Skip to content

Iran -- Cyber Threat Actors

Actor Profile at a Glance

Attribution: Islamic Revolutionary Guard Corps (IRGC), Ministry of Intelligence and Security (MOIS/VAJA), private contractors and front companies (Emennet Pasargad, Najee Technology, Afkar System, Mahak Rayan Afraz, Ravin Academy) Objectives: Espionage (political, military, industrial), destructive/wiper attacks (retaliation and coercion), regional influence operations, surveillance of dissidents, asymmetric retaliation against adversaries Activity Level: High -- sustained and escalating since 2022, with sharp spikes tied to the Israel-Hamas conflict (October 2023--present) Key Segments Impacted: OT/IoT, Identity, Email, Cloud, Endpoint, Threat Intelligence


1. Strategic Context

From Stuxnet to Offensive Capability

Iran's offensive cyber program is, in many ways, a direct product of the Stuxnet operation (discovered 2010). The joint U.S.-Israeli campaign to sabotage Iran's Natanz uranium enrichment facility demonstrated that cyber weapons could cause physical destruction -- and that Iran was acutely vulnerable. Within two years, Tehran had invested heavily in both defensive and offensive cyber capabilities, launching Operation Ababil (DDoS against U.S. banks) in 2012 and the destructive Shamoon attack against Saudi Aramco the same year (Mandiant; CISA).

By 2025, Iran operates one of the most active nation-state cyber programs globally, behind China and Russia but ahead of North Korea in breadth of targeting. The program has evolved from crude DDoS and defacement to sophisticated espionage, wiper deployment, ransomware-as-cover, and coordinated influence operations.

IRGC vs. MOIS: Two Pillars of Iranian Cyber Operations

Iran's cyber operations are split across two principal organizations, each with distinct mandates and operational styles:

Attribute IRGC (Islamic Revolutionary Guard Corps) MOIS/VAJA (Ministry of Intelligence and Security)
Primary Mission Regime protection, asymmetric warfare, regional influence Foreign and domestic intelligence collection
Operational Style More aggressive, destructive, willing to cause disruption More patient, espionage-focused, stealthier
Typical Operations Wiper attacks, "lock and leak," influence ops, OT targeting Long-term espionage, surveillance of dissidents, credential harvesting
Notable Groups APT33/Peach Sandstorm, Cotton Sandstorm, CyberAv3ngers, Tortoiseshell APT35/Mint Sandstorm, MuddyWater, APT42, OilRig/APT34, Scarred Manticore
Sanctions Status Designated terrorist organization (U.S.) Subject to various U.S./EU sanctions

Front Companies and Contractors

Iran relies heavily on ostensibly private companies to conduct operations, providing plausible deniability. Known front companies include:

  • Emennet Pasargad (also known as Aristander Technologies): Linked to Cotton Sandstorm; indicted by DOJ in 2022 for election interference operations targeting the 2020 U.S. presidential election (DOJ)
  • Najee Technology / Afkar System: IRGC-affiliated; indicted in 2022 for ransomware attacks targeting U.S. critical infrastructure (FBI)
  • Mahak Rayan Afraz (MRA): IRGC-CQF front company linked to APT42 and Charming Kitten operations (Google TAG)
  • Ravin Academy: Training pipeline for MOIS-linked operators (Check Point Research)

Cyber as Asymmetric Strategy

Iran's cyber program fills a critical gap in its strategic calculus. Facing overwhelming conventional military disadvantage against the U.S. and Israel, crippling economic sanctions, and limited power-projection capability, cyber operations provide:

  • Low-cost retaliation: Destructive attacks on adversary infrastructure without crossing kinetic thresholds
  • Sanctions circumvention intelligence: Espionage against financial, trade, and diplomatic targets
  • Regional influence: Information operations targeting Gulf states, Israel, and Arab populations
  • Domestic control: Surveillance of dissidents, journalists, and human rights activists both inside Iran and in the diaspora

Geopolitical Escalation Triggers

Iranian cyber operations correlate strongly with geopolitical events:

timeline
    title Iranian Cyber Escalation Timeline
    section 2012-2014
        Stuxnet fallout : Operation Ababil (DDoS on US banks)
                        : Shamoon destroys 35,000 Saudi Aramco workstations
                        : Bowman Avenue Dam intrusion
                        : Sands Casino hack (retaliation for Sheldon Adelson comments)
    section 2015-2018
        JCPOA era : Relative de-escalation during nuclear deal period
                  : Activity resumes after US withdrawal (May 2018)
    section 2019-2020
        Soleimani killing (Jan 2020) : ZeroCleare wiper targeting Middle East energy
                                     : Spike in defacement and retaliatory attacks
                                     : Travelex ransomware attack
    section 2021-2022
        Regional tensions : Moses Staff / Abraham's Ax "lock and leak"
                          : Iran-Albania cyber confrontation
                          : Emennet Pasargad indictments
    section 2023-2025
        Israel-Hamas conflict : CyberAv3ngers target US water systems (Unitronics PLCs)
                              : BiBi wiper deployments across Israel
                              : Cyber Toufan mass data leaks
                              : Cotton Sandstorm influence operations
                              : Sustained Mint Sandstorm credential campaigns

2. Known Groups & Attribution

The table below catalogs the principal Iranian threat groups, their aliases across vendor naming conventions, assessed organizational affiliation, and primary activity type.

Group (Primary Name) Aliases Affiliation Primary Activity Active Since
APT33 / Peach Sandstorm Elfin, Refined Kitten, Magnallium, Holmium IRGC Espionage (aerospace, defense, energy); credential spraying at scale ~2013
APT35 / Mint Sandstorm Charming Kitten, Phosphorus, NewsBeef, Ajax Security Team, TA453 IRGC (some subgroups linked to MOIS) Espionage, credential theft, surveillance of journalists/academics/dissidents ~2014
MuddyWater / Mango Sandstorm Mercury, Static Kitten, Seedworm, TEMP.Zagros MOIS (subordinate to IRGC per U.S. Cyber Command) Espionage across Middle East, Turkey, South Asia; government and telecom targeting ~2017
APT42 / Calanque Damselfly, TA455, Yellow Garuda IRGC-IO (Intelligence Organization) Surveillance of dissidents and activists, credential harvesting, strategic intelligence ~2015
OilRig / APT34 Helix Kitten, Hazel Sandstorm, Crambus, ITG13, Cobalt Gypsy MOIS Espionage targeting government, energy, telecom, financial across Middle East ~2014
Moses Staff Abraham's Ax (subgroup/rebrand) Assessed MOIS Destructive, "lock and leak" against Israeli targets ~2021
Agrius / Pink Sandstorm DEV-0227, BlackShadow (possible overlap) Assessed MOIS Wiper attacks disguised as ransomware; Israel-focused ~2020
Cotton Sandstorm / Neptunium Hazel Sandstorm (partial overlap), DEV-0198, Emennet Pasargad IRGC Influence operations, hack-and-leak, election interference ~2020
Tortoiseshell / Crimson Sandstorm Imperial Kitten, TA456, Yellow Liderc IRGC Supply chain attacks, defense sector targeting, fake websites ~2018
Lyceum / Hexane Spirlin, Siamesekitten Assessed MOIS Telecom and ISP targeting in Middle East and Africa ~2017
CopyKittens Parisite (partial overlap) Unconfirmed (assessed state-linked) Espionage targeting Israel, Germany, Turkey; strategic government entities ~2013
Scarred Manticore DEV-0861 (partial overlap) MOIS Long-term espionage; Middle East government and telecom infiltration ~2019
DarkBit -- Unconfirmed (assessed MOIS-linked) Ransomware against Israeli academia (Technion attack, 2023) ~2023
CyberAv3ngers -- IRGC-CEC (Cyber-Electronic Command) OT/ICS targeting; US and Israeli water systems; Unitronics PLC exploitation ~2023
Cyber Toufan -- Assessed IRGC-linked Mass data exfiltration and leaking from Israeli organizations post-Oct 7 ~2023

Attribution Confidence

Attribution of Iranian cyber groups to specific government organizations (IRGC vs. MOIS) is based on U.S. government indictments, sanctions designations, and vendor intelligence assessments. The boundary between IRGC and MOIS operations is not always clean -- some groups (e.g., MuddyWater) have been assessed as MOIS-subordinate by some vendors and IRGC-subordinate by U.S. Cyber Command. Contractor relationships further blur organizational lines.


3. How They Operate

Operational Philosophy

Iranian threat actors are generally less technically sophisticated than Chinese or Russian counterparts but compensate with persistence, aggression, and a willingness to cause visible destruction. Key characteristics:

  • Opportunistic exploitation over zero-days: Iranian groups overwhelmingly exploit known (N-day) vulnerabilities rather than developing or purchasing zero-day exploits. They move fast once a CVE is published, particularly for internet-facing devices (Mandiant).
  • Heavy reliance on VPN/firewall exploits: Fortinet, Pulse Secure, Citrix, and F5 vulnerabilities are consistently favored initial access vectors.
  • Password spraying at industrial scale: APT33/Peach Sandstorm in particular conducts massive credential-spraying campaigns against thousands of organizations simultaneously (Microsoft).
  • Elaborate social engineering: APT42 and Mint Sandstorm build fake personas (journalists, academics, think-tank researchers) over weeks or months to lure high-value targets into credential phishing (Google TAG).
  • Wipers as a first-resort weapon: Unlike most nation-states that reserve destructive capability, Iranian actors deploy wipers frequently as retaliation or coercion.
  • "Lock and leak" operations: Encryption of victim data (mimicking ransomware) combined with public data leaks on Telegram channels -- designed for psychological and reputational damage rather than financial gain.
  • Influence operations integration: Cyber intrusions are increasingly paired with information operations -- stolen data is selectively leaked, social media accounts amplify narratives, and hack-and-leak personas are created to maximize impact.
Initial CompromisePost-CompromiseOutcomesABCDEFHIJKExploit N-day\n(VPN/Exchange) Password Spray\n(Thousands of Orgs) Social Engineering\n(Fake Personas) Establish FootholdCredential Harvesting\n(Mimikatz, LSASS) Lateral Movement\n(RDP, PsExec) Mission Objective?Data Exfiltration\n(Email, Files, DB) Wiper Deployment\n(BiBi, ZeroCleare) Hack-and-Leak\n(Telegram, Social) ICS Manipulation\n(PLC Targeting) EspionageDestructionInfluenceOT Impact

4. TTPs (Exhaustive)

Mapped to the MITRE ATT&CK framework across the kill chain.

Initial Access

Technique Detail Groups Using
Exploitation of public-facing applications VPN appliances (Fortinet CVE-2018-13379, Pulse Secure CVE-2019-11510, Citrix CVE-2019-19781), Microsoft Exchange (ProxyShell, ProxyLogon), Zoho ManageEngine, Log4Shell APT33, MuddyWater, OilRig, Mint Sandstorm, CyberAv3ngers
Password spraying Large-scale campaigns targeting Azure AD/Entra ID, Exchange Online, VPN portals; thousands of organizations targeted simultaneously APT33/Peach Sandstorm (primary), MuddyWater
Spearphishing with credential harvesting Fake login pages mimicking Microsoft, Google, Yahoo; often delivered via compromised or lookalike domains APT42, Mint Sandstorm, Charming Kitten
Social engineering via fake personas Long-term impersonation of journalists (Wall Street Journal, CNN), academics, think-tank staff; contact via LinkedIn, Twitter/X, WhatsApp, email APT42, Mint Sandstorm, Tortoiseshell
Exploitation of Unitronics Vision PLCs Default credentials and exposed HMIs on internet-facing PLCs; targeting water and wastewater systems CyberAv3ngers
Supply chain compromise Targeting IT service providers and managed hosting to access downstream victims Tortoiseshell, Lyceum

Execution

Technique Detail
PowerShell Heavily used across nearly all Iranian groups; POWERSTATS, PowerLess, and custom PS scripts
Custom loaders BASICSTAR, CharmPower, SideTwist, BondUpdater
Scripting VBScript, JavaScript, batch files for initial execution and staging
Scheduled tasks / jobs Persistence via Windows Task Scheduler

Persistence

Technique Detail
Web shells Deployed on Exchange servers, IIS, and Apache; China Chopper variants, custom ASPX shells
Backdoors POWERSTATS, Remexi, SideTwist, PowerLess, VALUEVAULT, IMAPLoader
Scheduled tasks Commonly used in conjunction with PowerShell scripts
Exchange transport rules Modification of mail flow rules to maintain email access and BCC copies
Registry run keys Standard autorun persistence

Defense Evasion

Technique Detail
Tunneling SSH tunneling, Plink, Chisel, ngrok for reverse connections
Living-off-the-land binaries (LOLBins) Certutil, BITSAdmin, mshta, rundll32
DNS tunneling Custom DNS tunneling tools for covert channels
Use of legitimate remote access tools AnyDesk, ScreenConnect, Atera for blending with normal IT activity
Process injection DLL side-loading, hollowing
Indicator removal Log clearing, timestomping

Lateral Movement

Technique Detail
RDP Primary lateral movement method; often using harvested credentials
PsExec / SMB Remote execution and file copying via administrative shares
WMI Windows Management Instrumentation for remote command execution
Credential abuse Pass-the-hash, Kerberoasting, use of harvested domain admin credentials

Collection

Technique Detail
Email harvesting HYPERSCRAPE tool for bulk download of Gmail/Yahoo/Outlook inboxes; Exchange mailbox export
File collection Staging and compression of sensitive documents
Database access Direct queries against SQL databases in target environments
Keylogging Custom keyloggers deployed by APT42 for surveillance targets
Screen capture Surveillance-oriented collection on dissident targets

Impact

Technique Detail
Wiper deployment ZeroCleare, Dustman, Meteor, BiBi-Linux Wiper, BiBi-Windows Wiper, Shamoon/DistTrack (historically), custom wipers
"Lock and leak" Encryption of data + public leaking on Telegram; Moses Staff, Agrius, Cyber Toufan operations
Defacement Website defacement with political messaging; CyberAv3ngers defacement of Unitronics HMIs
Ransomware as cover Deployment of ransomware (sometimes modified from open-source tools) to mask destructive intent
Data destruction MBR wiping, partition table destruction, file overwriting

Command & Control

Technique Detail
DNS tunneling DNSExfiltrator, custom DNS C2 channels (OilRig, MuddyWater)
Cloud-based C2 Use of cloud storage (OneDrive, Google Drive, Dropbox) and cloud services for C2 traffic blending
Custom protocols BondUpdater (DNS-based), EagleRelay, MechaFlounder
IMAP-based C2 IMAPLoader uses email protocols for command retrieval
Web-based C2 Communication over HTTPS to compromised or actor-controlled domains

5. Tooling Arsenal

Tool Type Description Associated Groups
Shamoon / DistTrack Wiper Destructive malware that overwrites MBR and files; caused massive damage at Saudi Aramco (2012) and again in Shamoon 2.0/2.5 campaigns (2016--2017) APT33 (assessed), unknown IRGC-linked
ZeroCleare Wiper Wiper targeting Middle East energy sector; uses EldoS RawDisk driver to bypass security controls (IBM X-Force) APT34/OilRig + APT33 (collaborative)
Dustman Wiper Variant of ZeroCleare targeting Bapco (Bahrain petroleum company, 2019) Assessed IRGC-linked
Meteor Wiper Deployed against Iranian railway system (2021, possibly dissident operation) and later in regional attacks Indeterminate
BiBi-Linux Wiper Wiper Named after Israeli PM Netanyahu ("Bibi"); destroys files and corrupts partition tables on Linux systems (Security Joes) BiBiGun / assessed IRGC-linked
BiBi-Windows Wiper Wiper Windows variant of the BiBi wiper; deployed in parallel with the Linux version against Israeli targets Same as above
POWERSTATS Backdoor PowerShell-based backdoor with multiple C2 methods; long-running MuddyWater implant MuddyWater
VALUEVAULT Credential Stealer Go-based browser credential stealer; ports Firefox/Chrome credential extraction APT35/Mint Sandstorm
Remexi Backdoor Surveillance-oriented backdoor for monitoring targets; keylogging, screenshot, data exfiltration APT35/Chafer overlap
CharmPower Backdoor PowerShell-based modular backdoor deployed post-exploitation of Log4Shell Mint Sandstorm/APT35
HYPERSCRAPE Collection Tool for bulk downloading email inboxes from Gmail, Yahoo, and Outlook via stolen session cookies (Google TAG) APT35/Charming Kitten
BASICSTAR Backdoor VBScript-based backdoor with string-based C2 command processing; used against Middle East think tanks Mint Sandstorm
PowerLess Backdoor PowerShell-based backdoor operating in .NET context to evade PS logging; keylogging, browser data theft Mint Sandstorm
SideTwist Backdoor C++-based backdoor communicating over HTTP; used in OilRig operations OilRig/APT34
BondUpdater C2 / Backdoor DNS-based C2 backdoor using TXT records for command retrieval OilRig/APT34
DNSExfiltrator Exfiltration Open-source DNS exfiltration tool adapted for covert data transfer OilRig, MuddyWater
EagleRelay Tunneling Custom tunneling tool for relaying traffic through compromised Azure VMs Peach Sandstorm/APT33
MechaFlounder Backdoor Python-based backdoor communicating over TCP APT33/Peach Sandstorm
IMAPLoader Loader/C2 .NET malware using IMAP email protocol for C2 communication; novel evasion technique Tortoiseshell/Yellow Liderc
Custom phishing frameworks Phishing Bespoke credential-harvesting platforms mimicking Microsoft, Google, and university login pages APT42, Mint Sandstorm
Mimikatz Credential Theft Commodity tool (not Iranian-developed) used extensively post-compromise Nearly all Iranian groups
Web shells (various) Persistence ASPX, PHP web shells deployed on Exchange, SharePoint, and web servers MuddyWater, OilRig, Scarred Manticore

6. Notable Campaigns & Operations

Campaign / Operation Year(s) Actor(s) Description Impact
Operation Ababil 2012--2013 Izz ad-Din al-Qassam Cyber Fighters (assessed IRGC-linked) Sustained DDoS campaign against major U.S. financial institutions (Bank of America, JPMorgan, Wells Fargo, others) Significant service disruptions; one of the largest DDoS campaigns against U.S. banking sector at that time (CISA)
Shamoon / Saudi Aramco August 2012 Assessed IRGC-linked Wiper destroyed ~35,000 workstations at Saudi Aramco by overwriting MBR and files Most destructive cyberattack on a single company at the time; weeks of recovery
Bowman Avenue Dam 2013 Assessed IRGC Intrusion into SCADA systems of a small dam in Rye Brook, New York No physical impact (sluice gate was manually disconnected), but demonstrated Iran's interest in U.S. critical infrastructure; led to indictments
Sands Casino Hack February 2014 Assessed IRGC Destructive attack against Las Vegas Sands Corp. -- wiper deployment, data theft, website defacement Retaliation for CEO Sheldon Adelson's public comments about nuclear strikes on Iran; $40M+ in damages (Bloomberg)
Shamoon 2.0 / 2.5 2016--2017 Assessed IRGC-linked Return of Shamoon wiper targeting Saudi government agencies, petrochemical companies, and other Gulf entities Multiple organizations affected; expanded target set beyond Aramco
APT33 aerospace/energy campaigns 2016--present APT33/Peach Sandstorm Persistent targeting of U.S. and Saudi defense contractors, aerospace firms, and energy companies Credential theft and espionage at scale; intelligence collection on defense programs
MuddyWater regional espionage 2017--present MuddyWater/Mango Sandstorm Continuous espionage campaigns across Middle East, Turkey, Pakistan, Central Asia; targeting government, telecom, energy Thousands of organizations targeted; one of the most prolific Iranian groups
ZeroCleare energy sector attacks 2019 APT33 + OilRig (collaborative) Wiper targeting Middle East energy and industrial sectors Destructive intent against critical infrastructure; Bahrain's Bapco targeted via Dustman variant
Travelex ransomware December 2019 -- January 2020 Assessed Iranian-linked (disputed) Ransomware attack on foreign exchange company Travelex; systems offline for weeks $2.3M ransom reportedly paid; Travelex entered administration; $30M+ in losses
APT42 dissident surveillance 2015--present APT42 Systematic surveillance of Iranian dissidents, journalists, human rights lawyers, and activists worldwide Compromise of personal communications; physical safety implications for targets inside Iran (Google TAG)
Iran-Albania confrontation July 2022 Assessed MOIS-linked (HomeLand Justice) Destructive attack against Albanian government systems; Albania severed diplomatic relations with Iran First known case of a nation severing diplomatic ties over a cyberattack (Microsoft)
Moses Staff / Abraham's Ax "lock and leak" 2021--2022 Moses Staff Encryption and leaking of data from Israeli companies and government entities; psychological warfare messaging Dozens of Israeli organizations targeted; data leaked on Telegram
Charlie Hebdo hack-and-leak January 2023 Cotton Sandstorm/Neptunium Breach of Charlie Hebdo subscriber database; leak of 230,000 subscriber records after the magazine published cartoon contest mocking Iran's Supreme Leader Personal data exposure; assessed as IRGC retaliation (Microsoft)
CyberAv3ngers Unitronics PLC campaign November 2023 CyberAv3ngers (IRGC-CEC) Exploitation of Unitronics Vision Series PLCs with default credentials in U.S. water and wastewater systems; defacement of HMI screens with anti-Israel messaging Municipal Water Authority of Aliquippa (PA) and others compromised; CISA emergency advisory; U.S. Treasury sanctions against IRGC-CEC officials (CISA)
BiBi wiper campaigns October 2023--2024 Assessed IRGC-linked (BiBiGun) Deployment of BiBi-Linux and BiBi-Windows wipers against Israeli organizations following October 7 Hamas attack Destructive impact across multiple Israeli sectors; named after PM Netanyahu as psychological element
Cyber Toufan mass leaks October 2023--2024 Cyber Toufan (assessed IRGC-linked) Mass exfiltration and leaking of data from dozens of Israeli companies; systematic "name and shame" campaign on Telegram Over 100 Israeli organizations claimed as victims; significant data exposure
Mint Sandstorm credential campaigns 2023--2025 Mint Sandstorm/APT35 Sustained credential harvesting targeting universities, think tanks, defense researchers, and Middle East policy experts Ongoing; thousands of individuals targeted with bespoke phishing (Microsoft)
Peach Sandstorm defense targeting 2023--2025 Peach Sandstorm/APT33 Password spray and targeted attacks against defense, satellite, and pharmaceutical sectors globally Intelligence collection on defense industrial base; Azure infrastructure abused for C2
Cotton Sandstorm influence operations 2024--2025 Cotton Sandstorm/Emennet Pasargad Influence operations targeting U.S. and Israeli audiences; fake news sites, social media manipulation, personas posing as activist groups Election-related disinformation; attempts to amplify social divisions

7. Primary Targets

By Geography

Iranian Cyber\nOperations Israel\n(Primary Adversary) Saudi Arabia &\nGulf States United StatesEurope\n(UK, France, Germany,\nAlbania) Iranian Diaspora\n& Dissidents Government & militaryCritical infrastructurePrivate sector (all verticals)Academic institutionsEnergy / petroleumGovernment / diplomaticTelecomDefense industrial baseCritical infrastructure\n(water, energy) Government / diplomaticFinancial servicesGovernmentDiplomatic missionsHuman rights activistsJournalistsLawyers & academics

By Sector

Sector Targeting Rationale Key Groups
Government & Diplomatic Intelligence collection, policy insight, sanctions-related intelligence OilRig, MuddyWater, Mint Sandstorm, Scarred Manticore
Defense & Aerospace Military technology espionage, missile/drone program intelligence APT33/Peach Sandstorm, Tortoiseshell
Energy & Petroleum Strategic intelligence on Gulf competitors, destructive capability demonstration APT33, OilRig, historical Shamoon operators
Water & Wastewater Low-hanging OT targets for visible disruption CyberAv3ngers
Telecommunications Signals intelligence, call records, surveillance enablement Lyceum, MuddyWater, Scarred Manticore
Financial Services DDoS retaliation, sanctions intelligence Historical (Operation Ababil); lower priority currently
Academic & Research Credential harvesting, intellectual property, surveillance of academics studying Iran Mint Sandstorm, APT42, Peach Sandstorm
Media & Journalism Surveillance of reporters covering Iran, impersonation for phishing APT42, Cotton Sandstorm
Human Rights & Civil Society Surveillance of dissidents, activists, and opposition figures APT42 (primary), Mint Sandstorm
Healthcare Opportunistic; some targeting observed during COVID-19 Mint Sandstorm (limited)

8. Defensive Implications

Priority Defenses Against Iranian Threat Actors

The following defensive measures address the most common and impactful Iranian TTPs. Organizations in targeted sectors should treat these as baseline requirements.

Patch Management for Edge Devices

Iranian groups' heavy reliance on exploiting internet-facing VPN appliances, firewalls, and Exchange servers makes patch management for edge devices the single highest-impact defensive measure.

  • Prioritize patching for Fortinet, Pulse Secure/Ivanti, Citrix, F5, and Microsoft Exchange vulnerabilities
  • Maintain an accurate inventory of all internet-facing assets
  • Subscribe to CISA Known Exploited Vulnerabilities (KEV) catalog alerts
  • Implement virtual patching via WAF/IPS where immediate patching is not possible

Password Spray Detection

  • Enforce MFA on all externally accessible services (Azure AD/Entra ID, VPN, Exchange Online, OWA)
  • Implement smart lockout and IP-based throttling
  • Monitor for distributed low-and-slow spray patterns (APT33 uses residential proxies to distribute attempts)
  • Deploy Azure AD/Entra ID Identity Protection or equivalent

Email Security Against Credential Phishing

  • Deploy advanced anti-phishing with URL rewriting and time-of-click analysis
  • Implement FIDO2/hardware security keys for high-value targets (executives, researchers, policy staff)
  • Train staff to recognize impersonation of journalists, academics, and think-tank contacts
  • Monitor for newly registered lookalike domains

OT/ICS Security

  • Water sector (CyberAv3ngers): Change default credentials on all PLCs/HMIs; remove Unitronics and other PLCs from internet exposure; segment OT networks; monitor for unauthorized access to TCP port 20256 (Unitronics default)
  • Energy sector: Implement network monitoring at Purdue Model Level 3.5; deploy OT-specific threat detection
  • Follow CISA ICS advisories for Iranian-specific TTPs

Wiper Resilience and Recovery

  • Maintain offline, immutable backups tested for restoration
  • Implement network segmentation to limit wiper propagation
  • Deploy EDR with behavioral detection for MBR modification, mass file overwrite, and partition table corruption
  • Develop and test incident response playbooks specifically for destructive attacks
  • Pre-position recovery infrastructure (gold images, clean media)

Social Media Awareness

  • Brief staff in targeted roles (journalists, academics, Middle East policy researchers) on Iranian social engineering TTPs
  • Verify journalist and academic contacts through independent channels before sharing information or clicking links
  • Monitor for impersonation of organizational staff on LinkedIn, Twitter/X, and WhatsApp

9. Market Impact

Iranian cyber operations drive demand across several cybersecurity market segments:

Market Segment Iran-Driven Demand Signal Relevant Products/Vendors
OT/ICS Security CyberAv3ngers' targeting of water systems and Unitronics PLCs catalyzed emergency spending across U.S. water utilities; CISA advisories and congressional attention drove new budget allocations Claroty, Nozomi Networks, Dragos, OTORIO, Fortinet OT
Edge Device Hardening Persistent exploitation of VPN/firewall vulnerabilities drives demand for network access control, Zero Trust network access (ZTNA), and exposure management Zscaler, Palo Alto Prisma Access, Ivanti (post-remediation), firmware integrity solutions
Identity Protection Password spray campaigns at scale drive MFA adoption, identity threat detection and response (ITDR), and phishing-resistant authentication Microsoft Entra ID P2, Okta, CrowdStrike Falcon Identity, Silverfort
Email Security Credential phishing campaigns targeting high-value individuals increase demand for advanced anti-phishing and targeted attack protection Proofpoint TAP, Microsoft Defender for Office 365, Abnormal Security
Threat Intelligence Demand for Iran-specific threat intelligence and attribution capabilities, particularly in Middle East markets Mandiant, Recorded Future, Check Point Research, CrowdStrike
Backup & Recovery Wiper attacks (BiBi, ZeroCleare) underscore need for immutable backup and rapid recovery solutions Rubrik, Cohesity, Veeam, Zerto
Middle East Cybersecurity Spending Regional security spending growth driven by Gulf states' exposure to Iranian operations; Israel's cybersecurity ecosystem growth partially fueled by domestic threat experience Regional MSSPs, national cyber authorities, Israeli vendors broadly

U.S. Critical Infrastructure Mandates

The CyberAv3ngers' water system campaign directly contributed to:

  • CISA emergency advisory AA23-335A and subsequent water sector guidance
  • EPA enforcement actions on water system cybersecurity (later complicated by legal challenges)
  • Congressional attention to water/wastewater sector cybersecurity gaps
  • Executive-level focus on securing "target-rich, cyber-poor" sectors

This represents a clear case of a specific threat actor campaign driving federal policy and, consequently, market demand.


10. Recent Activity (2024--2026)

Knowledge Gap

Information on Iranian cyber operations in late 2025 and 2026 is limited. The author's training data has a cutoff, and attribution of very recent campaigns may be incomplete or revised as new intelligence emerges. The following reflects the best available public reporting through early 2025, with assessed trajectory into 2026.

Confirmed and Assessed Activity

CyberAv3ngers -- Continued OT Targeting (2024--2025) Following the November 2023 Unitronics campaign, CyberAv3ngers expanded targeting to additional water and wastewater systems. U.S. Treasury imposed sanctions on six IRGC-CEC officials in February 2024. The group developed custom malware for IoT and OT devices, including a modified CentOS-based toolkit (Claroty Team82). Continued probing of internet-exposed industrial control systems through 2025.

BiBi Wiper Campaigns (2023--2024) BiBi-Linux and BiBi-Windows wipers were deployed against Israeli organizations across multiple sectors in the months following October 7, 2023. The wipers were designed for maximum destruction -- corrupting file systems, overwriting data, and damaging partition tables. Deployment continued into mid-2024 as part of broader Iran-aligned cyber operations against Israel.

Mint Sandstorm / Charming Kitten Credential Campaigns (2024--2025) Microsoft and Google TAG reported sustained campaigns targeting Middle East policy researchers, university faculty, journalists, and current/former government officials. APT42 subgroups used increasingly sophisticated phishing lures, including fake conference invitations, interview requests, and document-sharing pretexts. Expanded targeting to individuals involved in Israel-Iran diplomacy and regional security discussions.

Cotton Sandstorm Influence Operations (2024--2025) Emennet Pasargad-linked operators conducted influence operations targeting U.S. audiences during the 2024 election cycle, building on 2020 election interference tactics. Operations included fake activist websites, social media personas, and amplification of divisive narratives. Microsoft and FBI issued joint advisories on Iranian influence operations targeting U.S. elections.

Peach Sandstorm Defense Sector Targeting (2024--2025) APT33 continued large-scale password spray campaigns against defense, satellite, and pharmaceutical organizations globally. Compromised Azure infrastructure was used for C2 relay via the EagleRelay tool. Microsoft assessed increased sophistication in post-compromise tradecraft, including use of legitimate remote management tools for persistence.

Sustained Israel-Focused Operations (2024--2026) The broader Israel-Hamas conflict and subsequent regional escalation maintained an elevated tempo of Iranian-aligned cyber operations against Israeli targets. Multiple groups -- including Cyber Toufan, Agrius, and Moses Staff successors -- continued data theft, wiper deployment, and hack-and-leak operations. The operational tempo is assessed as remaining high into 2026 given unresolved regional tensions.

  • OT/ICS targeting expansion: Beyond water systems to energy, transportation, and manufacturing -- particularly in Israel and Gulf states
  • AI-assisted operations: Adoption of large language models for phishing content generation, persona management, and target research (assessed based on general nation-state trends)
  • Increased collaboration between groups: More joint operations combining espionage access (MOIS groups) with destructive capability (IRGC groups), as seen in the ZeroCleare precedent
  • Continued "lock and leak" evolution: Increasingly professional data-leak operations with Telegram channels as primary distribution
  • Cloud targeting maturation: Greater focus on cloud environments (Azure, M365, Google Workspace) as organizations migrate infrastructure

11. Sources & Further Reading

Government Advisories and Indictments

Vendor Threat Intelligence

MITRE ATT&CK

Academic and Think Tank

Glossary

This glossary defines the acronyms and key terms used throughout the cybersecurity market research site. Use it as a quick reference when navigating segment analyses, pain-point discussions, and opportunity assessments.

A

Term Definition
ACL Access Control List — rules determining which users/systems can access resources
APT Advanced Persistent Threat — a prolonged, targeted cyberattack where an intruder gains and maintains unauthorized access
ASM Attack Surface Management — continuous discovery, inventory, and risk assessment of an organization's external-facing assets
ASPM Application Security Posture Management — unified visibility and risk management across the application lifecycle
AV Antivirus — software designed to detect, prevent, and remove malware

B

Term Definition
BAS Breach and Attack Simulation — automated tools that simulate real-world attacks to test security controls
BEC Business Email Compromise — a social-engineering attack targeting employees with access to company finances or data

C

Term Definition
C2 Command and Control — infrastructure used by attackers to communicate with compromised systems
CASB Cloud Access Security Broker — a security policy enforcement point between cloud consumers and providers
CCPA California Consumer Privacy Act — California state law granting consumers rights over their personal data
CIAM Customer Identity and Access Management — managing and securing external customer identities and authentication
CIEM Cloud Infrastructure Entitlement Management — managing identities and privileges in cloud environments
CTEM Continuous Threat Exposure Management — a program for continuously assessing and prioritizing threat exposures
CNAPP Cloud-Native Application Protection Platform — integrated security for cloud-native applications across the full lifecycle
CSPM Cloud Security Posture Management — continuous monitoring of cloud infrastructure for misconfigurations and compliance risks
CWPP Cloud Workload Protection Platform — security for workloads running in cloud environments (VMs, containers, serverless)
CVE Common Vulnerabilities and Exposures — a standardized identifier for publicly known cybersecurity vulnerabilities

D

Term Definition
DAST Dynamic Application Security Testing — testing a running application for vulnerabilities by simulating attacks
DCS Distributed Control System — a control system for managing industrial processes across multiple locations
DLP Data Loss Prevention — tools and processes to prevent unauthorized data exfiltration or leakage
DORA Digital Operational Resilience Act — EU regulation on ICT risk management for financial entities
DSPM Data Security Posture Management — discovering, classifying, and protecting sensitive data across cloud environments

E

Term Definition
EASM External Attack Surface Management — discovering and monitoring internet-facing assets for exposures
EDR Endpoint Detection and Response — tools that monitor endpoints for threats and provide investigation and response capabilities
EPP Endpoint Protection Platform — integrated endpoint security combining prevention, detection, and response

F/G

Term Definition
FAIR Factor Analysis of Information Risk — a quantitative model for understanding, analyzing, and measuring information risk
GRC Governance, Risk, and Compliance — integrated framework for aligning IT with business goals, managing risk, and meeting regulations
GDPR General Data Protection Regulation — EU regulation on data protection and privacy for individuals

H

Term Definition
HIPAA Health Insurance Portability and Accountability Act — US law governing the privacy and security of health information

I

Term Definition
IAB Initial Access Broker — specialized cybercriminals who compromise networks and sell access to ransomware operators and other buyers
IAM Identity and Access Management — framework for managing digital identities and controlling access to resources
ICS Industrial Control System — control systems used in industrial production and critical infrastructure
IDS Intrusion Detection System — a system that monitors network traffic for suspicious activity and alerts
ITDR Identity Threat Detection and Response — detecting and responding to identity-based attacks and compromises
IoT Internet of Things — network of physical devices embedded with sensors, software, and connectivity
IPS Intrusion Prevention System — a system that monitors and actively blocks detected threats in network traffic

L

Term Definition
LOTL Living Off the Land — attack technique using legitimate, pre-installed system tools and binaries rather than custom malware to evade detection

M

Term Definition
MaaS Malware-as-a-Service — cybercrime business model where malware developers sell or rent their tools to other criminals
MDR Managed Detection and Response — outsourced security service providing 24/7 threat monitoring, detection, and response
MITRE ATT&CK MITRE Adversarial Tactics, Techniques, and Common Knowledge — a knowledge base of adversary behaviors and techniques
MSSP Managed Security Service Provider — a third-party provider offering outsourced monitoring and management of security devices
MFA Multi-Factor Authentication — requiring two or more verification factors to gain access to a resource

N

Term Definition
NDR Network Detection and Response — detecting and responding to threats by analyzing network traffic patterns
NERC CIP North American Electric Reliability Corporation Critical Infrastructure Protection — security standards for the electric grid
NGAV Next-Generation Antivirus — advanced antivirus using behavioral analysis, AI, and machine learning beyond signature-based detection
NIS2 Network and Information Systems Directive 2 — updated EU directive on cybersecurity for essential and important entities
NIST CSF National Institute of Standards and Technology Cybersecurity Framework — a voluntary framework for managing cybersecurity risk

O

Term Definition
OT Operational Technology — hardware and software that monitors and controls physical devices and processes
OWASP Open Worldwide Application Security Project — a nonprofit focused on improving software security through open-source projects and guidance

P

Term Definition
PAM Privileged Access Management — securing, managing, and monitoring privileged accounts and access
PCI DSS Payment Card Industry Data Security Standard — security standards for organizations that handle credit card data
PII Personally Identifiable Information — any data that could identify a specific individual
PLC Programmable Logic Controller — an industrial computer used to control manufacturing processes

R

Term Definition
RaaS Ransomware-as-a-Service — cybercrime business model where ransomware operators provide malware and infrastructure to affiliates who conduct attacks, splitting profits
RGB Reconnaissance General Bureau — North Korea's primary intelligence agency responsible for clandestine operations including cyber operations

S

Term Definition
SASE Secure Access Service Edge — converged network and security-as-a-service architecture delivered from the cloud
SAST Static Application Security Testing — analyzing source code for vulnerabilities without executing the application
SBOM Software Bill of Materials — a formal inventory of components, libraries, and dependencies in a software product
SCA Software Composition Analysis — identifying open-source components and known vulnerabilities in a codebase
SCADA Supervisory Control and Data Acquisition — a system for monitoring and controlling industrial processes remotely
SD-WAN Software-Defined Wide Area Network — a virtual WAN architecture that simplifies branch networking and optimizes traffic
SEG Secure Email Gateway — a solution that filters inbound and outbound email to block threats and enforce policies
SIEM Security Information and Event Management — aggregating and analyzing log data for threat detection and compliance
SOAR Security Orchestration, Automation, and Response — tools that automate and coordinate security operations workflows
SOC Security Operations Center — a centralized team and facility for monitoring, detecting, and responding to security incidents
SOX Sarbanes-Oxley Act — US law mandating financial reporting and internal control requirements for public companies
SSE Security Service Edge — the security component of SASE, delivering SWG, CASB, and ZTNA as cloud services
SWG Secure Web Gateway — a solution that filters web traffic to enforce security policies and block threats

T

Term Definition
TAM Total Addressable Market — the total revenue opportunity available for a product or service
TCO Total Cost of Ownership — the complete cost of acquiring, deploying, and operating a solution over its lifetime
TIP Threat Intelligence Platform — a system for aggregating, correlating, and operationalizing threat intelligence data
TLS Transport Layer Security — a cryptographic protocol that provides secure communication over a network
TTP Tactics, Techniques, and Procedures — the patterns of behavior and methods used by threat actors to conduct cyber operations

V

Term Definition
VM Vulnerability Management — the ongoing process of identifying, evaluating, treating, and reporting security vulnerabilities

X

Term Definition
XDR Extended Detection and Response — unified threat detection and response across endpoints, network, cloud, and email

Z

Term Definition
ZTNA Zero Trust Network Access — a security model that grants access based on identity verification and least-privilege principles