who has publicly declared American technology companies as military targets. The cyber dimension of this conflict is not a sideshow — it is a co-equal theater of operations.</p>
<p>The most dangerous signal right now is the one you’re <em>not</em> seeing. While hacktivist groups generate headlines with DDoS and wipers, Iran’s state-sponsored APTs — MuddyWater (MOIS), APT42 (IRGC-IO), UNC1549, BANISHED KITTEN (IRGC) — are maintaining an unusually low profile. History and doctrine tell us what this means: they are preserving access, waiting for the order to strike. The quiet is not calm. The quiet is the warning.</p>
<p>The Stryker attack proved that Iranian-linked actors can wipe 200,000 devices at a major US corporation. The AWS drone strikes proved that cloud data centers are not beyond physical reach. The eight ICS advisories published this week proved that the attack surface for industrial control systems is expanding faster than anyone can patch.</p>
<p><strong>Your 72-hour checklist:</strong> - ✅ Cisco SD-WAN patched or mitigated - ✅ Ignition SCADA patched or isolated - ✅ DDoS mitigation verified and tested - ✅ Wiper detection signatures deployed - ✅ Offline backups validated - ✅ IR playbooks reviewed for multi-vector scenarios</p>
<p>The organizations that act on this intelligence today will be the ones still operating normally next week. The ones that wait for the next headline may become it.</p>