All Posts
Anomali Cyber Watch
Public Sector
1
min read

When Russia Hijacks Your Routers and Iran Owns Your PLCs: The Converging Threats State Government CISOs Must Address This Week

Published on
April 9, 2026
Table of Contents
<p><strong>Threat Assessment Level: ELEVATED &mdash; Trending HIGH</strong></p> <p><em>Upgraded from ELEVATED in the prior cycle. Justification: The convergence of confirmed APT28 mass router compromise for M365 credential theft, a CVSS 9.8 actively exploited Ivanti EPMM vulnerability now on CISA&rsquo;s KEV catalog targeting government, and the first confirmed use of AI-generated malware in ransomware operations collectively increase the compound risk to state government networks beyond the baseline ELEVATED posture. A single additional direct incident against a state or local government entity would trigger a move to HIGH.</em></p> <h2><strong>Introduction&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <p>State government IT leaders face a threat environment this week that is not merely busy &mdash; it is <em>converging</em>. Nation-state actors from Russia, Iran, China, and North Korea are simultaneously executing campaigns that target the exact infrastructure stack most state agencies depend on: Microsoft 365 for identity, Ivanti for mobile device management, consumer routers for teleworker connectivity, and third-party vendor platforms for sensitive legal operations.</p> <p>This is not a theoretical exercise. As of April 8, 2026, Russia&rsquo;s GRU has compromised tens of thousands of home routers to steal your employees&rsquo; M365 credentials. CISA has confirmed Iranian IRGC-affiliated actors are manipulating programmable logic controllers at U.S. water systems and energy facilities. A CVSS 9.8 vulnerability in Ivanti&rsquo;s endpoint management platform &mdash; widely deployed across state government &mdash; is being actively exploited in the wild with government explicitly in the target set. And in Los Angeles, 7.7 terabytes of law enforcement data walked out the door through a third-party legal discovery tool &mdash; a platform identical to those used by state attorneys general and public defenders nationwide.</p> <p>This blog synthesizes the intelligence state CIOs and CISOs need to act on <em>today</em>, with specific defensive guidance, probability-weighted forecasts, and prioritized recommendations organized by urgency.</p> <h2><strong>What Changed: April 7&ndash;9, 2026</strong></h2> <p>The past 72 hours brought five developments that materially alter the risk calculus for state government:</p> <table> <thead> <tr> <th> <p>#</p> </th> <th> <p>Development</p> </th> <th> <p>Why It Matters for State Government</p> </th> </tr> </thead> <tbody> <tr> <td> <p>1</p> </td> <td> <p><strong>APT28 (GRU Unit 26165) confirmed to have compromised 18,000&ndash;40,000 SOHO routers</strong> across 120 countries for DNS hijacking and M365 credential theft (NCSC advisory, April 7&ndash;8)</p> </td> <td> <p>Every state teleworker on an unmanaged home MikroTik or TP-Link router is a potential credential harvesting victim. APT28 is specifically targeting Outlook/M365 authentication tokens.</p> </td> </tr> <tr> <td> <p>2</p> </td> <td> <p><strong>CVE-2026-1340 (Ivanti EPMM) added to CISA KEV</strong> &mdash; CVSS 9.8 unauthenticated RCE, actively exploited (April 8)</p> </td> <td> <p>Ivanti EPMM is the mobile device management platform for many state agencies. This is an unauthenticated remote code execution flaw &mdash; no credentials needed. Government is explicitly listed in the target set.</p> </td> </tr> <tr> <td> <p>3</p> </td> <td> <p><strong>Chrome 147 released patching two CRITICAL WebML RCE flaws</strong> &mdash; CVE-2026-5858 (heap buffer overflow) and CVE-2026-5859 (integer overflow), plus 55 additional vulnerabilities (April 7&ndash;8)</p> </td> <td> <p>Chrome is the dominant browser across state government endpoints. These are drive-by-capable &mdash; a user visiting a malicious page is sufficient for code execution.</p> </td> </tr> <tr> <td> <p>4</p> </td> <td> <p><strong>LAPD breach via third-party legal discovery platform</strong> &mdash; 7.7TB / 337,000+ files exfiltrated including witness identities, medical records, and unredacted criminal complaints (confirmed April 9)</p> </td> <td> <p>State AG offices, public defenders, and law enforcement agencies use identical e-discovery and document transfer platforms. This is a supply chain risk with a direct state government parallel.</p> </td> </tr> <tr> <td> <p>5</p> </td> <td> <p><strong>AI-generated malware (Slopoly) confirmed in production ransomware operations</strong> &mdash; IBM X-Force attributes to Hive0163 (March 2026, reported April 8&ndash;9)</p> </td> <td> <p>The first verified instance of AI-generated malware deployed in a real ransomware intrusion. This lowers the barrier for custom, polymorphic malware that evades signature-based detection.</p> </td> </tr> </tbody> </table> <p><strong>Continuing from prior cycles</strong> (not dropped &mdash; these remain active threats):</p> <ul> <li><strong>Iranian IRGC actors (CyberAv3ngers/IRGC-CEC)</strong> continue PLC manipulation at U.S. critical infrastructure per CISA Advisory AA26-097A (April 7). Rockwell Automation PLCs at water systems and energy sites are confirmed targets, with Dropbear SSH used for persistence.</li> <li><strong>Handala Hack</strong> (pro-Iran hacktivist) breach claim against St.&nbsp;Joseph County, Indiana &mdash; 2TB exfiltrated &mdash; remains unresolved since discovery on April 8.</li> <li><strong>CVE-2025-59528</strong> (Flowise AI platform, CVSS 10.0) remains under active exploitation across 12,000&ndash;15,000 exposed instances.</li> <li><strong>APT42 (IRGC-IO)</strong> and <strong>MuddyWater (MOIS)</strong> continue pre-positioning operations following the March 19 DOJ seizure of Iranian cyber infrastructure.</li> <li><strong>ClickFix social engineering campaigns</strong> targeting government are confirmed active this cycle, deploying NETSUPPORT RAT via PowerShell lures; the AMOS stealer variant has evolved to bypass macOS Terminal warnings by pivoting to Script Editor.</li> </ul> <h2><strong>Threat Timeline: March 19 &ndash; April 9, 2026</strong></h2> <table> <thead> <tr> <th> <p>Date</p> </th> <th> <p>Event</p> </th> <th> <p>Actor / Source</p> </th> <th> <p>Impact</p> </th> </tr> </thead> <tbody> <tr> <td> <p>Mar 19</p> </td> <td> <p>DOJ seizes Iranian cyber infrastructure</p> </td> <td> <p>U.S. DOJ</p> </td> <td> <p>Disrupts IRGC-IO/MOIS operations; triggers retaliatory pre-positioning</p> </td> </tr> <tr> <td> <p>Mar 2026</p> </td> <td> <p>Hive0163 deploys AI-generated &ldquo;Slopoly&rdquo; malware in ransomware operation</p> </td> <td> <p>Hive0163 / IBM X-Force</p> </td> <td> <p>First confirmed AI-generated malware in production ransomware</p> </td> </tr> <tr> <td> <p>Apr 1</p> </td> <td> <p>Handala Hack claims breach of St.&nbsp;Joseph County, IN (2TB exfiltrated)</p> </td> <td> <p>Handala Hack (pro-Iran)</p> </td> <td> <p>State/local government data exfiltration precedent</p> </td> </tr> <tr> <td> <p>Apr 7</p> </td> <td> <p>CISA Advisory AA26-097A: Iranian actors exploit PLCs at U.S. critical infrastructure</p> </td> <td> <p>CyberAv3ngers (IRGC-CEC) / CISA</p> </td> <td> <p>Water, energy, government facilities confirmed targets</p> </td> </tr> <tr> <td> <p>Apr 7</p> </td> <td> <p>CISA ICS Advisory: Mitsubishi GENESIS64 / ICONICS vulnerabilities</p> </td> <td> <p>CISA</p> </td> <td> <p>ICS/SCADA exposure for state-operated facilities</p> </td> </tr> <tr> <td> <p>Apr 7&ndash;8</p> </td> <td> <p>NCSC advisory: APT28 compromises 18,000&ndash;40,000 SOHO routers for DNS hijacking</p> </td> <td> <p>APT28 / GRU Unit 26165</p> </td> <td> <p>M365 credential theft via AiTM across 120 countries</p> </td> </tr> <tr> <td> <p>Apr 7&ndash;8</p> </td> <td> <p>Chrome 147 released: 2 CRITICAL + 15 HIGH severity patches</p> </td> <td> <p>Google</p> </td> <td> <p>Drive-by RCE risk for unpatched browsers</p> </td> </tr> <tr> <td> <p>Apr 7</p> </td> <td> <p>Firefox ESR 140.9.1 patches CVE-2026-5731 (CVSS 9.8) and CVE-2026-5732 (CVSS 8.8)</p> </td> <td> <p>Mozilla</p> </td> <td> <p>Memory safety and integer overflow in government-deployed browsers</p> </td> </tr> <tr> <td> <p>Apr 8</p> </td> <td> <p>CISA adds CVE-2026-1340 (Ivanti EPMM) to KEV &mdash; actively exploited</p> </td> <td> <p>CISA / Ivanti</p> </td> <td> <p>Unauthenticated RCE in government MDM platform</p> </td> </tr> <tr> <td> <p>Apr 8&ndash;9</p> </td> <td> <p>ClickFix campaigns confirmed targeting government with NETSUPPORT RAT</p> </td> <td> <p>Financial-gain actors</p> </td> <td> <p>Social engineering &rarr; remote access tool deployment</p> </td> </tr> <tr> <td> <p>Apr 8&ndash;9</p> </td> <td> <p>AMOS Stealer shifts from Terminal to Script Editor to bypass macOS warnings</p> </td> <td> <p>ClickFix operators</p> </td> <td> <p>macOS security control evasion</p> </td> </tr> <tr> <td> <p>Apr 9</p> </td> <td> <p>LAPD breach via third-party legal discovery tool confirmed (7.7TB)</p> </td> <td> <p>Unknown actor</p> </td> <td> <p>Government vendor supply chain data exfiltration</p> </td> </tr> <tr> <td> <p>Apr 8&ndash;9</p> </td> <td> <p>Axios npm supply chain attack attributed to UNC1069 (DPRK-linked)</p> </td> <td> <p>UNC1069 / DPRK</p> </td> <td> <p>Developer supply chain compromise</p> </td> </tr> <tr> <td> <p>Ongoing</p> </td> <td> <p>OCEANBUFFALO/Pagoda APT IOCs targeting government (confidence 90)</p> </td> <td> <p>OCEANBUFFALO</p> </td> <td> <p>Government-targeted espionage malware</p> </td> </tr> </tbody> </table> <h2><strong>Key Threat Analysis&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2> <h3><strong>1. APT28&rsquo;s Router Hijacking Campaign: Your Teleworkers Are the Attack Surface</strong></h3> <p><strong>Actor:</strong> APT28 (Fancy Bear / GRU Unit 26165 &mdash; Russian military intelligence)</p> <p>This is not a theoretical vulnerability &mdash; it is an active, confirmed operation at massive scale. APT28 has compromised an estimated 18,000 to 40,000 consumer-grade MikroTik and TP-Link routers across approximately 120 countries. The operation uses DNS hijacking to redirect victims&rsquo; web traffic through attacker-controlled infrastructure, enabling adversary-in-the-middle (AiTM) interception of passwords and authentication tokens. The specific targeting of <strong>Microsoft Outlook and M365 credentials</strong> makes this directly relevant to every state agency running Microsoft 365.</p> <p><strong>Why this matters for state government:</strong> State employees working from home &mdash; and there are tens of thousands of them &mdash; connect through consumer routers that the state IT organization does not manage, cannot patch, and likely cannot even inventory. APT28 is exploiting this exact gap. A compromised home router silently redirects DNS queries, allowing the attacker to present convincing login pages and intercept MFA tokens in real time. The employee sees nothing unusual. The attacker gets a valid session token.</p> <p><strong>Corroboration:</strong> Six independent sources (NCSC, TechCrunch, Ars Technica, The Hacker News, Tom&rsquo;s Hardware, and additional OSINT) confirm the operation&rsquo;s scope, TTPs, and targeting. This is a high-confidence assessment.</p> <h3><strong>2. CVE-2026-1340: Ivanti EPMM Under Active Exploitation &mdash; Government in the Crosshairs</strong></h3> <p><strong>CVSS:</strong> 9.8 CRITICAL | <strong>Status:</strong> CISA Known Exploited Vulnerability (KEV) | <strong>Exploitation:</strong> Active, in the wild</p> <p>Ivanti Endpoint Manager Mobile (EPMM) is the mobile device management platform that many state agencies rely on to manage smartphones, tablets, and mobile access to state systems. CVE-2026-1340 is an unauthenticated code injection vulnerability &mdash; meaning an attacker needs no credentials whatsoever to achieve remote code execution on the EPMM server.</p> <p>Campaign intelligence from threat feeds confirms that actors of unknown motivation are actively exploiting both CVE-2026-1281 and CVE-2026-1340 for initial access, with <strong>government</strong> explicitly listed among the targeted sectors alongside automotive, commercial, financial services, manufacturing, and transportation across six countries.</p> <p><strong>For state agencies running Ivanti EPMM, this is a patch-now situation.</strong> CISA&rsquo;s Binding Operational Directive 22-01 requires remediation by the specified due date. If patching cannot be completed within 48 hours, isolate the EPMM instance from internet-facing access immediately.</p> <h3><strong>3. Iranian Threat Complex: From PLCs to Hacktivism</strong></h3> <p>Three distinct Iranian threat actors are conducting operations relevant to state government:</p> <table> <thead> <tr> <th> <p>Actor</p> </th> <th> <p>Affiliation</p> </th> <th> <p>Current Activity</p> </th> <th> <p>Target</p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>CyberAv3ngers</strong></p> </td> <td> <p>IRGC Cyber-Electronic Command (CEC)</p> </td> <td> <p>Active PLC manipulation at U.S. facilities; Dropbear SSH persistence (CISA AA26-097A)</p> </td> <td> <p>Water/wastewater, energy, government SCADA</p> </td> </tr> <tr> <td> <p><strong>APT42</strong></p> </td> <td> <p>IRGC Intelligence Organization (IO)</p> </td> <td> <p>Pre-positioning operations post-DOJ infrastructure seizure (Mar 19)</p> </td> <td> <p>Government, policy, diplomatic targets</p> </td> </tr> <tr> <td> <p><strong>MuddyWater</strong></p> </td> <td> <p>Ministry of Intelligence and Security (MOIS)</p> </td> <td> <p>Pre-positioning operations post-DOJ infrastructure seizure</p> </td> <td> <p>Government, telecommunications</p> </td> </tr> <tr> <td> <p><strong>Handala Hack</strong></p> </td> <td> <p>Pro-Iran hacktivist</p> </td> <td> <p>Claimed 2TB breach of St.&nbsp;Joseph County, IN (Apr 1, discovered Apr 8)</p> </td> <td> <p>U.S. state/local government</p> </td> </tr> </tbody> </table> <p>The March 19 DOJ seizure of Iranian cyber infrastructure has not degraded these actors &mdash; it has accelerated their pre-positioning. CyberAv3ngers&rsquo; confirmed manipulation of Rockwell Automation PLCs at water systems is particularly concerning for state agencies that operate water treatment, wastewater, and transportation SCADA systems.</p> <h3><strong>4. Ransomware Landscape: AI-Generated Malware Enters the Arena</strong></h3> <p>The ransomware threat to state and local government remains acute, with five groups actively targeting the sector:</p> <ul> <li><strong>Akira</strong> &mdash; Hit School Health Corporation (education-adjacent) on April 7</li> <li><strong>DragonForce</strong> &mdash; Active in threat feeds targeting government</li> <li><strong>Qilin</strong> &mdash; Active in threat feeds targeting government</li> <li><strong>NightSpire</strong> &mdash; Active in threat feeds targeting government</li> <li><strong>Hive0163</strong> &mdash; Deployed <strong>Slopoly</strong>, the first confirmed AI-generated malware used in a production ransomware operation</li> </ul> <p>The Slopoly development deserves special attention. IBM X-Force confirmed that Hive0163 used multiple backdoors in sequence during an intrusion before introducing Slopoly late in the kill chain &mdash; suggesting the group was testing AI-assisted tooling in a live environment. If AI-generated malware becomes standard practice, it means:</p> <ul> <li><strong>Polymorphic variants</strong> generated on demand, defeating signature-based detection</li> <li><strong>Lower skill barriers</strong> for ransomware affiliates to produce custom tooling</li> <li><strong>Faster iteration</strong> &mdash; new variants can be generated in minutes, not days</li> </ul> <p>This is a strategic inflection point, not a one-off curiosity.</p> <h3><strong>5. Supply Chain: Three Vectors, Three Threat Actors</strong></h3> <table> <thead> <tr> <th> <p>Vector</p> </th> <th> <p>Actor</p> </th> <th> <p>Detail</p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>Third-party legal platform</strong></p> </td> <td> <p>Unknown</p> </td> <td> <p>LAPD breach: 7.7TB exfiltrated via vendor-managed e-discovery tool. State AG offices and law enforcement use identical platforms.</p> </td> </tr> <tr> <td> <p><strong>npm package (Axios)</strong></p> </td> <td> <p>UNC1069 (DPRK-linked)</p> </td> <td> <p>Compromised widely-used npm package for developer supply chain attack. State agencies with custom web applications using Axios are exposed.</p> </td> </tr> <tr> <td> <p><strong>Open source community (Slack)</strong></p> </td> <td> <p>Unknown</p> </td> <td> <p>Linux Foundation leader impersonated in Slack to deliver malware to open source developers. OpenSSF issued high-severity advisory.</p> </td> </tr> </tbody> </table> <h3><strong>6. ClickFix Social Engineering: Now Targeting Government</strong></h3> <p>Two active campaigns confirmed this cycle use the ClickFix social engineering technique to target <strong>government</strong> and commercial sectors:</p> <ul> <li>One campaign deploys <strong>NETSUPPORT</strong> remote access tool via ClickFix lures and PowerShell scripts</li> <li>The <strong>AMOS (Atomic Stealer)</strong> campaign has evolved to bypass Apple&rsquo;s macOS Terminal security warnings by shifting execution to <strong>Script Editor</strong></li> </ul> <p>ClickFix tricks users into copying and pasting malicious commands &mdash; a technique that bypasses traditional email security controls because the user initiates the execution themselves.</p> <h2><strong>Predictive Analysis: What Comes Next</strong></h2> <p>Based on current intelligence, actor behavior patterns, and the active threat landscape:</p> <table> <thead> <tr> <th> <p>Probability</p> </th> <th> <p>Prediction (7-day horizon)</p> </th> </tr> </thead> <tbody> <tr> <td> <p><strong>70%</strong></p> </td> <td> <p>NCSC releases specific IOCs and detection guidance for the APT28 router hijacking campaign, enabling creation of targeted detection rules</p> </td> </tr> <tr> <td> <p><strong>65%</strong></p> </td> <td> <p>CVE-2026-1340 (Ivanti EPMM) exploitation expands in scope; additional government victims are identified as scanning activity increases</p> </td> </tr> <tr> <td> <p><strong>60%</strong></p> </td> <td> <p>Additional Chrome zero-day or in-the-wild exploitation of CVE-2026-5858/5859 is reported before enterprise patching reaches saturation</p> </td> </tr> <tr> <td> <p><strong>55%</strong></p> </td> <td> <p>ClickFix campaigns targeting government intensify &mdash; two active campaigns with government targeting confirmed this cycle, and the technique continues to evolve to evade controls</p> </td> </tr> <tr> <td> <p><strong>50%</strong></p> </td> <td> <p>Iranian threat actors (CyberAv3ngers or affiliated groups) conduct additional ICS/SCADA operations at U.S. critical infrastructure in retaliation for the March 19 DOJ action</p> </td> </tr> <tr> <td> <p><strong>40%</strong></p> </td> <td> <p>A U.S. state or local government entity is publicly reported as a ransomware victim within 7 days, given the current activity level of Akira, DragonForce, Qilin, NightSpire, and Hive0163</p> </td> </tr> <tr> <td> <p><strong>30%</strong></p> </td> <td> <p>AI-generated malware (Slopoly or similar) is identified in a second, independent ransomware operation &mdash; confirming the technique is spreading beyond Hive0163</p> </td> </tr> </tbody> </table> <h2><strong>SOC Operational Guidance&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</strong></h2> <h3><strong>Detection Priorities</strong></h3> <p><strong>Priority 1 &mdash; APT28 DNS Hijacking / AiTM Credential Theft</strong></p> <table> <thead> <tr> <th> <p>ATT&amp;CK Technique</p> </th> <th> <p>Detection Guidance</p> </th> </tr> </thead> <tbody> <tr> <td> <p>T1584.008 &mdash; Compromise Infrastructure: Network Devices</p> </td> <td> <p>Monitor for DNS configuration changes on network edge devices, particularly MikroTik and TP-Link routers. Alert on DNS server changes to non-authorized resolvers.</p> </td> </tr> <tr> <td> <p>T1557.001 &mdash; Adversary-in-the-Middle</p> </td> <td> <p>Monitor for TLS certificate anomalies on M365/Outlook login flows. Detect mismatched certificate authorities for login.microsoftonline.com and outlook.office365.com.</p> </td> </tr> <tr> <td> <p>T1539 &mdash; Steal Web Session Cookie</p> </td> <td> <p>Hunt for impossible travel or anomalous session token reuse in Azure AD/Entra ID sign-in logs. Look for sessions originating from unexpected geographies within minutes of legitimate logins.</p> </td> </tr> <tr> <td> <p>T1078.004 &mdash; Valid Accounts: Cloud Accounts</p> </td> <td> <p>Alert on M365 logins from IP ranges associated with known VPN/proxy services, particularly those geolocated in Eastern Europe or Central Asia.</p> </td> </tr> </tbody> </table> <p><strong>Hunting Hypothesis:</strong><em>If APT28 is intercepting M365 tokens via DNS hijacking on home routers, we should see anomalous Azure AD sign-in events where the same user authenticates from both their normal ISP and an unexpected IP within a short time window, or where conditional access policies are bypassed by replayed session tokens.</em></p> <p><strong>Priority 2 &mdash; Ivanti EPMM Exploitation (CVE-2026-1340)</strong></p> <table> <thead> <tr> <th> <p>ATT&amp;CK Technique</p> </th> <th> <p>Detection Guidance</p> </th> </tr> </thead> <tbody> <tr> <td> <p>T1190 &mdash; Exploit Public-Facing Application</p> </td> <td> <p>Monitor Ivanti EPMM server logs for unauthenticated API calls with code injection patterns. Alert on unexpected child processes spawned by the EPMM web service.</p> </td> </tr> <tr> <td> <p>T1059 &mdash; Command and Scripting Interpreter</p> </td> <td> <p>Post-exploitation will likely involve command execution. Monitor for cmd.exe, powershell.exe, or bash spawned by the Ivanti EPMM process.</p> </td> </tr> </tbody> </table> <p><strong>Hunting Hypothesis:</strong><em>If CVE-2026-1340 is being exploited against our EPMM instance, we should see unauthenticated HTTP requests to the EPMM API containing injection payloads, followed by anomalous process creation on the EPMM server.</em></p> <p><strong>Priority 3 &mdash; ClickFix Social Engineering &rarr; NETSUPPORT / AMOS</strong></p> <table> <thead> <tr> <th> <p>ATT&amp;CK Technique</p> </th> <th> <p>Detection Guidance</p> </th> </tr> </thead> <tbody> <tr> <td> <p>T1059.001 &mdash; PowerShell</p> </td> <td> <p>Alert on PowerShell execution initiated from browser processes or clipboard paste operations. Look for encoded commands or download cradles.</p> </td> </tr> <tr> <td> <p>T1059.005 &mdash; Visual Basic / Script Editor</p> </td> <td> <p>On macOS endpoints, monitor for osascript or Script Editor launching shell commands. The AMOS campaign has pivoted from Terminal to Script Editor.</p> </td> </tr> <tr> <td> <p>T1219 &mdash; Remote Access Software</p> </td> <td> <p>Detect NETSUPPORT RAT installation artifacts: client32.exe, NSM.LIC, connections to NETSUPPORT C2 infrastructure.</p> </td> </tr> <tr> <td> <p>T1566.002 &mdash; Spearphishing Link</p> </td> <td> <p>Monitor for users navigating to Cloudflare Pages or Squarespace-hosted domains that serve ClickFix lures.</p> </td> </tr> </tbody> </table> <p><strong>Hunting Hypothesis:</strong><em>If ClickFix is targeting state employees, we should see browser-initiated PowerShell or Script Editor execution, potentially preceded by visits to newly registered domains on Cloudflare Pages or similar hosting platforms.</em></p> <p><strong>Priority 4 &mdash; Iranian ICS/SCADA Operations</strong></p> <table> <thead> <tr> <th> <p>ATT&amp;CK Technique</p> </th> <th> <p>Detection Guidance</p> </th> </tr> </thead> <tbody> <tr> <td> <p>T0839 &mdash; Module Firmware (ICS)</p> </td> <td> <p>Monitor for unauthorized firmware changes on Rockwell Automation PLCs at water, wastewater, and energy facilities.</p> </td> </tr> <tr> <td> <p>T0859 &mdash; Valid Accounts (ICS)</p> </td> <td> <p>Detect SSH connections (particularly Dropbear SSH) to OT/ICS network segments from unexpected sources.</p> </td> </tr> <tr> <td> <p>T1021.004 &mdash; Remote Services: SSH</p> </td> <td> <p>Alert on SSH sessions to PLC management interfaces, especially from internet-facing IP ranges or jump hosts not in the approved access list.</p> </td> </tr> </tbody> </table> <h2><strong>Sector-Specific Defensive Priorities</strong></h2> <h3><strong>Financial Services (State Treasury, Revenue, Tax Systems)</strong></h3> <ul> <li><strong>Primary threat:</strong> APT28 AiTM credential theft targeting M365 accounts that access financial systems and taxpayer PII</li> <li><strong>Action:</strong> Enforce phishing-resistant MFA (FIDO2/hardware keys) for all accounts with access to treasury, revenue, and tax processing systems. Conditional access policies should require compliant devices and block legacy authentication protocols.</li> <li><strong>Secondary threat:</strong> ClickFix &rarr; NETSUPPORT campaigns targeting government financial operations</li> <li><strong>Action:</strong> Restrict PowerShell execution to constrained language mode on endpoints in financial processing environments. Block NETSUPPORT RAT artifacts at the endpoint and network level.</li> </ul> <h3><strong>Energy (State-Operated Utilities, Grid Coordination)</strong></h3> <ul> <li><strong>Primary threat:</strong> CyberAv3ngers (IRGC-CEC) PLC manipulation at energy facilities &mdash; confirmed active per CISA AA26-097A</li> <li><strong>Action:</strong> Audit all Rockwell Automation PLC firmware versions at state-operated energy facilities. Verify no unauthorized SSH services (particularly Dropbear SSH) are running on OT network segments. Implement network segmentation between IT and OT with unidirectional gateways where feasible.</li> <li><strong>Secondary threat:</strong> Mitsubishi GENESIS64 / ICONICS ICS vulnerabilities (CISA ICS advisory, April 7)</li> <li><strong>Action:</strong> Inventory all Mitsubishi/ICONICS deployments and apply vendor patches per CISA guidance.</li> </ul> <h3><strong>Healthcare (State Medicaid, Public Health, HHS Systems)</strong></h3> <ul> <li><strong>Primary threat:</strong> Ransomware &mdash; Akira hit School Health Corporation (April 7); healthcare remains the most targeted sector for ransomware nationally</li> <li><strong>Action:</strong> Verify offline backup integrity for Medicaid claims processing, electronic health records, and public health surveillance systems. Test restoration procedures. Ensure incident response retainer is current and covers healthcare-specific regulatory requirements (HIPAA breach notification).</li> <li><strong>Secondary threat:</strong> Third-party vendor compromise &mdash; the LAPD breach pattern applies to health information exchanges and claims processing vendors</li> <li><strong>Action:</strong> Audit third-party data sharing agreements for healthcare vendors. Require SOC 2 Type II attestation and verify MFA enforcement on all vendor access to state health data.</li> </ul> <h3><strong>Government (Executive Agencies, Legislature, Judiciary)</strong></h3> <ul> <li><strong>Primary threat:</strong> Ivanti EPMM CVE-2026-1340 &mdash; unauthenticated RCE on the MDM platform managing agency mobile devices</li> <li><strong>Action:</strong> Patch immediately. If patching is delayed, isolate EPMM from internet-facing access. Audit EPMM logs for indicators of prior exploitation.</li> <li><strong>Secondary threat:</strong> APT28 credential theft via home router DNS hijacking &mdash; state teleworkers are directly exposed</li> <li><strong>Action:</strong> Enforce conditional access policies requiring compliant/managed devices for M365 access. Evaluate SASE/ZTNA solutions to tunnel remote worker traffic through state-controlled infrastructure, bypassing compromised home routers.</li> <li><strong>Tertiary threat:</strong> Handala Hack and similar hacktivist groups targeting county/municipal government &mdash; St.&nbsp;Joseph County, IN breach is a direct precedent</li> <li><strong>Action:</strong> Issue advisory to county and municipal IT partners about hacktivist targeting. Verify that interconnected local government networks are segmented from state systems.</li> </ul> <h3><strong>Aviation / Logistics (State DOT, Airport Authorities, Port Operations)</strong></h3> <ul> <li><strong>Primary threat:</strong> Nation-state espionage &mdash; China-nexus actors are actively exploiting BeyondTrust (CVE-2026-1731, CVSS 9.8) targeting aerospace and government</li> <li><strong>Action:</strong> Inventory all BeyondTrust Remote Support and Privileged Remote Access instances across DOT and transportation agencies. Verify patched against CVE-2026-1731. Restrict remote access tool usage to approved, patched versions only.</li> <li><strong>Secondary threat:</strong> Supply chain compromise via npm/developer tools &mdash; state agencies with custom logistics or fleet management applications built on Node.js are exposed to the Axios npm attack (UNC1069/DPRK)</li> <li><strong>Action:</strong> Audit package-lock.json files for Axios dependencies. Pin all npm packages to specific versions and verify integrity hashes. Implement software composition analysis (SCA) in CI/CD pipelines.</li> </ul> <h2><strong>Prioritized Defense Recommendations</strong></h2> <h3><strong>IMMEDIATE (Within 24 Hours)</strong></h3> <table> <thead> <tr> <th> <p>Priority</p> </th> <th> <p>Responsible Team</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p>🔴</p> </td> <td> <p>IT Operations</p> </td> <td> <p><strong>Patch Ivanti EPMM</strong> to remediate CVE-2026-1340 (CVSS 9.8, CISA KEV, actively exploited, government targeted). Verify all EPMM instances across agencies. If patching is delayed beyond 48 hours, isolate EPMM from internet-facing access.</p> </td> </tr> <tr> <td> <p>🔴</p> </td> <td> <p>IT Operations</p> </td> <td> <p><strong>Push Chrome 147.0.7727.55+</strong> to all managed endpoints to remediate CVE-2026-5858 and CVE-2026-5859 (Critical WebML RCE). Verify auto-update is functioning across all agencies.</p> </td> </tr> <tr> <td> <p>🔴</p> </td> <td> <p>IT Operations</p> </td> <td> <p><strong>Push Firefox ESR 140.9.1+ and Thunderbird 140.9.1+</strong> to remediate CVE-2026-5731 (CVSS 9.8 memory safety) and CVE-2026-5732 (CVSS 8.8 integer overflow).</p> </td> </tr> <tr> <td> <p>🔴</p> </td> <td> <p>SOC</p> </td> <td> <p><strong>Create detection rules for DNS configuration changes</strong> on MikroTik and TP-Link routers visible in state network telemetry and VPN logs. Alert on DNS redirects to non-authorized resolvers. Monitor Azure AD sign-in logs for impossible travel and session token replay indicative of APT28 AiTM.</p> </td> </tr> </tbody> </table> <h3><strong>7-DAY</strong></h3> <table> <thead> <tr> <th> <p>Priority</p> </th> <th> <p>Responsible Team</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p>🟠</p> </td> <td> <p>Identity/SOC</p> </td> <td> <p><strong>Audit Azure AD/Entra ID conditional access policies</strong> to enforce token binding, require compliant devices, and detect session token replay. APT28&rsquo;s router DNS hijacking enables AiTM token theft against M365. Evaluate phishing-resistant MFA (FIDO2) for privileged accounts.</p> </td> </tr> <tr> <td> <p>🟠</p> </td> <td> <p>IT Operations</p> </td> <td> <p><strong>Inventory and patch all BeyondTrust Remote Support and Privileged Remote Access instances</strong> against CVE-2026-1731 (CVSS 9.8). China-nexus actors are actively exploiting this for government and aerospace targeting.</p> </td> </tr> <tr> <td> <p>🟠</p> </td> <td> <p>CISO / Legal</p> </td> <td> <p><strong>Audit third-party e-discovery and legal document transfer platforms</strong> used by the Attorney General&rsquo;s office, public defenders, and state law enforcement. The LAPD breach (7.7TB via vendor tool) is a direct precedent. Require vendor SOC 2 attestation, enforce MFA on all vendor access, and verify data-at-rest encryption.</p> </td> </tr> <tr> <td> <p>🟠</p> </td> <td> <p>IT Operations (macOS)</p> </td> <td> <p><strong>Block Script Editor execution via MDM policy</strong> on state-managed macOS devices. The AMOS/ClickFix campaign now bypasses Terminal warnings by pivoting to Script Editor. Also restrict osascript execution to approved processes.</p> </td> </tr> <tr> <td> <p>🟠</p> </td> <td> <p>ICS/OT Security</p> </td> <td> <p><strong>Audit Rockwell Automation PLC firmware</strong> at state-operated water, wastewater, and energy facilities per CISA Advisory AA26-097A. Verify no unauthorized SSH services (Dropbear SSH) are present on OT segments. Review and tighten IT/OT network segmentation.</p> </td> </tr> </tbody> </table> <h3><strong>30-DAY</strong></h3> <table> <thead> <tr> <th> <p>Priority</p> </th> <th> <p>Responsible Team</p> </th> <th> <p>Action</p> </th> </tr> </thead> <tbody> <tr> <td> <p>🟡</p> </td> <td> <p>CISO</p> </td> <td> <p><strong>Commission a SOHO/remote worker router security assessment.</strong> APT28&rsquo;s compromise of 18,000&ndash;40,000 consumer routers for credential theft means state teleworkers on unmanaged home networks are exposed at scale. Evaluate SASE/ZTNA architectures to route remote worker traffic through state-controlled infrastructure, eliminating dependence on home router DNS integrity.</p> </td> </tr> <tr> <td> <p>🟡</p> </td> <td> <p>CISO</p> </td> <td> <p><strong>Develop an AI-generated malware detection strategy.</strong> IBM X-Force&rsquo;s Slopoly finding confirms ransomware operators are using AI to generate custom malware. Evaluate behavioral EDR rules, sandbox detonation capabilities, and ML-based detection models that do not rely on static signatures.</p> </td> </tr> <tr> <td> <p>🟡</p> </td> <td> <p>CISO / Procurement</p> </td> <td> <p><strong>Establish a third-party vendor cybersecurity assessment program</strong> for all vendors handling sensitive state data &mdash; particularly legal, healthcare, and financial processing vendors. Require SOC 2 Type II, penetration testing results, and incident notification SLAs in all contracts.</p> </td> </tr> <tr> <td> <p>🟡</p> </td> <td> <p>CISO / CIO</p> </td> <td> <p><strong>Brief the Governor&rsquo;s office and agency heads</strong> on the converging nation-state threat landscape. The simultaneous pressure from Russia (credential theft), Iran (ICS manipulation), China (remote access tool exploitation), and DPRK (supply chain compromise) represents a compound risk that may require additional budget allocation for identity security, OT segmentation, and remote workforce protection.</p> </td> </tr> <tr> <td> <p>🟡</p> </td> <td> <p>IR / CISO</p> </td> <td> <p><strong>Update the state incident response plan</strong> to address AI-generated malware scenarios and third-party vendor breach scenarios. Tabletop exercise recommendation: simulate a ransomware incident where the malware evades signature-based detection (Slopoly scenario) combined with a simultaneous vendor data breach (LAPD scenario).</p> </td> </tr> </tbody> </table> <h2><strong>What We&rsquo;re Watching But Haven&rsquo;t Seen &mdash; And Why That Matters</strong></h2> <p>Intelligence analysis is not only about what appeared this week &mdash; it is also about what <em>should</em> have appeared but didn&rsquo;t:</p> <ul> <li><strong>Volt Typhoon / Salt Typhoon (China):</strong> No new reporting on Chinese pre-positioning in U.S. critical infrastructure this cycle, despite the active China-nexus BeyondTrust exploitation campaign. Given heightened U.S.-China tensions, the silence on these actors is notable and may indicate operational security improvements rather than reduced activity. We are actively monitoring.</li> <li><strong>Direct ransomware hit on a state or local government entity:</strong> Despite five active ransomware groups targeting government, no new state/local victim was publicly reported this cycle. This may indicate a pre-positioning phase rather than a lull. Do not reduce defensive posture.</li> <li><strong>Cybersecurity legislation:</strong> No new state or federal cybersecurity legislation was captured this cycle &mdash; the fourth consecutive cycle without legislative intelligence. This is a collection gap, not an absence of legislative activity. State legislatures are in session and cybersecurity bills are moving. State CISOs should independently monitor NCSL cybersecurity policy trackers and their own legislature&rsquo;s bill tracking systems for compliance-impacting developments.</li> </ul> <h2><strong>Bottom Line&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</strong></h2> <p>The threat environment facing state government this week is defined by <em>convergence</em> &mdash; not any single threat, but the simultaneous pressure across identity infrastructure (APT28 credential theft), endpoint management (Ivanti EPMM exploitation), operational technology (Iranian PLC manipulation), the software supply chain (npm compromise, vendor platform breaches), and the browser attack surface (Chrome and Firefox critical vulnerabilities).</p> <p>No single defensive action addresses this compound risk. The recommendations above are sequenced by urgency because time is the variable state CISOs control. The Ivanti EPMM patch and Chrome/Firefox updates are the highest-leverage actions available today &mdash; they close confirmed, actively exploited attack paths against government targets. The 7-day actions (conditional access hardening, BeyondTrust patching, vendor audits) address the next tier of confirmed threats. The 30-day actions (SASE/ZTNA evaluation, AI malware strategy, vendor assessment program) build structural resilience against the threat landscape that is forming.</p> <p>The adversaries are not waiting. Neither should we.</p>

FEATURED RESOURCES

April 9, 2026
Anomali Cyber Watch

Iran’s Cyber War Machine Isn’t Slowing Down — Six Weeks in, Critical Infrastructure Is Under Active Attack

Read More
April 9, 2026
Anomali Cyber Watch
Public Sector

When Russia Hijacks Your Routers and Iran Owns Your PLCs: The Converging Threats State Government CISOs Must Address This Week

Read More
April 8, 2026
Anomali Cyber Watch

Iran’s Cyber War Didn’t Stop With the Ceasefire — It Just Went Underground

Read More
Explore All