All Posts
Anomali Cyber Watch
1
min read

When the Ceasefire Holds but the Hackers Don’t: Iran’s Cyber War Enters Its Ninth Week

Published on
April 28, 2026
Table of Contents
<p> <strong> Threat Assessment Level: HIGH </strong> </p> <p> <em> Nine weeks into the most significant U.S.&ndash;Iran military confrontation since 1979, a kinetic ceasefire declared around April 16 has done nothing to slow Iranian cyber operations. Federal agencies have been compromised. Russian intelligence infrastructure is converging with Iranian hosting. Emergency services, digital signage systems, and tens of thousands of home routers have become the new frontlines. And the most dangerous signal in our intelligence picture isn&rsquo;t what we&rsquo;re seeing &mdash; it&rsquo;s what we&rsquo;re not. </em> </p> <h2> <strong> What Changed This Week&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; </strong> </h2> <p> The period ending April 28, 2026 &mdash; Day 59 of the conflict that began with Operation Epic Fury on February 28 &mdash; delivered five developments that should be on every CISO&rsquo;s radar: </p> <ol> <li> <strong> CISA confirmed a federal agency was compromised </strong> via FIRESTARTER, a firmware-persistent backdoor on Cisco ASA/FTD firewalls that <strong> survives device updates </strong> . Traditional patching is not sufficient &mdash; full memory forensics and reimaging are required. </li> <li> <strong> Russian-Iranian infrastructure convergence deepened. </strong> APT28 (Russian GRU) Operation Masquerade compromised 18,000+ SOHO routers to steal Microsoft 365 OAuth tokens &mdash; and three high-confidence command-and-control IPs sit on Iranian ASN 213790. This is not coincidence; it&rsquo;s cooperation. </li> <li> <strong> Five ICS advisories dropped in a single day </strong> , including vulnerabilities in IP camera systems that Iranian actors have used for battlefield damage assessment, and a critical flaw in Intrado 911 Emergency Gateway systems &mdash; a new category of critical infrastructure now in the crosshairs. </li> <li> <strong> Samsung MagicINFO CVE-2024-7399 added to CISA KEV with active exploitation confirmed. </strong> This CVSS 8.8 flaw in digital signage infrastructure present in government buildings, airports, hospitals, and military facilities enables arbitrary file write as system authority &mdash; both a network pivot point and an information operations defacement vector. </li> <li> <strong> 48 days of silence on defense industrial base pre-positioning </strong> &mdash; the longest intelligence gap on the single most consequential targeting vector during an active conflict. Absence of evidence is not evidence of absence. </li> </ol> <h2> <strong> Conflict &amp; Cyber Timeline&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; </strong> </h2> <table> <thead> <tr> <th> <p> Date </p> </th> <th> <p> Event </p> </th> <th> <p> Significance </p> </th> </tr> </thead> <tbody> <tr> <td> <p> <strong> 28 Feb 2026 </strong> </p> </td> <td> <p> Operation Epic Fury begins &mdash; U.S.&ndash;Iran kinetic conflict starts </p> </td> <td> <p> Triggers full-spectrum Iranian cyber mobilization </p> </td> </tr> <tr> <td> <p> <strong> 11 Mar </strong> </p> </td> <td> <p> Handala (Void Manticore) wiper attack hits Stryker &mdash; 200,000 endpoints </p> </td> <td> <p> Largest destructive cyber operation of the conflict </p> </td> </tr> <tr> <td> <p> <strong> 7 Apr </strong> </p> </td> <td> <p> CISA Advisory AA26-097A &mdash; Iranian actors exploiting PLCs in water/energy </p> </td> <td> <p> Confirms ICS/OT targeting at scale </p> </td> </tr> <tr> <td> <p> <strong> 7 Apr </strong> </p> </td> <td> <p> FBI Operation Masquerade &mdash; court-authorized takedown of APT28 router botnet </p> </td> <td> <p> 18,000+ TP-Link/MikroTik routers compromised for OAuth theft </p> </td> </tr> <tr> <td> <p> <strong> ~16 Apr </strong> </p> </td> <td> <p> Kinetic ceasefire declared </p> </td> <td> <p> Cyber operations continue unabated per NYT reporting </p> </td> </tr> <tr> <td> <p> <strong> 23 Apr </strong> </p> </td> <td> <p> CISA publishes FIRESTARTER MAR (AR26-113A) </p> </td> <td> <p> FCEB agency compromise confirmed; persistence survives firmware updates </p> </td> </tr> <tr> <td> <p> <strong> 23 Apr </strong> </p> </td> <td> <p> Five ICS advisories: IP cameras, 911 gateway, GNSS receivers </p> </td> <td> <p> Expands known Iranian-relevant attack surface </p> </td> </tr> <tr> <td> <p> <strong> 24 Apr </strong> </p> </td> <td> <p> CVE-2024-7399 added to CISA KEV &mdash; Samsung MagicINFO 9 Server </p> </td> <td> <p> Active exploitation confirmed; digital signage in government/military facilities at risk </p> </td> </tr> <tr> <td> <p> <strong> 24&ndash;26 Apr </strong> </p> </td> <td> <p> APT28 expands to three IPs on Iranian ASN 213790 </p> </td> <td> <p> Russian-Iranian cyber infrastructure sharing confirmed at high confidence </p> </td> </tr> <tr> <td> <p> <strong> 27 Apr </strong> </p> </td> <td> <p> CSIS publishes comprehensive analysis of Iranian cyber threat to U.S. CI </p> </td> <td> <p> Confirms threat picture at most acute level since conflict began </p> </td> </tr> <tr> <td> <p> <strong> 28 Apr </strong> </p> </td> <td> <p> UNC3890 (Imperial Kitten) and UNC757 (Pioneer Kitten) profiles updated </p> </td> <td> <p> Active operations or infrastructure changes during ceasefire </p> </td> </tr> </tbody> </table> <h2> <strong> The Threat Actors: A Full Roster&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; </strong> </h2> <p> The Iranian cyber apparatus operating during this conflict spans both of Iran&rsquo;s primary intelligence organizations, augmented by hacktivist proxies and an unprecedented Russian partnership. </p> <h3> <strong> IRGC-Affiliated Actors </strong> </h3> <ul> <li> <strong> APT33 (Elfin/Refined Kitten) </strong> &mdash; Aerospace and energy sector targeting </li> <li> <strong> APT35 (Charming Kitten/Phosphorus) </strong> &mdash; Credential theft and social engineering campaigns </li> <li> <strong> APT42 </strong> (IRGC-IO) &mdash; Surveillance and espionage operations </li> <li> <strong> Cyber Av3ngers </strong> &mdash; ICS/OT destruction, demonstrated Unitronics PLC exploitation (IOCONTROL malware) </li> <li> <strong> Fox Kitten </strong> &mdash; VPN exploitation specialist, known for Citrix/Fortinet/Ivanti access brokering </li> <li> <strong> UNC1549/Imperial Kitten </strong> &mdash; Aerospace and defense industrial base targeting via malicious GitHub repositories (resumed April 22&ndash;23) </li> <li> <strong> UNC3890 (Imperial Kitten/Yellowliderc) </strong> &mdash; Chemical, energy, healthcare, and manufacturing targeting; profile updated April 28 </li> <li> <strong> Cotton Sandstorm (Emennet Pasargad/BANISHED KITTEN) </strong> &mdash; Influence operations; profile updated April 27 but no new campaigns detected (notable silence) </li> <li> <strong> Handala/Void Manticore </strong> &mdash; Destructive wiper operations; responsible for the Stryker attack (200K endpoints, March 11) </li> </ul> <h3> <strong> MOIS-Directed Actors </strong> </h3> <ul> <li> <strong> APT34 (OilRig) </strong> &mdash; Infrastructure expansion confirmed during ceasefire </li> <li> <strong> MuddyWater (TEMP.Zagros) </strong> &mdash; Infrastructure expansion confirmed during ceasefire </li> <li> <strong> UNC1860 (Scarred Manticore) </strong> &mdash; Persistent access operations </li> </ul> <h3> <strong> State-Criminal Hybrids </strong> </h3> <ul> <li> <strong> UNC757/Pioneer Kitten (Lemon Sandstorm/Parisite) </strong> &mdash; Profile updated April 27; targets 11 countries across financial services, government, healthcare, energy, and education; known for VPN exploitation and ransomware-as-a-service handoffs (Pay2Key) </li> </ul> <h3> <strong> Russian Convergence </strong> </h3> <ul> <li> <strong> APT28 (Fancy Bear/GRU Unit 26165) </strong> &mdash; Operating from Iranian ASN 213790 with three confirmed IPs; OAuth token theft technique directly transferable to Iranian actors </li> </ul> <h2> <strong> Deep Dive: FIRESTARTER &mdash; The Backdoor That Survives Your Patches </strong> </h2> <p> CISA&rsquo;s Malware Analysis Report AR26-113A, published April 23, is the most consequential technical disclosure of this conflict cycle. FIRESTARTER is a backdoor targeting <strong> Cisco ASA and Cisco FTD firewalls </strong> &mdash; the perimeter devices that millions of organizations trust as their first line of defense. </p> <p> What makes FIRESTARTER exceptional: </p> <ul> <li> <strong> Firmware persistence </strong> : The implant survives device updates and reboots. Cisco tracks the actor as UAT-4356 (also Storm-1849) and acknowledges the group &ldquo;appears to be government-backed&rdquo; while declining specific nation-state attribution. </li> <li> <strong> Confirmed federal compromise </strong> : A U.S. Federal Civilian Executive Branch (FCEB) agency was compromised. </li> <li> <strong> Remediation requires reimaging </strong> : Patching alone is insufficient. Organizations must perform memory forensics using CISA-provided YARA rules, followed by full device reimaging if indicators are found. </li> </ul> <p> <strong> Relevant ATT&amp;CK Techniques: </strong> - T1190 &mdash; Exploit Public-Facing Application - T1542.004 &mdash; Pre-OS Boot: ROMMONkit (persistence through updates) - T1556 &mdash; Modify Authentication Process - T1071 &mdash; Application Layer Protocol (C2) </p> <p> <strong> Bottom line for CISOs: </strong> If your organization runs Cisco ASA or FTD devices, assume compromise until proven otherwise. Memory analysis &mdash; not just patching &mdash; is the only way to confirm clean status. </p> <h2> <strong> Deep Dive: Operation Masquerade and Russian-Iranian Infrastructure Sharing </strong> </h2> <p> On April 7, the FBI executed court-authorized Operation Masquerade against APT28&rsquo;s compromise of <strong> 18,000+ TP-Link and MikroTik SOHO routers </strong> . The technique is elegant and devastating: </p> <ol> <li> Exploit SNMP v2 default credentials on SOHO routers </li> <li> Rewrite DNS settings to redirect Microsoft OAuth endpoints to transparent proxies </li> <li> Capture OAuth access and refresh tokens <strong> after MFA completion </strong> </li> <li> Use stolen tokens (valid 60&ndash;90 days on default M365 settings) for persistent cloud access </li> </ol> <p> The Iran-conflict dimension: Three high-confidence APT28-attributed IPs are hosted on <strong> Iranian ASN 213790 (&ldquo;Limited Network&rdquo;) </strong> : </p> <table> <thead> <tr> <th> <p> IOC </p> </th> <th> <p> ASN </p> </th> <th> <p> Confidence </p> </th> <th> <p> Tags </p> </th> </tr> </thead> <tbody> <tr> <td> <p> 185.93.89[.]147 </p> </td> <td> <p> 213790 </p> </td> <td> <p> 91 </p> </td> <td> <p> APT28, mirage </p> </td> </tr> <tr> <td> <p> 192.253.248[.]180 </p> </td> <td> <p> 213790 </p> </td> <td> <p> 90 </p> </td> <td> <p> APT28, retail/telecom targeting </p> </td> </tr> <tr> <td> <p> 185.93.89[.]43 </p> </td> <td> <p> 213790 </p> </td> <td> <p> 93 </p> </td> <td> <p> APT28, command injection </p> </td> </tr> </tbody> </table> <p> An additional IP on a separate Iranian ASN was also identified: </p> <table> <thead> <tr> <th> <p> IOC </p> </th> <th> <p> ASN </p> </th> <th> <p> Confidence </p> </th> <th> <p> Tags </p> </th> </tr> </thead> <tbody> <tr> <td> <p> 176.46.152[.]46 </p> </td> <td> <p> 44208 (Farahoosh Dena) </p> </td> <td> <p> 91 </p> </td> <td> <p> Transparent-Tribe, amadey/obliquerat </p> </td> </tr> </tbody> </table> <p> <strong> Why this matters: </strong> The OAuth proxy technique requires zero malware and bypasses MFA. It relies only on SNMP access to commodity routers &mdash; a capability well within Iranian actor tradecraft. Cyber Av3ngers have already demonstrated IoT/embedded device exploitation. If Iranian actors adopt this technique (and the shared ASN infrastructure suggests they may already be doing so), every M365 tenant accessible via a network with SOHO routers becomes a target. </p> <p> <strong> Relevant ATT&amp;CK Techniques: </strong> - T1557/T1557.002 &mdash; Adversary-in-the-Middle / ARP Cache Poisoning (DNS redirect variant) - T1528 &mdash; Steal Application Access Token (OAuth) - T1584.004 &mdash; Compromise Infrastructure: Server - T1078.004 &mdash; Valid Accounts: Cloud Accounts </p> <h2> <strong> Deep Dive: ICS/OT Attack Surface Expansion </strong> </h2> <p> Five ICS advisories published on April 23 expand the attack surface relevant to Iranian operations: </p> <table> <thead> <tr> <th> <p> Advisory </p> </th> <th> <p> Product </p> </th> <th> <p> Impact </p> </th> <th> <p> Iran Relevance </p> </th> </tr> </thead> <tbody> <tr> <td> <p> ICSA-26-113-05 </p> </td> <td> <p> Hangzhou Xiongmai XM530 IP Camera </p> </td> <td> <p> Authentication bypass, remote access </p> </td> <td> <p> <strong> HIGH </strong> &mdash; Iranian actors use IP cameras for battlefield damage assessment surveillance </p> </td> </tr> <tr> <td> <p> ICSA-26-113-03 </p> </td> <td> <p> Milesight Cameras </p> </td> <td> <p> Device crash or RCE </p> </td> <td> <p> <strong> HIGH </strong> &mdash; Same BDA surveillance vector </p> </td> </tr> <tr> <td> <p> ICSA-26-113-06 </p> </td> <td> <p> Intrado 911 Emergency Gateway </p> </td> <td> <p> Read/modify/delete files </p> </td> <td> <p> <strong> CRITICAL </strong> &mdash; 911 disruption is a logical escalation target for Iranian proxies </p> </td> </tr> <tr> <td> <p> ICSA-26-113-02 </p> </td> <td> <p> Carlson Software VASCO-B GNSS Receiver </p> </td> <td> <p> Alter critical system functions </p> </td> <td> <p> MODERATE &mdash; Positioning/navigation disruption </p> </td> </tr> <tr> <td> <p> ICSA-26-113-01 </p> </td> <td> <p> Yadea T5 Electric Bicycle </p> </td> <td> <p> Remote unlock/start </p> </td> <td> <p> LOW &mdash; Limited strategic relevance </p> </td> </tr> </tbody> </table> <p> The Intrado 911 Emergency Gateway vulnerability introduces an entirely new critical infrastructure category into the Iranian threat matrix. Disrupting emergency dispatch during a conflict &mdash; or as a coercive signal during ceasefire negotiations &mdash; would be a high-impact, low-technical-barrier operation for groups like Cyber Av3ngers or Ababil of Minab. </p> <p> Additionally, <strong> CVE-2024-7399 </strong> (CVSS 8.8) was added to CISA&rsquo;s Known Exploited Vulnerabilities catalog on April 24. This Samsung MagicINFO 9 Server vulnerability allows arbitrary file write as system authority. Samsung MagicINFO manages digital signage in government buildings, airports, hospitals, and military facilities &mdash; making it both a network pivot point and a defacement vector (ATT&amp;CK T1491.002) for Iranian information operations. </p> <h2> <strong> The Silence That Should Keep You Up at Night </strong> </h2> <p> Intelligence analysis isn&rsquo;t just about what you find &mdash; it&rsquo;s about what you don&rsquo;t find. Four critical absences define this cycle: </p> <ol> <li> <strong> No wiper deployments in 48 days. </strong> The Handala/Void Manticore wiper campaign that devastated Stryker on March 11 (200,000 endpoints) has produced no confirmed follow-on attacks. This is the longest operational pause since the conflict began. Possible explanations: operational pause matching the kinetic ceasefire, a shift to pre-positioning for the next wave, or a collection gap. None of these should be comforting. </li> <li> <strong> No Cyber Av3ngers/IOCONTROL activity in 21 days. </strong> The PLC exploitation advisory (AA26-097A) was published April 7 with no follow-on incidents. For a group with demonstrated capability against Unitronics PLCs, silence during a ceasefire may indicate pre-positioning rather than cessation. </li> <li> <strong> No defense industrial base pre-positioning detected in 48 days. </strong> This is the single most concerning gap. Iranian actors &mdash; UNC757/Pioneer Kitten, UNC1549/Imperial Kitten &mdash; have documented aerospace and DIB targeting capabilities. A GitHub-based fake resume lure campaign targeting aerospace developers remains active in threat intelligence feeds. The absence of detected pre-positioning during the most acute U.S.&ndash;Iran conflict in decades does not mean it isn&rsquo;t happening. It means we can&rsquo;t see it. </li> <li> <strong> Cotton Sandstorm (Emennet Pasargad) has gone quiet. </strong> This IRGC-affiliated influence operations actor was updated in threat intelligence platforms on April 27 but no new campaigns surfaced. Given their role in targeting U.S. elections and infrastructure with disinformation, silence during ceasefire negotiations is notable. </li> </ol> <h2> <strong> Predictive Analysis: What Comes Next </strong> </h2> <p> Based on the current intelligence picture &mdash; sustained cyber operations through a fragile ceasefire, the USS Tripoli seizure signaling escalation risk, and confirmed pre-positioned access in federal networks &mdash; we assess the following: </p> <table> <thead> <tr> <th> <p> Scenario </p> </th> <th> <p> Probability </p> </th> <th> <p> Timeframe </p> </th> <th> <p> Trigger </p> </th> </tr> </thead> <tbody> <tr> <td> <p> Iranian cyber operations intensify if ceasefire collapses or USS Tripoli situation escalates; pre-positioned access (FIRESTARTER, dormant web shells, VPN footholds) activated within hours </p> </td> <td> <p> <strong> 70% </strong> </p> </td> <td> <p> 72 hours of trigger event </p> </td> <td> <p> Kinetic resumption or hostage crisis escalation </p> </td> </tr> <tr> <td> <p> Handala/Void Manticore conducts follow-on destructive wiper operation </p> </td> <td> <p> <strong> 50% </strong> </p> </td> <td> <p> Within 2 weeks </p> </td> <td> <p> 48-day gap is the longest pause since conflict began; next target likely non-U.S. allied nation or private sector </p> </td> </tr> <tr> <td> <p> Iranian actors adopt APT28&rsquo;s OAuth proxy technique against U.S. government M365 tenants, leveraging existing SOHO router access or shared Iranian ASN infrastructure </p> </td> <td> <p> <strong> 40% </strong> </p> </td> <td> <p> 30 days </p> </td> <td> <p> Technique is zero-malware, MFA-bypassing, and within demonstrated Iranian capability </p> </td> </tr> <tr> <td> <p> Cyber Av3ngers or proxy group targets 911/emergency dispatch infrastructure </p> </td> <td> <p> <strong> 25% </strong> </p> </td> <td> <p> 30&ndash;60 days </p> </td> <td> <p> Intrado vulnerability disclosure + demonstrated ICS targeting capability </p> </td> </tr> <tr> <td> <p> Large-scale DIB data exfiltration discovered retroactively </p> </td> <td> <p> <strong> 35% </strong> </p> </td> <td> <p> Discovery within 60 days </p> </td> <td> <p> 48-day blind spot suggests access may already exist undetected </p> </td> </tr> </tbody> </table> <h2> <strong> SOC Operational Guidance&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; </strong> </h2> <h3> <strong> Priority Hunts </strong> </h3> <p> <strong> Hunt 1: FIRESTARTER Persistence on Cisco ASA/FTD </strong> - <strong> Hypothesis: </strong> Cisco ASA/FTD devices in your environment may harbor FIRESTARTER implants that survived recent firmware updates. - <strong> ATT&amp;CK: </strong> T1542.004 (Pre-OS Boot: ROMMONkit), T1556 (Modify Authentication Process) - <strong> Action: </strong> Perform memory analysis via core dumps on all Cisco ASA/FTD appliances using CISA YARA rules from MAR AR26-113A. Prioritize any device that received firmware updates since January 2026 &mdash; FIRESTARTER persists through updates, so a &ldquo;patched&rdquo; device may still be compromised. - <strong> Detection: </strong> Monitor for unexpected outbound connections from firewall management interfaces; alert on authentication process modifications or unauthorized ROMMON changes. </p> <p> <strong> Hunt 2: OAuth Token Theft via DNS Hijack </strong> - <strong> Hypothesis: </strong> SOHO routers in your network perimeter or remote worker environments have been compromised to redirect Microsoft OAuth endpoints to transparent proxies. - <strong> ATT&amp;CK: </strong> T1557.002 (ARP Cache Poisoning &mdash; DNS redirect variant), T1528 (Steal Application Access Token), T1078.004 (Valid Accounts: Cloud Accounts) - <strong> Action: </strong> Audit DNS settings on all TP-Link and MikroTik routers. Query Entra ID sign-in logs for OAuth token issuances from unexpected geographic origins &mdash; particularly Iranian ASN ranges (213790, 44208). Review M365 Unified Audit Logs for refresh token usage patterns inconsistent with user behavior. - <strong> Detection: </strong> Alert on login.microsoftonline[.]com or login.live[.]com resolution to non-Microsoft IP ranges. Monitor for OAuth token issuance where the network path includes known-compromised ASNs. </p> <p> <strong> Hunt 3: IOCONTROL C2 Beaconing in OT Networks </strong> - <strong> Hypothesis: </strong> Cyber Av3ngers may have pre-positioned IOCONTROL malware on Unitronics or Modicon PLCs in water/energy environments, with C2 channels dormant during the ceasefire. - <strong> ATT&amp;CK: </strong> T1071 (Application Layer Protocol), T1190 (Exploit Public-Facing Application) - <strong> Action: </strong> Monitor Modbus/TCP (port 502) and DNP3 (port 20000) traffic from SCADA networks for anomalous outbound connections. Cross-reference with IOCs from CISA AA26-097A. - <strong> Detection: </strong> Baseline normal PLC communication patterns; alert on any PLC-initiated outbound connection to internet-routable IP addresses. </p> <p> <strong> Hunt 4: DIB Pre-Positioning (Highest Priority Gap) </strong> - <strong> Hypothesis: </strong> Iranian actors (UNC757/Pioneer Kitten, UNC1549/Imperial Kitten) have established dormant access in defense industrial base networks via VPN exploitation or developer-targeted social engineering. - <strong> ATT&amp;CK: </strong> T1190 (Exploit Public-Facing Application), T1133 (External Remote Services), T1078 (Valid Accounts) - <strong> Action: </strong> Search for Rclone and Wasabi exfiltration patterns in VPN and proxy logs. Scan for dormant web shells on internet-facing Citrix, Fortinet, and Ivanti appliances. Check developer workstations for artifacts from GitHub-hosted fake resume lure campaigns. - <strong> Detection: </strong> Alert on Rclone process execution, Wasabi S3 endpoint connections, and new SSH keys added to Citrix/Fortinet management interfaces. </p> <h3> <strong> Blocking Guidance </strong> </h3> <p> Implement blocks for the following verified IOCs at your perimeter, DNS, and SIEM: </p> <table> <thead> <tr> <th> <p> Type </p> </th> <th> <p> Value </p> </th> <th> <p> Context </p> </th> </tr> </thead> <tbody> <tr> <td> <p> IPv4 </p> </td> <td> <p> 185.93.89[.]147 </p> </td> <td> <p> APT28 C2 on Iranian ASN 213790 (confidence 91) </p> </td> </tr> <tr> <td> <p> IPv4 </p> </td> <td> <p> 192.253.248[.]180 </p> </td> <td> <p> APT28 C2 on Iranian ASN 213790 (confidence 90) </p> </td> </tr> <tr> <td> <p> IPv4 </p> </td> <td> <p> 185.93.89[.]43 </p> </td> <td> <p> APT28 C2 on Iranian ASN 213790 (confidence 93) </p> </td> </tr> <tr> <td> <p> IPv4 </p> </td> <td> <p> 176.46.152[.]46 </p> </td> <td> <p> Transparent-Tribe on Iranian ASN 44208 (confidence 91) </p> </td> </tr> </tbody> </table> <p> Additional IOCs for the campaigns discussed in this report &mdash; including FIRESTARTER indicators, IOCONTROL C2 infrastructure, and Pioneer Kitten VPN exploitation artifacts &mdash; are available through Anomali ThreatStream Next-Gen and partner feeds. CISA MAR AR26-113A contains YARA rules and additional indicators for FIRESTARTER that should be operationalized immediately. </p> <h3> <strong> Key Detection Rules to Deploy </strong> </h3> <table> <thead> <tr> <th> <p> Rule </p> </th> <th> <p> ATT&amp;CK </p> </th> <th> <p> Data Source </p> </th> </tr> </thead> <tbody> <tr> <td> <p> Cisco ASA/FTD unexpected outbound from mgmt interface </p> </td> <td> <p> T1071, T1542.004 </p> </td> <td> <p> Firewall logs, NetFlow </p> </td> </tr> <tr> <td> <p> SNMP v2 authentication on SOHO routers from non-management IPs </p> </td> <td> <p> T1557.002 </p> </td> <td> <p> Network monitoring </p> </td> </tr> <tr> <td> <p> OAuth token issuance from Iranian ASN ranges </p> </td> <td> <p> T1528, T1078.004 </p> </td> <td> <p> Entra ID sign-in logs </p> </td> </tr> <tr> <td> <p> DNS resolution of Microsoft OAuth endpoints to non-Microsoft IPs </p> </td> <td> <p> T1557.002 </p> </td> <td> <p> DNS logs, Sysmon Event ID 22 </p> </td> </tr> <tr> <td> <p> Rclone process execution or Wasabi S3 endpoint connections </p> </td> <td> <p> T1567.002 </p> </td> <td> <p> EDR, proxy logs </p> </td> </tr> <tr> <td> <p> PLC-initiated outbound internet connections on ports 502/20000 </p> </td> <td> <p> T1071 </p> </td> <td> <p> OT network monitoring </p> </td> </tr> <tr> <td> <p> Samsung MagicINFO arbitrary file write attempts </p> </td> <td> <p> T1190, T1059 </p> </td> <td> <p> Application logs, EDR </p> </td> </tr> <tr> <td> <p> IP camera firmware update or config change from non-management source </p> </td> <td> <p> T1190, T1110.003 </p> </td> <td> <p> Network monitoring, device logs </p> </td> </tr> </tbody> </table> <h2> <strong> Sector-Specific Defensive Priorities </strong> </h2> <h3> <strong> Financial Services </strong> </h3> <p> Iranian actor UNC757/Pioneer Kitten explicitly targets financial services across 11 countries and has a documented history of ransomware-as-a-service handoffs (Pay2Key). The APT28 OAuth token theft technique is directly relevant to financial institutions with large M365 deployments and remote workforces using SOHO routers. </p> <ul> <li> <strong> Priority: </strong> Audit all M365 refresh token lifetimes; reduce to 24-hour maximum for privileged accounts. Deploy Conditional Access policies requiring compliant devices for financial system access. </li> <li> <strong> Priority: </strong> Hunt for Rclone/Wasabi exfiltration patterns in DLP logs &mdash; Pioneer Kitten&rsquo;s preferred data staging method. </li> <li> <strong> Priority: </strong> Verify that SWIFT and core banking systems are network-segmented from any environment accessible via VPN or SOHO router paths. </li> </ul> <h3> <strong> Energy </strong> </h3> <p> Energy is a primary target for both IRGC-affiliated actors (Cyber Av3ngers targeting PLCs, APT33 targeting energy infrastructure) and MOIS actors (APT34/OilRig with deep energy sector expertise, UNC3890 updated April 28 with energy targeting). CISA AA26-097A specifically warns of PLC exploitation in energy environments. </p> <ul> <li> <strong> Priority: </strong> Immediately audit all Unitronics and Modicon PLCs for default credentials and unauthorized configuration changes. Deploy monitoring on Modbus/TCP (502) and DNP3 (20000) for anomalous traffic. </li> <li> <strong> Priority: </strong> Segment OT networks from IT with unidirectional gateways where possible. Ensure no SCADA system has a direct internet-routable path. </li> <li> <strong> Priority: </strong> Inventory all IP cameras (especially Xiongmai XM530 and Milesight models) on facility networks; these are documented Iranian BDA collection vectors. Isolate on dedicated VLANs. </li> </ul> <h3> <strong> Healthcare </strong> </h3> <p> UNC3890 (updated April 28) and UNC757/Pioneer Kitten both explicitly target healthcare. The Stryker wiper attack (March 11, 200K endpoints) demonstrated that Iranian actors will conduct destructive operations against healthcare-adjacent targets without hesitation. </p> <ul> <li> <strong> Priority: </strong> Ensure offline, immutable backups of electronic health record systems and medical device management platforms. Test restoration procedures. </li> <li> <strong> Priority: </strong> Audit all Citrix, Fortinet, and Ivanti VPN appliances for Pioneer Kitten exploitation indicators &mdash; this actor brokers initial access to ransomware operators. </li> <li> <strong> Priority: </strong> Review Samsung MagicINFO deployments in hospital digital signage systems; patch to version 21.1050+ immediately (CVE-2024-7399). </li> </ul> <h3> <strong> Government (Federal, State, Local) </strong> </h3> <p> The FIRESTARTER FCEB compromise is a direct hit on this sector. CISA&rsquo;s MAR confirms that a federal agency&rsquo;s Cisco ASA device was backdoored with firmware-persistent malware. The Intrado 911 Emergency Gateway vulnerability (ICSA-26-113-06) threatens state and local emergency services. </p> <ul> <li> <strong> Priority: </strong> Execute CISA YARA-based memory analysis on every Cisco ASA/FTD device in the environment. Do not rely on firmware updates alone &mdash; FIRESTARTER survives them. </li> <li> <strong> Priority: </strong> Coordinate with 911/PSAP operators on Intrado EGW vulnerability remediation. Assess whether emergency dispatch systems are accessible from internet-facing networks. </li> <li> <strong> Priority: </strong> Disable SNMP v2 on all network equipment. The APT28 OAuth technique exploits default SNMP credentials on commodity routers &mdash; government telework environments with SOHO routers are directly exposed. </li> <li> <strong> Priority: </strong> Revoke and reissue all M365 OAuth refresh tokens for government tenants; implement 24-hour token lifetime policies. </li> </ul> <h3> <strong> Aviation &amp; Logistics </strong> </h3> <p> UNC1549/Imperial Kitten resumed aerospace and defense industrial base targeting via malicious GitHub repositories on April 22&ndash;23. UNC757/Pioneer Kitten targets 11 countries with known aerospace interest. The 48-day intelligence gap on DIB pre-positioning is most consequential for this sector. </p> <ul> <li> <strong> Priority: </strong> Brief all software developers and engineers on the GitHub fake resume lure campaign &mdash; verify all coding challenge repositories before execution on any corporate or development system. </li> <li> <strong> Priority: </strong> Conduct targeted threat hunt for dormant web shells on internet-facing Citrix/Fortinet/Ivanti appliances. Pioneer Kitten&rsquo;s primary initial access method is VPN exploitation. </li> <li> <strong> Priority: </strong> Audit all GitHub repository access from corporate networks; alert on cloning of repositories from unknown or recently created accounts. </li> <li> <strong> Priority: </strong> Review supply chain access &mdash; Iranian actors have demonstrated MSP/supply-chain targeting (ConnectWise campaigns, April 20&ndash;25). Verify that third-party remote access tools are inventoried and monitored. </li> </ul> <h2> <strong> Prioritized Defense Recommendations </strong> </h2> <h3> <strong> IMMEDIATE (Within 24 Hours) </strong> </h3> <table> <thead> <tr> <th> <p> Action </p> </th> <th> <p> Owner </p> </th> <th> <p> Rationale </p> </th> </tr> </thead> <tbody> <tr> <td> <p> Block APT28 C2 IPs at perimeter: 185.93.89[.]147, 192.253.248[.]180, 185.93.89[.]43, 176.46.152[.]46. Hunt for historical connections in firewall logs since January 2026. </p> </td> <td> <p> SOC </p> </td> <td> <p> Russian-Iranian infrastructure convergence; OAuth token theft campaign </p> </td> </tr> <tr> <td> <p> Perform memory analysis on ALL Cisco ASA/FTD devices using CISA YARA rules from AR26-113A. Prioritize devices updated since January 2026. </p> </td> <td> <p> SOC / Network Ops </p> </td> <td> <p> FIRESTARTER persists through firmware updates; FCEB agency confirmed compromised </p> </td> </tr> <tr> <td> <p> Disable SNMP v2 on all TP-Link and MikroTik SOHO routers. Verify DHCP DNS settings point to known-good resolvers. Upgrade to SNMP v3 with authentication if monitoring is required. </p> </td> <td> <p> IT Ops </p> </td> <td> <p> APT28 OAuth proxy technique exploits default SNMP credentials; technique transferable to Iranian actors </p> </td> </tr> <tr> <td> <p> Brief executive leadership and IR team on ceasefire fragility: the USS Tripoli seizure signals potential kinetic resumption, which would trigger activation of pre-positioned cyber access within hours. </p> </td> <td> <p> CISO </p> </td> <td> <p> 70% probability of cyber intensification if ceasefire collapses </p> </td> </tr> </tbody> </table> <h3> <strong> 7-DAY </strong> </h3> <table> <thead> <tr> <th> <p> Action </p> </th> <th> <p> Owner </p> </th> <th> <p> Rationale </p> </th> </tr> </thead> <tbody> <tr> <td> <p> Deploy Entra ID Conditional Access policy requiring re-authentication every 24 hours for sensitive access. Revoke all M365 refresh tokens for tenants accessible via SOHO router networks. Audit OAuth token issuance logs for anomalous geographic origins since January 2026. </p> </td> <td> <p> SOC / Identity Team </p> </td> <td> <p> OAuth tokens valid 60&ndash;90 days on default settings; APT28 technique bypasses MFA </p> </td> </tr> <tr> <td> <p> Patch Samsung MagicINFO 9 Server to version 21.1050+ on all digital signage systems. Inventory all MagicINFO deployments in government, military, airport, and hospital facilities. </p> </td> <td> <p> IT Ops </p> </td> <td> <p> CVE-2024-7399 (CVSS 8.8) actively exploited; digital signage is both pivot point and defacement vector </p> </td> </tr> <tr> <td> <p> Inventory all Xiongmai XM530 and Milesight IP cameras. Apply firmware updates per ICSA-26-113-05 and ICSA-26-113-03. Segment camera VLANs from corporate networks with ACLs blocking lateral movement. </p> </td> <td> <p> IT Ops / Physical Security </p> </td> <td> <p> Iranian actors use IP cameras for BDA surveillance collection </p> </td> </tr> <tr> <td> <p> Create detection rules for IOCONTROL C2 beaconing on Modbus/TCP (port 502) and DNP3 (port 20000) from water/energy SCADA networks. Cross-reference with CISA AA26-097A indicators. </p> </td> <td> <p> SOC / OT Security </p> </td> <td> <p> Cyber Av3ngers PLC exploitation capability; 21-day silence may indicate pre-positioning </p> </td> </tr> <tr> <td> <p> Tabletop exercise: simulate ceasefire collapse scenario with cyber activation of pre-positioned access across edge devices, cloud tenants, and OT networks simultaneously. </p> </td> <td> <p> CISO / IR Team </p> </td> <td> <p> Validate IR playbooks against the specific threat picture; identify coordination gaps </p> </td> </tr> </tbody> </table> <h3> <strong> 30-DAY </strong> </h3> <table> <thead> <tr> <th> <p> Action </p> </th> <th> <p> Owner </p> </th> <th> <p> Rationale </p> </th> </tr> </thead> <tbody> <tr> <td> <p> Commission dedicated threat hunt for DIB pre-positioning: (a) Rclone/Wasabi exfiltration patterns, (b) dormant web shells on internet-facing servers, (c) GitHub fake resume lure artifacts on developer workstations, (d) UNC757/Pioneer Kitten VPN exploitation indicators on Citrix/Fortinet/Ivanti appliances. </p> </td> <td> <p> CISO / Threat Hunt Team </p> </td> <td> <p> 48-day blind spot on DIB pre-positioning during active conflict is the highest-risk intelligence gap </p> </td> </tr> <tr> <td> <p> Evaluate adding 911/PSAP and emergency dispatch infrastructure to critical asset inventory. Coordinate with emergency services partners on Intrado EGW vulnerability remediation (ICSA-26-113-06). </p> </td> <td> <p> CISO / GRC </p> </td> <td> <p> New critical infrastructure category in Iranian threat matrix; logical escalation target </p> </td> </tr> <tr> <td> <p> Conduct full edge device audit: every Cisco ASA/FTD, Citrix ADC, Fortinet FortiGate, and Ivanti Connect Secure appliance should undergo memory forensics &mdash; not just patch verification. Establish quarterly memory analysis cadence. </p> </td> <td> <p> IT Ops / Security Engineering </p> </td> <td> <p> FIRESTARTER&rsquo;s persistence-through-update capability invalidates patch-and-forget remediation for the entire edge device fleet </p> </td> </tr> <tr> <td> <p> Review and harden all MSP/supply-chain remote access: inventory ConnectWise, TeamViewer, AnyDesk, and similar tools; enforce MFA and session recording; restrict to named IP ranges where possible. </p> </td> <td> <p> IT Ops / Vendor Management </p> </td> <td> <p> Iranian-backed supply-chain targeting activity observed against MSP infrastructure (ConnectWise) in late April </p> </td> </tr> </tbody> </table> <h2> <strong> The Bottom Line&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; </strong> </h2> <p> We are in <strong> Quadrant 2 </strong> of this conflict: kinetic pause, cyber active. Every major intelligence source confirms that Iranian cyber operations have not stood down despite the ceasefire. The seizure of USS Tripoli and U.S. Marines signals that the kinetic pause itself is fragile. </p> <p> The Iranian attack model during this conflict has been consistent: <strong> stolen credentials and legitimate tooling abuse over custom malware </strong> . This makes identity security &mdash; OAuth token management, MFA enforcement, credential hygiene, and Conditional Access policies &mdash; the single most important defensive investment you can make right now. </p> <p> But the technical threat is only half the picture. The 48-day silence on defense industrial base pre-positioning is not reassuring &mdash; it is alarming. Iranian pre-positioning is designed to be invisible until activation. If the ceasefire collapses, the access is already there. The question is whether you&rsquo;ll find it before it&rsquo;s used. </p> <p> Don&rsquo;t wait for the next Stryker. Hunt now. </p>

FEATURED RESOURCES

April 28, 2026
Anomali Cyber Watch

When the Ceasefire Holds but the Hackers Don’t: Iran’s Cyber War Enters Its Ninth Week

Read More
April 28, 2026
Anomali Cyber Watch
Public Sector

When Legitimate Tools Become Weapons: The Escalating Threat to State Government Networks

Read More
April 27, 2026
Anomali Cyber Watch

Ceasefire That Isn’t: Day 59 of Iran’s Cyber War on U.S. Critical Infrastructure

Read More
Explore All