All Posts
Anomali Cyber Watch
1
min read

When “Quiet" Means Pre-Positioned: Why Iranian Cyber Threats Are More Dangerous Than Headlines Suggest

Published on
March 6, 2026
Table of Contents
<p>The headlines say Iranian state-sponsored hackers are "laying low." The intelligence says otherwise.</p> <p>On 28 February 2026, the United States and Israel launched Operation Epic Fury &mdash; a combined kinetic and cyber offensive against Iran that included strikes killing Ayatollah Khamenei and, according to Israeli officials, the physical destruction of Iran's cyber warfare headquarters. Iran's conventional command-and-control is degraded. Its internet has been running at 1&ndash;4% capacity for over a week. And multiple news outlets have concluded that Iranian state cyber actors have gone quiet.</p> <p>They haven't. They've gone dormant &mdash; on networks they already control.</p> <p>This week, Symantec confirmed that <strong>Seedworm (also known as MuddyWater, STATIC KITTEN, and Mango Sandstorm)</strong> &mdash; an Iranian Ministry of Intelligence-linked APT group &mdash; maintains active presence on the networks of a U.S. bank, a U.S. airport, and a U.S. software company. This is not a new intrusion. It is pre-positioned access, established before the conflict began, now sitting ready for activation.</p> <p>If your organization touches critical infrastructure, defense, financial services, or transportation, the next 7&ndash;14 days are the most dangerous window since the conflict began. Here's what you need to know now.</p> <h2><strong>What Changed This Week</strong></h2> <table> <thead> <tr> <th> <p><strong>Date</strong></p> </th> <th> <p><strong>Development</strong></p> </th> <th> <p><strong>Significance</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p>28 Feb</p> </td> <td> <p>CISA acting director reassigned; agency operating under partial DHS shutdown</p> </td> <td> <p>Federal cyber defense capacity degraded at worst possible moment</p> </td> </tr> <tr> <td> <p>3 Mar</p> </td> <td> <p>FBI issues emergency reminder to critical infrastructure orgs on Iranian cyber mitigations</p> </td> <td> <p>Compensatory warning &mdash; FBI cannot replace CISA's incident response capability</p> </td> </tr> <tr> <td> <p>3 Mar</p> </td> <td> <p>Reports surface of IRGC leveraging AI and stolen personal data for phishing operations</p> </td> <td> <p>Iranian social engineering becoming more sophisticated and automated</p> </td> </tr> <tr> <td> <p>4 Mar</p> </td> <td> <p>149 hacktivist DDoS attacks documented across 110 organizations in 16 countries</p> </td> <td> <p>Pro-Iran hacktivist campaign operating at industrial scale</p> </td> </tr> <tr> <td> <p>4 Mar</p> </td> <td> <p>Check Point documents Iranian targeting of Hikvision and Dahua IP cameras across 7 countries</p> </td> <td> <p>Surveillance cameras weaponized for battle damage assessment and missile targeting</p> </td> </tr> <tr> <td> <p>5 Mar</p> </td> <td> <p>Israel publicly claims kinetic destruction of Iran's cyber warfare headquarters</p> </td> <td> <p>Degrades but does not eliminate Iranian cyber capacity &mdash; decentralized operators unaffected</p> </td> </tr> <tr> <td> <p>5 Mar</p> </td> <td> <p>Symantec confirms Seedworm (MuddyWater) on U.S. bank, airport, and software company networks</p> </td> <td> <p><strong>Most critical finding of the week</strong> &mdash; pre-positioned state APT access on U.S. critical infrastructure</p> </td> </tr> </tbody> </table> <h2><strong>Conflict &amp; Threat Timeline</strong></h2> <table> <thead> <tr> <th> <p><strong>Date</strong></p> </th> <th> <p><strong>Kinetic Domain</strong></p> </th> <th> <p><strong>Cyber Domain</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p>Jan 2026</p> </td> <td> <p>U.S. issues nuclear threats against Iran</p> </td> <td> <p>APT42 (CALANQUE) nuclear sector espionage activity detected</p> </td> </tr> <tr> <td> <p>28 Feb</p> </td> <td> <p><strong>Operation Epic Fury launched</strong> &mdash; strikes kill Khamenei</p> </td> <td> <p>Internet blackout across Iran (1&ndash;4% capacity); CISA enters partial shutdown</p> </td> </tr> <tr> <td> <p>1&ndash;3 Mar</p> </td> <td> <p>Coalition strikes continue against IRGC targets</p> </td> <td> <p>Hacktivist groups Keymous+, DieNet, NoName057(16) launch DDoS wave</p> </td> </tr> <tr> <td> <p>3&ndash;4 Mar</p> </td> <td> <p>&mdash;</p> </td> <td> <p>Check Point documents Iranian IP camera exploitation in 7 Middle Eastern countries</p> </td> </tr> <tr> <td> <p>5 Mar</p> </td> <td> <p><strong>Israel claims destruction of Iran's cyber warfare HQ</strong></p> </td> <td> <p>Seedworm confirmed pre-positioned on U.S. critical infrastructure networks</p> </td> </tr> <tr> <td> <p>6 Mar</p> </td> <td> <p>&mdash;</p> </td> <td> <p>TWOSTROKE malware campaign detected targeting Azerbaijan and Turkey &mdash; possible retaliation against coalition-supporting neighbors</p> </td> </tr> <tr> <td> <p><strong>7&ndash;14 Mar</strong></p> </td> <td> <p><strong>&mdash; Projected critical window &mdash;</strong></p> </td> <td> <p><strong>Likely activation of pre-positioned access as Iran reconstitutes C2</strong></p> </td> </tr> </tbody> </table> <h2><strong>Threat Analysis: Four Converging Dangers</strong></h2> <h3><strong>1. Seedworm/MuddyWater &mdash; The Silent Foothold</strong></h3> <p><strong>What it is:</strong> Seedworm (MuddyWater / STATIC KITTEN / Mango Sandstorm) is an Iranian Ministry of Intelligence-linked APT group with a long history of targeting government, defense, telecommunications, and critical infrastructure organizations.</p> <p><strong>What happened:</strong> Symantec confirmed Seedworm's presence on networks belonging to a U.S. bank, a U.S. airport, and a U.S. software company. The group's known toolset includes <strong>BELLACIAO</strong> web shells, <strong>SHELLAFEL</strong> backdoors, and PowerShell-based <strong>SYNCRO RAT</strong>. A confirmed malicious file hash (SHA256: 0f9cf1cf8d641562053ce533aaa413754db88e60404cab6bbaa11f2b2491d542) has been independently flagged by multiple sources with high confidence.</p> <p><strong>Why it matters:</strong> MuddyWater has historically served as an access broker &mdash; establishing footholds that are later handed off to destructive operators. The groups that deploy wipers (such as <strong>BANISHED KITTEN</strong>, responsible for <strong>BiBiWiper</strong>, <strong>ZeroShred</strong>, and <strong>GoneXML</strong>) rely on exactly this kind of pre-positioned access. The foothold is the precursor, not the attack itself.</p> <h3><strong>2. The Hacktivist Swarm &mdash; 149 Attacks and Counting</strong></h3> <p><strong>What it is:</strong> A coordinated campaign by at least 12 pro-Iran and pro-Russia hacktivist groups, led by <strong>Keymous+</strong>, <strong>DieNet</strong>, and <strong>NoName057(16)</strong>, which together account for nearly 75% of all documented attacks.</p> <p><strong>What happened:</strong> 149 DDoS attacks against 110 organizations across 16 countries in a single reporting period. Targeted sectors include aerospace, defense, energy, financial services, government, healthcare, telecommunications, and utilities.</p> <p><strong>Why it matters:</strong> These groups operate independently of Iran's state cyber apparatus. The kinetic destruction of Iran's cyber headquarters has zero effect on them. Even if every Iranian state APT were fully degraded, the hacktivist swarm would continue &mdash; and it is showing signs of escalating from DDoS toward destructive operations (wipers, data destruction).&nbsp;</p> <h3><strong>3. The Bidirectional Cyber-Kinetic Kill Chain</strong></h3> <p><strong>What it is:</strong> A novel operational pattern in which both sides of the conflict are using cyber operations to enable kinetic strikes &mdash; and kinetic strikes to degrade cyber capabilities.</p> <p><strong>What happened:</strong></p> <ul> <li><strong>Coalition offensive:</strong> Israel/U.S. hacked Iranian traffic cameras, hijacked television broadcasts, imposed internet blackouts, and ultimately struck Iran's cyber warfare headquarters with physical munitions.</li> <li><strong>Iranian counter-offensive:</strong> Iranian operators are compromising <strong>Hikvision</strong> and <strong>Dahua</strong> IP cameras across Israel, Qatar, Bahrain, Kuwait, UAE, Cyprus, and Lebanon &mdash; the same countries in active missile engagement zones &mdash; to conduct battle damage assessment and feed targeting data to missile units via IRGC-MTN-Irancell telecommunications links.</li> </ul> <p><strong>Why it matters:</strong> Every internet-connected sensor in or near the conflict zone is now a dual-use intelligence asset. IP cameras, IoT devices, SCADA systems, and any network-connected sensor can be co-opted for targeting. This is not theoretical &mdash; Check Point documented hundreds of exploitation attempts using improper authentication bypasses, command injection, and remote code execution vulnerabilities in camera firmware.</p> <h3><strong>4. The Defender Gap &mdash; CISA Down When It's Needed Most</strong></h3> <p><strong>What it is:</strong> The U.S. Cybersecurity and Infrastructure Security Agency (CISA) &mdash; the primary federal agency responsible for critical infrastructure cyber defense &mdash; is operating at reduced capacity due to a partial DHS shutdown and leadership transition.</p> <p><strong>What happened:</strong> CISA's acting director was reassigned on 28 February. Most of the workforce has been furloughed since mid-February. The FBI has issued compensatory warnings to critical infrastructure organizations, but the FBI cannot replicate CISA's incident response, threat hunting, or stakeholder coordination capabilities.</p> <p><strong>Why it matters:</strong> Organizations that have historically relied on CISA for incident response support, threat briefings, or emergency coordination should assume that support will be delayed or unavailable for the next 2&ndash;4 weeks. This is happening at the exact moment when Iranian retaliation is most likely.</p> <h2><strong>Vulnerabilities Under Active Threat</strong></h2> <table> <thead> <tr> <th> <p><strong>CVE</strong></p> </th> <th> <p><strong>Product</strong></p> </th> <th> <p><strong>CVSS</strong></p> </th> <th> <p><strong>Status</strong></p> </th> <th> <p><strong>Iranian Actor Relevance</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>CVE-2026-1281</strong></p> </td> <td> <p>Ivanti EPMM</p> </td> <td> <p><strong>9.8</strong></p> </td> <td> <p>Patch available</p> </td> <td> <p>Iranian APTs have historically exploited Ivanti products within days of disclosure; Fox Kitten/Lemon Sandstorm known to target VPN/edge devices</p> </td> </tr> <tr> <td> <p><strong>CVE-2026-1340</strong></p> </td> <td> <p>Ivanti EPMM</p> </td> <td> <p><strong>9.8</strong></p> </td> <td> <p>Patch available</p> </td> <td> <p>Same as above &mdash; unauthenticated RCE; likely initial access vector for Seedworm-style operations</p> </td> </tr> <tr> <td> <p>Hikvision firmware CVEs</p> </td> <td> <p>Hikvision IP cameras</p> </td> <td> <p>Various</p> </td> <td> <p>Firmware updates required</p> </td> <td> <p>Actively exploited by Iranian operators for BDA surveillance (Check Point confirmed)</p> </td> </tr> <tr> <td> <p>Dahua firmware CVEs</p> </td> <td> <p>Dahua IP cameras</p> </td> <td> <p>Various</p> </td> <td> <p>Firmware updates required</p> </td> <td> <p>Same campaign as Hikvision &mdash; command injection and improper authentication</p> </td> </tr> <tr> <td> <p>Unitronics PLC vulnerabilities</p> </td> <td> <p>Unitronics Vision/Samba PLCs</p> </td> <td> <p>Various</p> </td> <td> <p>Mitigations available</p> </td> <td> <p>Cyber Av3ngers (IRGC-linked) previously targeted U.S. water systems via Unitronics</p> </td> </tr> </tbody> </table> <h2><strong>Predictive Assessment: What Comes Next</strong></h2> <p>Based on the convergence of pre-positioned access, degraded defenses, and escalation dynamics, the following probability estimates apply to the next 14 days:</p> <table> <thead> <tr> <th> <p><strong>Scenario</strong></p> </th> <th> <p><strong>Probability</strong></p> </th> <th> <p><strong>Timeframe</strong></p> </th> <th> <p><strong>Impact</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p>Hacktivist DDoS campaign expands to healthcare and financial sectors</p> </td> <td> <p><strong>70%</strong></p> </td> <td> <p>0&ndash;7 days</p> </td> <td> <p>Moderate &mdash; service disruption, reputational damage</p> </td> </tr> <tr> <td> <p>Seedworm access activated for data exfiltration or handed off to destructive operators</p> </td> <td> <p><strong>40%</strong></p> </td> <td> <p>7&ndash;14 days</p> </td> <td> <p><strong>High</strong> &mdash; potential for espionage or destructive attack on U.S. critical infrastructure</p> </td> </tr> <tr> <td> <p>First confirmed wiper deployment against a Western target</p> </td> <td> <p><strong>25%</strong></p> </td> <td> <p>7&ndash;14 days</p> </td> <td> <p><strong>Very High</strong> &mdash; BiBiWiper/ZeroShred/GoneXML capable of permanent data destruction</p> </td> </tr> <tr> <td> <p>Cyber Av3ngers activate IOCONTROL malware against U.S. water or energy ICS</p> </td> <td> <p><strong>15%</strong></p> </td> <td> <p>7&ndash;14 days</p> </td> <td> <p><strong>Catastrophic</strong> &mdash; potential physical safety impact; low probability due to likely C2 degradation</p> </td> </tr> <tr> <td> <p>TWOSTROKE campaign expands to NATO/coalition partner networks</p> </td> <td> <p><strong>30%</strong></p> </td> <td> <p>7&ndash;30 days</p> </td> <td> <p>High &mdash; espionage against coalition-supporting nations (Azerbaijan, Turkey, Gulf states)</p> </td> </tr> </tbody> </table> <p>The key dynamic: <strong>the longer Iranian state APTs remain "quiet," the more likely the eventual action is destructive rather than espionage-focused.</strong> Silence is not safety. It is the sound of an adversary choosing its moment.</p> <h2><strong>Defense Recommendations&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong></h2> <h3><strong>🔴 Immediate (0&ndash;48 Hours)</strong></h3> <table> <thead> <tr> <th> <p><strong>Priority</strong></p> </th> <th> <p><strong>Action</strong></p> </th> <th> <p><strong>Owner</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>1</strong></p> </td> <td> <p><strong>Hunt for confirmed malicious hash</strong> SHA256 0f9cf1cf8d641562053ce533aaa413754db88e60404cab6bbaa11f2b2491d542 across all endpoints, proxy logs, and network telemetry. This indicator is confirmed malicious by three independent sources and linked to Iranian operations targeting U.S. entities.</p> </td> <td> <p>SOC / Threat Hunting</p> </td> </tr> <tr> <td> <p><strong>2</strong></p> </td> <td> <p><strong>Audit and isolate all Hikvision and Dahua IP cameras</strong> on your network &mdash; especially at facilities in or connected to the Middle East. Restrict WAN access, place on dedicated VLANs, update firmware immediately.</p> </td> <td> <p>Physical Security / IT Operations</p> </td> </tr> <tr> <td> <p><strong>3</strong></p> </td> <td> <p><strong>Verify patching for Ivanti EPMM CVE-2026-1281 and CVE-2026-1340</strong> (both CVSS 9.8, unauthenticated RCE). If you run Ivanti products and have not patched, assume you are a target.</p> </td> <td> <p>Vulnerability Management</p> </td> </tr> <tr> <td> <p><strong>4</strong></p> </td> <td> <p><strong>Brief your executive team and board</strong> that CISA support is degraded and your organization must be prepared to handle an Iranian cyber incident with internal resources and commercial partners for the next 2&ndash;4 weeks.</p> </td> <td> <p>CISO / Executive Leadership</p> </td> </tr> </tbody> </table> <h3><strong>🟠 This Week (7 Days)</strong></h3> <table> <thead> <tr> <th> <p><strong>Priority</strong></p> </th> <th> <p><strong>Action</strong></p> </th> <th> <p><strong>Owner</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>5</strong></p> </td> <td> <p><strong>Conduct targeted threat hunt for MuddyWater/Seedworm indicators</strong> &mdash; focus on BELLACIAO web shells, SHELLAFEL backdoors, and PowerShell-based SYNCRO RAT. Prioritize financial, transportation, and software development environments.</p> </td> <td> <p>Threat Hunting / IR</p> </td> </tr> <tr> <td> <p><strong>6</strong></p> </td> <td> <p><strong>Establish independent DDoS mitigation</strong> through commercial providers (Cloudflare, Akamai, or equivalent). Do not plan on federal assistance for DDoS response.</p> </td> <td> <p>Network Operations</p> </td> </tr> <tr> <td> <p><strong>7</strong></p> </td> <td> <p><strong>Review and test your wiper incident response playbook.</strong> If you don't have one, build one this week. Key TTPs to prepare for: MBR overwriting, file system destruction, backup deletion, and Active Directory compromise as a distribution mechanism.</p> </td> <td> <p>CIRT / Incident Response</p> </td> </tr> <tr> <td> <p><strong>8</strong></p> </td> <td> <p><strong>Share the bidirectional cyber-kinetic threat model</strong> with physical security teams and any partners operating IoT/sensor infrastructure in the Middle East. Any internet-connected device in theater is a potential intelligence collection platform.</p> </td> <td> <p>Intelligence Sharing / Security Leadership</p> </td> </tr> </tbody> </table> <h3><strong>🟡 This Month (30 Days)</strong></h3> <table> <thead> <tr> <th> <p><strong>Priority</strong></p> </th> <th> <p><strong>Action</strong></p> </th> <th> <p><strong>Owner</strong></p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>9</strong></p> </td> <td> <p><strong>Establish an ICS/OT-specific threat intelligence feed</strong> if you operate industrial control systems. The absence of Cyber Av3ngers/IOCONTROL activity is not reassurance &mdash; it may indicate capability being held in reserve. Consider Dragos WorldView or Claroty xDome.</p> </td> <td> <p>OT Security / CTI</p> </td> </tr> <tr> <td> <p><strong>10</strong></p> </td> <td> <p><strong>Develop a wiper-specific response playbook</strong> tailored to known Iranian destructive malware families: BiBiWiper, ZeroShred, GoneXML. Include offline backup verification, network segmentation validation, and golden image recovery procedures.</p> </td> <td> <p>CIRT / Business Continuity</p> </td> </tr> <tr> <td> <p><strong>11</strong></p> </td> <td> <p><strong>Reassess your threat model for AI-enhanced social engineering.</strong> Iranian operators are reportedly leveraging AI and stolen personal data to automate phishing at scale. Traditional email security filters may not catch AI-generated, highly personalized lures.</p> </td> <td> <p>Email Security / Security Awareness</p> </td> </tr> <tr> <td> <p><strong>12</strong></p> </td> <td> <p><strong>Conduct a tabletop exercise</strong> simulating a scenario where pre-positioned Iranian access on your network is activated for destructive purposes &mdash; during a period when federal incident response support is unavailable.</p> </td> <td> <p>CISO / Executive Leadership / IR</p> </td> </tr> </tbody> </table> <h2><strong> The Bottom Line</strong></h2> <p>The most dangerous narrative in cybersecurity right now is that Iranian state hackers have gone quiet. They haven't. Seedworm is sitting on U.S. critical infrastructure networks. Hacktivist proxies are executing attacks at industrial scale. IP cameras across seven countries are being weaponized for missile targeting. And the federal agency responsible for helping you respond is operating with a skeleton crew.</p> <p>The 7&ndash;14 day window ahead of us is critical. Iran's internet will eventually be restored. Decentralized operators will reconstitute command and control. And the pre-positioned access that Seedworm has established on U.S. networks &mdash; access that exists right now, today &mdash; will be activated.</p> <p>The question is not whether Iran will retaliate in cyberspace. It is whether your organization will have already hunted for the indicators, patched the vulnerabilities, isolated the cameras, tested the playbooks, and briefed the executives before that moment arrives.</p> <p>Don't wait for the headline. The intrusion already happened. The clock is running on the response.</p>

FEATURED RESOURCES

March 6, 2026
Anomali Cyber Watch

When “Quiet" Means Pre-Positioned: Why Iranian Cyber Threats Are More Dangerous Than Headlines Suggest

Read More
March 5, 2026
Anomali Cyber Watch

The Deceptive Lull: Why the Iran Cyber Conflict's Real Threat Isn't the One Making Headlines

Read More
March 4, 2026
Anomali Cyber Watch

The Silence Before the Storm: Why Saudi Arabia's Financial Sector Faces Its Most Dangerous Cyber Threat Window in a Decade

Read More
Explore All