Iranian Cyber Threat Activity Against U.S. Critical Infrastructure and Kinetic Targeting
Summary
Hide ▲
Show ▼
Iranian state-sponsored and affiliated cyber threat actors have **formalized a cyber-kinetic war doctrine**, integrating digital reconnaissance with physical strikes following the February 28, 2026, joint US-Israel military operation (*Epic Fury*). New research confirms Iran’s systematic compromise of **Hikvision and Dahua IP cameras** across Israel, Qatar, Bahrain, Kuwait, the UAE, Cyprus, and Lebanon—exploiting **five patched but widely unpatched vulnerabilities** to enable **real-time battle damage assessment and missile-targeting support**. Check Point Research assesses this activity as a **predictive indicator of kinetic strikes**, mirroring tactics used during the June 2025 Israel-Iran conflict. **As of April 2026, Iranian APT actors have escalated direct targeting of U.S. critical infrastructure**, focusing on **Rockwell/Allen-Bradley PLCs** in Government Services, Water and Wastewater Systems, and Energy sectors. The joint FBI/CISA/NSA advisory warns of **financial losses, operational disruptions, and malicious manipulation of HMI/SCADA displays**, with confirmed extraction of PLC project files. This follows prior CyberAv3ngers (IRGC-linked) campaigns that compromised **75 Unitronics PLCs** in 2023–2024. In parallel, **pro-Iranian hacktivist group Handala wiped 80,000 devices** on U.S. medical giant Stryker’s network in March 2026, signaling a shift toward **destructive hybrid operations** blending state-backed and proxy activity. The campaign extends beyond surveillance: **pro-Iranian actors breached Jordan’s Silos and Supply General Company via phishing**, while IRGC-linked groups conducted **limited but targeted ICS/SCADA attacks** and **DDoS campaigns against UAE/Bahrain government entities**. CrowdStrike and Flashpoint warn of escalating hybrid tactics, including **propaganda operations, data center missile strikes, and hacktivist proxies** (e.g., Russian Legion) expanding targets to US-based critical infrastructure. **Pay2Key**, an Iranian-linked ransomware group active since 2020, has **re-emerged in March 2026 with enhanced evasion capabilities**, targeting a US healthcare provider in a three-hour encryption blitz that leveraged TeamViewer, credential harvesting (Mimikatz/LaZagne), and backup enumeration—raising concerns about its **strategic destruction motives** amid geopolitical tensions.
Timeline
-
07.04.2026 21:02 1 articles · 14h ago
Iranian APT Actors Target U.S. Critical Infrastructure PLCs
A **joint advisory from the FBI, CISA, NSA, EPA, DOE, and U.S. Cyber Command CNMF** warns that Iranian-affiliated APT actors are **actively targeting internet-exposed Rockwell/Allen-Bradley PLCs** in U.S. critical infrastructure sectors, including **Government Services and Facilities, Water and Wastewater Systems, and Energy**. The campaign, ongoing since **March 2026**, has resulted in **financial losses, operational disruptions, and malicious manipulation of data displayed on HMI and SCADA systems**, including the **extraction of PLC project files**. The FBI assesses the escalation as a direct response to **geopolitical hostilities between Iran, the United States, and Israel**, aligning with prior tactics by **CyberAv3ngers (IRGC-linked)**, which compromised **75 Unitronics PLCs** in 2023–2024 (half in Water and Wastewater Systems networks). The advisory urges defenders to **disconnect PLCs from the internet or secure them behind firewalls**, monitor OT ports for suspicious traffic (especially from overseas hosting providers), enforce **multifactor authentication (MFA)**, apply **latest firmware updates**, and disable **unused services/default authentication methods**. The targeting of **U.S.-based OT systems** marks a **significant shift from regional surveillance and hacktivism to direct, disruptive operations against American critical infrastructure**, raising concerns about potential **follow-on kinetic effects** or **multi-stage hybrid attacks**.
Show sources
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
02.03.2026 17:00 6 articles · 1mo ago
Iran Launches Massive Cyber Retaliation After Military Strikes
Following joint Israeli-US strikes on Iranian leadership, military, and nuclear sites on February 28, 2026, **149 hacktivist DDoS attacks** targeted **110 organizations across 16 countries** between February 28–March 2, with **70% of activity driven by Keymous+ and DieNet**. The Middle East accounted for 76.6% of regional attacks, disproportionately hitting **Kuwait (28%), Israel (27.1%), and Jordan (21.5%)**, while pro-Russian groups (Cardinal, Russian Legion) claimed breaches of Israeli military networks, including the **Iron Dome missile defense system**. Iran’s IRGC expanded kinetic cyber retaliation by striking **Saudi Aramco and an AWS data center in the U.A.E.** to inflict global economic pain, while **Cotton Sandstorm (Haywire Kitten) revived its *Altoufan Team* persona** to deface Bahraini websites. An **SMS phishing campaign** exploited wartime urgency, deploying surveillance malware via a **fake *RedAlert* app**—a replica of Israel’s emergency alert system—tricking users into sideloading malicious APKs. UNC1549 (Nimbus Manticore) remained the **fourth most active threat actor in H2 2025**, sustaining focus on defense, aerospace, and telecommunications sectors. **In March 2026, the Iranian-linked ransomware group Pay2Key re-emerged with advanced TTPs**, targeting a US healthcare provider in a **three-hour encryption blitz** that combined **TeamViewer for interactive access**, credential theft (Mimikatz/LaZagne/ExtPassword), and backup enumeration (IBackup, Barracuda Yosemite). The attack deployed a **‘No Defender’ evasion toolkit** (later removed) and a **7zip SFX ransomware payload (abc.exe)**, with no evidence of data exfiltration—suggesting a focus on **destruction over financial gain**. Pay2Key’s ties to Iran remain debated due to its **2025 attempted sale** and **Russian-speaking forum links**, but its **geopolitically timed resurgence** underscores risks of **strategic cyber destruction** amid US-Iran tensions. **The same month, pro-Iranian hacktivist group Handala wiped approximately 80,000 devices** on the network of **U.S. medical giant Stryker**, including employees' mobile devices and company-managed personal computers, demonstrating an escalation in **destructive proxy operations** against U.S. entities. The UK NCSC and Google’s Threat Intelligence Group (GTIG) reiterated warnings of heightened risks for organizations with Middle East exposure, emphasizing **DDoS resilience, ICS segmentation, and supply-chain hardening**.
Show sources
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
- Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel — www.infosecurity-magazine.com — 02.03.2026 17:45
- UK warns of Iranian cyberattack risks amid Middle-East conflict — www.bleepingcomputer.com — 02.03.2026 17:54
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
- Iran-Linked Pay2Key Ransomware Group Re-Emerges — www.infosecurity-magazine.com — 26.03.2026 12:45
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
20.11.2025 09:35 4 articles · 4mo ago
Iranian Threat Actors Use Cyber Reconnaissance for Kinetic Attacks
Iranian threat actors, including Imperial Kitten and MuddyWater, have **systematically integrated cyber reconnaissance with kinetic strikes**, with a surge in IP camera exploits against **Hikvision and Dahua devices** across Israel, Qatar, Bahrain, Kuwait, the UAE, Cyprus, and Lebanon beginning February 28, 2026. The campaign leverages **five distinct vulnerabilities** (CVE-2017-7921, CVE-2021-36260, CVE-2023-6895 for Hikvision; CVE-2025-34067, CVE-2021-33044 for Dahua), all of which have available patches but remain widely unpatched. Check Point Research assesses that **tracking this activity from attributed infrastructures may serve as an early indicator of follow-on kinetic missile strikes**, citing prior examples such as the June 2025 Weizmann Institute attack, where Iran compromised a street camera before a ballistic missile strike. The article further reveals **expanded tactical integration**: pro-Iranian actors breached the **Jordan Silos and Supply General Company via phishing** (logistics sabotage); Flashpoint identified **ongoing propaganda campaigns, missile strikes against data centers, and DDoS attacks on UAE/Bahrain government entities**; and CrowdStrike observed **muted but targeted IRGC-linked cyberattacks**, including a surge in **pro-Iranian Russian hacktivism** targeting ICS/SCADA systems and CCTV networks of **US-based entities**. Analysts characterize this as a **‘new blueprint for modern warfare’**, where cyber operations are **‘fully blended’** with kinetic strikes to impose costs across domains. **By April 2026, Iranian APT actors have escalated direct targeting of U.S. critical infrastructure PLCs**, with the FBI/CISA/NSA advisory confirming **financial losses, operational disruptions, and malicious manipulation of HMI/SCADA displays** in Government Services, Water and Wastewater Systems, and Energy sectors. The activity mirrors prior CyberAv3ngers (IRGC) campaigns that compromised **75 Unitronics PLCs** in 2023–2024, half of which were in Water and Wastewater Systems networks.
Show sources
- Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt — thehackernews.com — 20.11.2025 09:35
- Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers — www.infosecurity-magazine.com — 04.03.2026 17:00
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
14.11.2025 16:40 1 articles · 4mo ago
APT42 Launches SpearSpecter Espionage Campaign
The Iranian state-sponsored threat actor APT42 has been observed targeting individuals and organizations of interest to the IRGC as part of a new espionage-focused campaign codenamed SpearSpecter. The campaign, detected in early September 2025 and assessed to be ongoing, systematically targets high-value senior defense and government officials using personalized social engineering tactics. The campaign extends to the targets' family members, creating a broader attack surface that exerts more pressure on the primary targets. APT42 is known for its ability to mount convincing social engineering campaigns that can run for days or weeks to build trust with the targets before sending a malicious payload or tricking them into clicking on booby-trapped links. The SpearSpecter campaign is carried out by cluster D of APT42, which focuses more on malware-based operations, while another campaign detailed by Check Point was carried out by cluster B of the same group, which focuses more on credential harvesting. The campaign involves impersonating trusted WhatsApp contacts to send a malicious link to a supposed required document for an upcoming meeting or conference. When the link is clicked, it initiates a redirect chain to serve a WebDAV-hosted Windows shortcut (LNK) masquerading as a PDF file by taking advantage of the "search-ms:" protocol handler. The LNK file establishes contact with a Cloudflare Workers subdomain to retrieve a batch script that functions as a loader for TAMECAT, a known PowerShell backdoor. TAMECAT employs various modular components to facilitate data exfiltration and remote control, using HTTPS, Discord, and Telegram for command-and-control (C2). The PowerShell framework uses three distinct channels for C2, suggesting the threat actor's goal of maintaining persistent access to compromised hosts even if one pathway gets detected and blocked. TAMECAT comes equipped with features to conduct reconnaissance, harvest files matching certain extensions, steal data from web browsers like Google Chrome and Microsoft Edge, collect Outlook mailboxes, and take screenshots at 15-second intervals. The data is exfiltrated over HTTPS or FTP, and the malware adopts various stealthy techniques to evade detection and resist analysis efforts.
Show sources
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
23.09.2025 00:00 2 articles · 6mo ago
Nimbus Manticore Expands Operations to Western Europe
The Iran-linked cyber-espionage group Nimbus Manticore, also known as UNC1549 and Smoke Sandstorm, has expanded its operations to target critical infrastructure organizations across Western Europe, including Denmark, Portugal, and Sweden. The group uses sophisticated malware variants, including MiniJunk and MiniBrowse, to gain persistent access to infected systems and steal credentials from Chrome and Edge browsers. MiniJunk is an advanced version of the Minibike backdoor, featuring improved obfuscation techniques, code signing, and multiple C2 servers to evade detection. The malware employs multi-stage sideloading to install and establish persistence on victim systems, leveraging fake job-related login pages and tailored spear-phishing emails. The group's operations are associated with the Iranian Revolutionary Guard Corps (IRGC) and have been active since at least 2022, focusing on the aerospace and defense sectors in Israel and the Middle East. Additionally, UNC1549 (aka Nimbus Manticore or Subtle Snail) has been observed deploying backdoors like TWOSTROKE and DEEPROOT in attacks targeting aerospace, aviation, and defense industries in the Middle East. The group has been active since late 2023 through 2025, employing sophisticated initial access vectors including abuse of third-party relationships, VDI breakouts, and highly targeted phishing. The group uses a combination of phishing campaigns and leveraging trusted relationships with third-party suppliers and partners to gain initial access. UNC1549 abuses credentials associated with services like Citrix, VMWare, and Azure Virtual Desktop and Application (VDA) to establish an initial foothold and break out of virtualized sessions. The group targets IT staff and administrators to obtain credentials with elevated privileges for deeper network access. Post-exploitation activities include reconnaissance, credential harvesting, lateral movement, defense evasion, and information theft, focusing on network/IT documentation, intellectual property, and emails. Custom tools used by UNC1549 include MINIBIKE, TWOSTROKE, DEEPROOT, LIGHTRAIL, GHOSTLINE, POLLBLEND, DCSYNCER.SLICK, CRASHPAD, SIGHTGRAB, and TRUSTTRAP. The group uses publicly available programs like AD Explorer, Atelier Web Remote Commander (AWRC), and SCCMVNC for remote control and reconnaissance. UNC1549 maintains stealth and command-and-control (C2) using extensive reverse SSH shells and domains mimicking the victim's industry. The group plants backdoors that beacon silently for months, only activating them to regain access after the victim has attempted eradication.
Show sources
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
19.09.2025 16:59 4 articles · 6mo ago
Subtle Snail Targets Global Telecommunications and Aerospace Companies
The Iran-nexus cyber espionage group UNC1549, also known as Subtle Snail, has expanded its operations to target critical infrastructure organizations across Western Europe, including Denmark, Portugal, and Sweden. The group uses sophisticated malware variants, including MiniJunk and MiniBrowse, to gain persistent access to infected systems and steal credentials from Chrome and Edge browsers. MiniJunk is an advanced version of the Minibike backdoor, featuring improved obfuscation techniques, code signing, and multiple C2 servers to evade detection. The malware employs multi-stage sideloading to install and establish persistence on victim systems, leveraging fake job-related login pages and tailored spear-phishing emails. The group's operations are associated with the Iranian Revolutionary Guard Corps (IRGC) and have been active since at least 2022, focusing on the aerospace and defense sectors in Israel and the Middle East. Additionally, UNC1549 (aka Nimbus Manticore or Subtle Snail) has been observed deploying backdoors like TWOSTROKE and DEEPROOT in attacks targeting aerospace, aviation, and defense industries in the Middle East. The group has been active since late 2023 through 2025, employing sophisticated initial access vectors including abuse of third-party relationships, VDI breakouts, and highly targeted phishing. The group uses a combination of phishing campaigns and leveraging trusted relationships with third-party suppliers and partners to gain initial access. UNC1549 abuses credentials associated with services like Citrix, VMWare, and Azure Virtual Desktop and Application (VDA) to establish an initial foothold and break out of virtualized sessions. The group targets IT staff and administrators to obtain credentials with elevated privileges for deeper network access. Post-exploitation activities include reconnaissance, credential harvesting, lateral movement, defense evasion, and information theft, focusing on network/IT documentation, intellectual property, and emails. Custom tools used by UNC1549 include MINIBIKE, TWOSTROKE, DEEPROOT, LIGHTRAIL, GHOSTLINE, POLLBLEND, DCSYNCER.SLICK, CRASHPAD, SIGHTGRAB, and TRUSTTRAP. The group uses publicly available programs like AD Explorer, Atelier Web Remote Commander (AWRC), and SCCMVNC for remote control and reconnaissance. UNC1549 maintains stealth and command-and-control (C2) using extensive reverse SSH shells and domains mimicking the victim's industry. The group plants backdoors that beacon silently for months, only activating them to regain access after the victim has attempted eradication.
Show sources
- Iranian State APT Blitzes Telcos & Satellite Companies — www.darkreading.com — 19.09.2025 16:59
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
03.09.2025 13:30 2 articles · 7mo ago
Iranian Cyber Threat Actors Conduct Global Phishing Campaign
The first email in this campaign was sent on August 19, 2025, from a legitimate address belonging to the Oman Ministry of Foreign Affairs in Paris, directed back at the organization. The emails were forwarded through a NordVPN exit node in Jordan to mask their origin. The emails included a blurred Word document attachment requiring users to enable macros to view it clearly. The document concealed malicious Visual Basic for Applications (VBA) macros, which, when enabled, executed a payload that gathered basic system information. The campaign targeted around four dozen embassies, consulates, and government ministries from nearly every corner of the earth. The attackers also targeted at least 10 other notable international organizations, including the United Nations, its Office on Drugs and Crime (UNODC), and its Children's Fund (UNICEF); the African Union; and humanitarian organizations like the Order of Malta. The campaign is assessed to have likely concluded just days after it began, as the attackers' command-and-control (C2) infrastructure appears to be inactive.
Show sources
- Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats — thehackernews.com — 03.09.2025 13:30
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
30.06.2025 15:00 5 articles · 9mo ago
U.S. Agencies Warn of Potential Iranian Cyber Activity Against Critical Infrastructure
Iranian state-sponsored or affiliated cyber threat actors are targeting U.S. industries and government agencies with a rise in malicious cyber activity, including destructive 'wiper' attacks aimed at causing complete network loss. These actors exploit known vulnerabilities, compromise weak passwords, and use tactics like spear phishing, password spraying, and credential stuffing to escalate from account compromise to full network destruction. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is actively monitoring these threats, sharing intelligence with partners, and urging organizations to strengthen basic defenses, such as multi-factor authentication, and report suspected incidents immediately to [email protected]. Following joint Israeli-US strikes on Iran in late February 2026, Iranian cyber retaliation surged, with over 150 hacktivist incidents—including DDoS attacks, defacements, and data breach claims—recorded in 48 hours. Experts warn of escalated Iranian operations leveraging ransomware-as-a-smokescreen, destructive wipers, and multi-actor obfuscation tactics against U.S. and allied networks. The UK NCSC advised organizations with Middle East exposure to review risk postures and secure offline backups, though no direct increase in threats to the UK was observed as of March 2, 2026.
Show sources
- Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran — www.cisa.gov — 30.06.2025 15:00
- Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats — thehackernews.com — 03.09.2025 13:30
- Iranian State APT Blitzes Telcos & Satellite Companies — www.darkreading.com — 19.09.2025 16:59
- CISA Statement on Iranian Cybersecurity Threats — www.cisa.gov — 22.06.2019 15:00
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
Information Snippets
-
Iranian threat actors exploit known vulnerabilities in unpatched or outdated software.
First reported: 22.06.2019 15:003 sources, 6 articlesShow sources
- Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran — www.cisa.gov — 30.06.2025 15:00
- Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats — thehackernews.com — 03.09.2025 13:30
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
- Iranian State APT Blitzes Telcos & Satellite Companies — www.darkreading.com — 19.09.2025 16:59
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- CISA Statement on Iranian Cybersecurity Threats — www.cisa.gov — 22.06.2019 15:00
-
These actors compromise internet-connected accounts and devices using default or weak passwords.
First reported: 22.06.2019 15:004 sources, 5 articlesShow sources
- Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran — www.cisa.gov — 30.06.2025 15:00
- Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats — thehackernews.com — 03.09.2025 13:30
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
- CISA Statement on Iranian Cybersecurity Threats — www.cisa.gov — 22.06.2019 15:00
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
-
Iranian cyber threat actors collaborate with ransomware affiliates to encrypt, steal, and leak sensitive information.
First reported: 30.06.2025 15:004 sources, 6 articlesShow sources
- Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran — www.cisa.gov — 30.06.2025 15:00
- Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats — thehackernews.com — 03.09.2025 13:30
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
- Iranian State APT Blitzes Telcos & Satellite Companies — www.darkreading.com — 19.09.2025 16:59
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iran-Linked Pay2Key Ransomware Group Re-Emerges — www.infosecurity-magazine.com — 26.03.2026 12:45
-
No coordinated campaign of malicious cyber activity in the U.S. has been observed.
First reported: 30.06.2025 15:002 sources, 2 articlesShow sources
- Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran — www.cisa.gov — 30.06.2025 15:00
- Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel — www.infosecurity-magazine.com — 02.03.2026 17:45
-
U.S. agencies are actively monitoring and coordinating with partners to share intelligence and provide assistance.
First reported: 22.06.2019 15:004 sources, 5 articlesShow sources
- Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran — www.cisa.gov — 30.06.2025 15:00
- Iranian State APT Blitzes Telcos & Satellite Companies — www.darkreading.com — 19.09.2025 16:59
- CISA Statement on Iranian Cybersecurity Threats — www.cisa.gov — 22.06.2019 15:00
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
- UK warns of Iranian cyberattack risks amid Middle-East conflict — www.bleepingcomputer.com — 02.03.2026 17:54
-
Organizations are urged to report suspicious or criminal activity related to potential Iranian cyber activity.
First reported: 22.06.2019 15:004 sources, 5 articlesShow sources
- Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran — www.cisa.gov — 30.06.2025 15:00
- Iranian State APT Blitzes Telcos & Satellite Companies — www.darkreading.com — 19.09.2025 16:59
- CISA Statement on Iranian Cybersecurity Threats — www.cisa.gov — 22.06.2019 15:00
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
- UK warns of Iranian cyberattack risks amid Middle-East conflict — www.bleepingcomputer.com — 02.03.2026 17:54
-
Iranian-aligned operators, connected to Homeland Justice, conducted a multi-wave spear-phishing campaign targeting embassies and consulates globally.
First reported: 03.09.2025 13:302 sources, 2 articlesShow sources
- Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats — thehackernews.com — 03.09.2025 13:30
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The campaign involved sending spear-phishing emails disguised as legitimate diplomatic communications to deploy malware via VBA macros.
First reported: 03.09.2025 13:302 sources, 2 articlesShow sources
- Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats — thehackernews.com — 03.09.2025 13:30
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The phishing emails were sent from 104 unique compromised addresses, including a hacked mailbox from the Oman Ministry of Foreign Affairs.
First reported: 03.09.2025 13:302 sources, 2 articlesShow sources
- Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats — thehackernews.com — 03.09.2025 13:30
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The targeted regions included the Middle East, Africa, Europe, Asia, and the Americas, with a focus on European embassies and African organizations.
First reported: 03.09.2025 13:302 sources, 2 articlesShow sources
- Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats — thehackernews.com — 03.09.2025 13:30
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The campaign aimed to establish persistence, contact a command-and-control server, and harvest system information.
First reported: 03.09.2025 13:302 sources, 2 articlesShow sources
- Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats — thehackernews.com — 03.09.2025 13:30
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The activity was attributed to Iranian threat actors by Israeli cybersecurity company Dream and corroborated by ClearSky.
First reported: 03.09.2025 13:302 sources, 2 articlesShow sources
- Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats — thehackernews.com — 03.09.2025 13:30
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The first email in this campaign was sent on August 19, 2025, from a legitimate address belonging to the Oman Ministry of Foreign Affairs in Paris, directed back at the organization.
First reported: 04.09.2025 09:001 source, 1 articleShow sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The emails were forwarded through a NordVPN exit node in Jordan to mask their origin.
First reported: 04.09.2025 09:001 source, 1 articleShow sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The emails included a blurred Word document attachment requiring users to enable macros to view it clearly.
First reported: 04.09.2025 09:001 source, 1 articleShow sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The document concealed malicious Visual Basic for Applications (VBA) macros, which, when enabled, executed a payload that gathered basic system information.
First reported: 04.09.2025 09:001 source, 1 articleShow sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The campaign targeted around four dozen embassies, consulates, and government ministries from nearly every corner of the earth.
First reported: 04.09.2025 09:001 source, 1 articleShow sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The attackers also targeted at least 10 other notable international organizations, including the United Nations, its Office on Drugs and Crime (UNODC), and its Children's Fund (UNICEF); the African Union; and humanitarian organizations like the Order of Malta.
First reported: 04.09.2025 09:001 source, 1 articleShow sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
The campaign is assessed to have likely concluded just days after it began, as the attackers' command-and-control (C2) infrastructure appears to be inactive.
First reported: 04.09.2025 09:001 source, 1 articleShow sources
- Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs — www.darkreading.com — 04.09.2025 09:00
-
Iranian state-sponsored threat actors, known as Subtle Snail, have conducted a series of attacks against 11 global telecommunications companies, satellite operators, and aerospace equipment manufacturers.
First reported: 19.09.2025 16:592 sources, 3 articlesShow sources
- Iranian State APT Blitzes Telcos & Satellite Companies — www.darkreading.com — 19.09.2025 16:59
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
Subtle Snail has been active for around four years, initially targeting a Bahrain-based IT integrator and later focusing on aerospace and defense firms.
First reported: 19.09.2025 16:592 sources, 2 articlesShow sources
- Iranian State APT Blitzes Telcos & Satellite Companies — www.darkreading.com — 19.09.2025 16:59
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
-
The group customizes each attack to target key personnel, such as IT administrators, researchers, and developers, using fake job openings on LinkedIn to lure victims.
First reported: 19.09.2025 16:592 sources, 3 articlesShow sources
- Iranian State APT Blitzes Telcos & Satellite Companies — www.darkreading.com — 19.09.2025 16:59
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
The malware used, MiniBike, is modular and highly customized, making it difficult for antivirus products to detect.
First reported: 19.09.2025 16:592 sources, 3 articlesShow sources
- Iranian State APT Blitzes Telcos & Satellite Companies — www.darkreading.com — 19.09.2025 16:59
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
The primary goals of the attacks are to gather information useful for research and development and to steal call data records (CDR) for international espionage.
First reported: 19.09.2025 16:592 sources, 2 articlesShow sources
- Iranian State APT Blitzes Telcos & Satellite Companies — www.darkreading.com — 19.09.2025 16:59
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
-
Subtle Snail is linked to Tortoiseshell and Charming Kitten, which are associated with Iran's Revolutionary Guard Corps (IRGC).
First reported: 19.09.2025 16:592 sources, 3 articlesShow sources
- Iranian State APT Blitzes Telcos & Satellite Companies — www.darkreading.com — 19.09.2025 16:59
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
The Iran-nexus cyber espionage group UNC1549, also known as Subtle Snail, has conducted a new campaign targeting European telecommunications companies, successfully infiltrating 34 devices across 11 organizations.
First reported: 19.09.2025 19:062 sources, 3 articlesShow sources
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The targeted companies are located in Canada, France, the United Arab Emirates, the United Kingdom, and the United States.
First reported: 19.09.2025 19:062 sources, 3 articlesShow sources
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The group operates by posing as HR representatives from legitimate entities to engage employees, then compromises them through deployment of a MINIBIKE backdoor variant.
First reported: 19.09.2025 19:062 sources, 3 articlesShow sources
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The MINIBIKE backdoor communicates with command-and-control (C2) infrastructure proxied through Azure cloud services to bypass detection.
First reported: 19.09.2025 19:062 sources, 3 articlesShow sources
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The group's primary motivation involves infiltrating telecommunications entities while maintaining interest in aerospace and defense organizations to establish long-term persistence and exfiltrate sensitive data for strategic espionage purposes.
First reported: 19.09.2025 19:062 sources, 3 articlesShow sources
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The attacks involve extensive reconnaissance on platforms like LinkedIn to identify key personnel within target organizations, specifically focusing on researchers, developers, and IT administrators with elevated access to critical systems and developer environments.
First reported: 19.09.2025 19:062 sources, 3 articlesShow sources
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The campaign is characterized by the meticulous efforts of Subtle Snail operators to tailor the attack for each victim, using job-themed lures and spear-phishing emails to validate email addresses and collect additional information.
First reported: 19.09.2025 19:062 sources, 3 articlesShow sources
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The malware used in the campaign includes a web browser stealer that incorporates a publicly available tool called Chrome-App-Bound-Encryption-Decryption to bypass app-bound encryption protections rolled out by Google.
First reported: 19.09.2025 19:062 sources, 3 articlesShow sources
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
MINIBIKE is a fully-featured, modular backdoor with support for 12 distinct commands to facilitate C2 communication, allowing it to enumerate files and directories, list running processes, terminate specific ones, upload files in chunks, and run various payloads.
First reported: 19.09.2025 19:062 sources, 3 articlesShow sources
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The malware makes Windows Registry modifications such that it's automatically loaded after system startup and features anti-debugging and anti-sandbox techniques to hinder analysis.
First reported: 19.09.2025 19:062 sources, 3 articlesShow sources
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The group uses predefined paths to guide their searches and focus on stealing emails, VPN configurations, and other information that helps them maintain control, as well as hunting for confidential files stored in shared folders.
First reported: 19.09.2025 19:062 sources, 3 articlesShow sources
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — thehackernews.com — 19.09.2025 19:06
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
Iranian cyber-espionage group Nimbus Manticore, also known as UNC1549 and Smoke Sandstorm, has expanded its operations to target critical infrastructure organizations across Western Europe, including Denmark, Portugal, and Sweden.
First reported: 23.09.2025 00:002 sources, 2 articlesShow sources
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The group uses sophisticated malware variants, including MiniJunk and MiniBrowse, to gain persistent access to infected systems and steal credentials from Chrome and Edge browsers.
First reported: 23.09.2025 00:002 sources, 2 articlesShow sources
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
MiniJunk is an advanced version of the Minibike backdoor, featuring improved obfuscation techniques, code signing, and multiple C2 servers to evade detection.
First reported: 23.09.2025 00:002 sources, 2 articlesShow sources
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The malware employs multi-stage sideloading to install and establish persistence on victim systems, leveraging fake job-related login pages and tailored spear-phishing emails.
First reported: 23.09.2025 00:002 sources, 2 articlesShow sources
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
Nimbus Manticore has been active since at least 2022, targeting aerospace and defense sectors in Israel and the Middle East, and is associated with the Iranian Revolutionary Guard Corps (IRGC).
First reported: 23.09.2025 00:002 sources, 3 articlesShow sources
- Iran-Linked Hackers Target Europe With New Malware — www.darkreading.com — 23.09.2025 00:00
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
Iranian state-sponsored threat actor APT42 has been observed targeting individuals and organizations of interest to the Islamic Revolutionary Guard Corps (IRGC) as part of a new espionage-focused campaign codenamed SpearSpecter.
First reported: 14.11.2025 16:401 source, 1 articleShow sources
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
The campaign, detected in early September 2025 and assessed to be ongoing, systematically targets high-value senior defense and government officials using personalized social engineering tactics.
First reported: 14.11.2025 16:401 source, 1 articleShow sources
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
The campaign extends to the targets' family members, creating a broader attack surface that exerts more pressure on the primary targets.
First reported: 14.11.2025 16:401 source, 1 articleShow sources
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
APT42 is known for its ability to mount convincing social engineering campaigns that can run for days or weeks to build trust with the targets before sending a malicious payload or tricking them into clicking on booby-trapped links.
First reported: 14.11.2025 16:401 source, 1 articleShow sources
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
The SpearSpecter campaign is carried out by cluster D of APT42, which focuses more on malware-based operations, while another campaign detailed by Check Point was carried out by cluster B of the same group, which focuses more on credential harvesting.
First reported: 14.11.2025 16:401 source, 1 articleShow sources
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
The campaign involves impersonating trusted WhatsApp contacts to send a malicious link to a supposed required document for an upcoming meeting or conference.
First reported: 14.11.2025 16:401 source, 1 articleShow sources
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
When the link is clicked, it initiates a redirect chain to serve a WebDAV-hosted Windows shortcut (LNK) masquerading as a PDF file by taking advantage of the "search-ms:" protocol handler.
First reported: 14.11.2025 16:401 source, 1 articleShow sources
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
The LNK file establishes contact with a Cloudflare Workers subdomain to retrieve a batch script that functions as a loader for TAMECAT, a known PowerShell backdoor.
First reported: 14.11.2025 16:401 source, 1 articleShow sources
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
TAMECAT employs various modular components to facilitate data exfiltration and remote control, using HTTPS, Discord, and Telegram for command-and-control (C2).
First reported: 14.11.2025 16:401 source, 1 articleShow sources
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
The PowerShell framework uses three distinct channels for C2, suggesting the threat actor's goal of maintaining persistent access to compromised hosts even if one pathway gets detected and blocked.
First reported: 14.11.2025 16:401 source, 1 articleShow sources
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
TAMECAT comes equipped with features to conduct reconnaissance, harvest files matching certain extensions, steal data from web browsers like Google Chrome and Microsoft Edge, collect Outlook mailboxes, and take screenshots at 15-second intervals.
First reported: 14.11.2025 16:401 source, 1 articleShow sources
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
The data is exfiltrated over HTTPS or FTP, and the malware adopts various stealthy techniques to evade detection and resist analysis efforts.
First reported: 14.11.2025 16:401 source, 1 articleShow sources
- Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets — thehackernews.com — 14.11.2025 16:40
-
UNC1549 (aka Nimbus Manticore or Subtle Snail) has been observed deploying backdoors like TWOSTROKE and DEEPROOT in attacks targeting aerospace, aviation, and defense industries in the Middle East.
First reported: 18.11.2025 14:541 source, 1 articleShow sources
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
UNC1549 has been active since late 2023 through 2025, employing sophisticated initial access vectors including abuse of third-party relationships, VDI breakouts, and highly targeted phishing.
First reported: 18.11.2025 14:541 source, 1 articleShow sources
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The group uses a combination of phishing campaigns and leveraging trusted relationships with third-party suppliers and partners to gain initial access.
First reported: 18.11.2025 14:541 source, 1 articleShow sources
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
UNC1549 abuses credentials associated with services like Citrix, VMWare, and Azure Virtual Desktop and Application (VDA) to establish an initial foothold and break out of virtualized sessions.
First reported: 18.11.2025 14:541 source, 1 articleShow sources
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The group targets IT staff and administrators to obtain credentials with elevated privileges for deeper network access.
First reported: 18.11.2025 14:541 source, 1 articleShow sources
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
Post-exploitation activities include reconnaissance, credential harvesting, lateral movement, defense evasion, and information theft, focusing on network/IT documentation, intellectual property, and emails.
First reported: 18.11.2025 14:541 source, 1 articleShow sources
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
Custom tools used by UNC1549 include MINIBIKE, TWOSTROKE, DEEPROOT, LIGHTRAIL, GHOSTLINE, POLLBLEND, DCSYNCER.SLICK, CRASHPAD, SIGHTGRAB, and TRUSTTRAP.
First reported: 18.11.2025 14:541 source, 1 articleShow sources
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The group uses publicly available programs like AD Explorer, Atelier Web Remote Commander (AWRC), and SCCMVNC for remote control and reconnaissance.
First reported: 18.11.2025 14:541 source, 1 articleShow sources
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
UNC1549 maintains stealth and command-and-control (C2) using extensive reverse SSH shells and domains mimicking the victim's industry.
First reported: 18.11.2025 14:541 source, 1 articleShow sources
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
The group plants backdoors that beacon silently for months, only activating them to regain access after the victim has attempted eradication.
First reported: 18.11.2025 14:541 source, 1 articleShow sources
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks — thehackernews.com — 18.11.2025 14:54
-
Iranian threat actors engaged in cyber warfare to facilitate and enhance physical, real-world attacks, a trend known as cyber-enabled kinetic targeting.
First reported: 20.11.2025 09:354 sources, 4 articlesShow sources
- Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt — thehackernews.com — 20.11.2025 09:35
- Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers — www.infosecurity-magazine.com — 04.03.2026 17:00
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
Imperial Kitten, an Iranian-affiliated hacking group, conducted digital reconnaissance targeting a ship's Automatic Identification System (AIS) platform between December 2021 and January 2024.
First reported: 20.11.2025 09:353 sources, 3 articlesShow sources
- Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt — thehackernews.com — 20.11.2025 09:35
- Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers — www.infosecurity-magazine.com — 04.03.2026 17:00
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Imperial Kitten attacked additional maritime vessel platforms, gaining access to CCTV cameras on a maritime vessel for real-time visual intelligence.
First reported: 20.11.2025 09:353 sources, 3 articlesShow sources
- Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt — thehackernews.com — 20.11.2025 09:35
- Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers — www.infosecurity-magazine.com — 04.03.2026 17:00
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
On January 27, 2024, Imperial Kitten carried out targeted searches for AIS location data for a specific shipping vessel, which was later targeted by an unsuccessful missile strike by Iranian-backed Houthi militants.
First reported: 20.11.2025 09:352 sources, 2 articlesShow sources
- Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt — thehackernews.com — 20.11.2025 09:35
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
MuddyWater, an Iranian threat actor, established infrastructure for a cyber network operation in May 2025 and used it to access live CCTV streams from Jerusalem to gather real-time visual intelligence.
First reported: 20.11.2025 09:353 sources, 3 articlesShow sources
- Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt — thehackernews.com — 20.11.2025 09:35
- Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers — www.infosecurity-magazine.com — 04.03.2026 17:00
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Iranian threat actors routed their traffic through anonymizing VPN services to obscure their origins and complicate attribution efforts.
First reported: 20.11.2025 09:353 sources, 3 articlesShow sources
- Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt — thehackernews.com — 20.11.2025 09:35
- Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers — www.infosecurity-magazine.com — 04.03.2026 17:00
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Nation-state actors are combining digital reconnaissance with physical attacks, dissolving the traditional boundaries between cyber and kinetic operations.
First reported: 20.11.2025 09:353 sources, 4 articlesShow sources
- Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt — thehackernews.com — 20.11.2025 09:35
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
- Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers — www.infosecurity-magazine.com — 04.03.2026 17:00
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Iranian regime actors and proxies are increasingly using destructive 'wiper' attacks, aiming to do more than just steal data and money, potentially leading to complete network loss.
First reported: 22.06.2019 15:003 sources, 3 articlesShow sources
- CISA Statement on Iranian Cybersecurity Threats — www.cisa.gov — 22.06.2019 15:00
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
The attacks are enabled through tactics such as spear phishing, password spraying, and credential stuffing, often starting with account compromise and escalating to full network destruction.
First reported: 22.06.2019 15:003 sources, 3 articlesShow sources
- CISA Statement on Iranian Cybersecurity Threats — www.cisa.gov — 22.06.2019 15:00
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
CISA emphasizes the importance of shoring up basic defenses, such as using multi-factor authentication, and urges immediate reporting of suspected incidents to [email protected].
First reported: 22.06.2019 15:003 sources, 4 articlesShow sources
- CISA Statement on Iranian Cybersecurity Threats — www.cisa.gov — 22.06.2019 15:00
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
- Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel — www.infosecurity-magazine.com — 02.03.2026 17:45
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
Iran's internet connectivity dropped to approximately 4% of normal levels following joint Israeli-US strikes on February 28, 2026, severely affecting government services, official media, energy, and aviation sectors.
First reported: 02.03.2026 17:001 source, 1 articleShow sources
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
-
Over 150 hacktivist incidents—including DDoS attacks, website defacements, and unverified data breach claims—were recorded between February 28 and March 1, 2026, targeting government, banking, aviation, and telecom sectors.
First reported: 02.03.2026 17:002 sources, 2 articlesShow sources
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
-
Iranian-aligned hacktivist groups, including Handala and ransomware group Sicarii, were observed escalating operations in response to the strikes, with calls to action from the DDoS botnet HydraC2.
First reported: 02.03.2026 17:002 sources, 2 articlesShow sources
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
-
The UK NCSC warned of heightened *indirect* cyber risks for organizations with offices or supply chains in the Middle East, though no significant change in direct threat to the UK was observed as of March 2, 2026.
First reported: 02.03.2026 17:003 sources, 4 articlesShow sources
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
- Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel — www.infosecurity-magazine.com — 02.03.2026 17:45
- UK warns of Iranian cyberattack risks amid Middle-East conflict — www.bleepingcomputer.com — 02.03.2026 17:54
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
-
Iranian cyber retaliation is expected to leverage ransomware-as-a-smokescreen tactics, including deploying ransomware before wiping data, hiding behind fictitious cybercriminal personas, and combining long-term espionage access with destructive attacks.
First reported: 02.03.2026 17:003 sources, 5 articlesShow sources
- Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity — www.infosecurity-magazine.com — 02.03.2026 17:00
- Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel — www.infosecurity-magazine.com — 02.03.2026 17:45
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
- Iran-Linked Pay2Key Ransomware Group Re-Emerges — www.infosecurity-magazine.com — 26.03.2026 12:45
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
Google Threat Intelligence Group (GTIG) warns of imminent Iranian cyber retaliation against a broad range of targets in the Middle East and globally, following joint US-Israeli military strikes.
First reported: 02.03.2026 17:452 sources, 2 articlesShow sources
- Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel — www.infosecurity-magazine.com — 02.03.2026 17:45
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
-
Iranian cyber operations are expected to leverage hacktivist and ransomware groups as fronts for state-backed attacks, blurring the lines between criminal and nation-state activity.
First reported: 02.03.2026 17:453 sources, 4 articlesShow sources
- Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel — www.infosecurity-magazine.com — 02.03.2026 17:45
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
- Iran-Linked Pay2Key Ransomware Group Re-Emerges — www.infosecurity-magazine.com — 26.03.2026 12:45
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
John Hultquist (GTIG) emphasizes that Iran will exploit a significantly expanded attack surface, targeting countries with less mature cybersecurity defenses than Israel, including GCC members hosting US military bases (Qatar, Bahrain, Jordan, UAE, Kuwait).
First reported: 02.03.2026 17:452 sources, 2 articlesShow sources
- Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel — www.infosecurity-magazine.com — 02.03.2026 17:45
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
-
The UK NCSC reiterates calls for organizations with Middle East operations to urgently review cybersecurity postures, anticipating indirect risks from Iranian retaliation.
First reported: 02.03.2026 17:453 sources, 3 articlesShow sources
- Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel — www.infosecurity-magazine.com — 02.03.2026 17:45
- UK warns of Iranian cyberattack risks amid Middle-East conflict — www.bleepingcomputer.com — 02.03.2026 17:54
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
-
The UK NCSC warns that Iranian state and Iran-linked cyber actors almost certainly maintain at least some capability to conduct cyber activity despite widespread internet blackouts in Iran.
First reported: 02.03.2026 17:542 sources, 2 articlesShow sources
- UK warns of Iranian cyberattack risks amid Middle-East conflict — www.bleepingcomputer.com — 02.03.2026 17:54
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
-
UK organizations are advised to prepare for potential Iranian cyberattacks by reviewing guidance on DDoS attacks, phishing activity, and ICS targeting, particularly those with assets or supply chains in areas of regional tensions.
First reported: 02.03.2026 17:541 source, 1 articleShow sources
- UK warns of Iranian cyberattack risks amid Middle-East conflict — www.bleepingcomputer.com — 02.03.2026 17:54
-
The NCSC emphasizes the need for organizations to prioritize and strengthen their cybersecurity posture immediately, given the rapidly evolving situation in the Middle East.
First reported: 02.03.2026 17:542 sources, 2 articlesShow sources
- UK warns of Iranian cyberattack risks amid Middle-East conflict — www.bleepingcomputer.com — 02.03.2026 17:54
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
-
The UK warning follows a June 2025 advisory from the U.S. Department of Homeland Security, which highlighted escalating cyberattack risks from Iran-backed hacking groups and pro-Iranian hacktivists.
First reported: 02.03.2026 17:541 source, 1 articleShow sources
- UK warns of Iranian cyberattack risks amid Middle-East conflict — www.bleepingcomputer.com — 02.03.2026 17:54
-
The surge in exploitation attempts against Hikvision and Dahua surveillance cameras began intensifying on February 28, 2026, targeting Israel, Qatar, Bahrain, Kuwait, the UAE, Cyprus, and parts of Lebanon.
First reported: 04.03.2026 17:002 sources, 2 articlesShow sources
- Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers — www.infosecurity-magazine.com — 04.03.2026 17:00
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
The campaign leveraged commercial VPN exit nodes (Mullvad, ProtonVPN, Surfshark, NordVPN) and VPS infrastructure linked to multiple Iran-aligned threat actors.
First reported: 04.03.2026 17:002 sources, 2 articlesShow sources
- Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers — www.infosecurity-magazine.com — 04.03.2026 17:00
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Exploited vulnerabilities included CVE-2021-33044 and CVE-2017-7921, both of which have available patches but remain widely unpatched in deployed devices.
First reported: 04.03.2026 17:002 sources, 2 articlesShow sources
- Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers — www.infosecurity-magazine.com — 04.03.2026 17:00
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
The activity aligns with Iran’s military doctrine of using compromised cameras for operational planning and battle damage assessment, mirroring tactics observed during the June 2025 Israel-Iran conflict.
First reported: 04.03.2026 17:002 sources, 2 articlesShow sources
- Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers — www.infosecurity-magazine.com — 04.03.2026 17:00
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Check Point Research (CPR) identified prior scanning waves on January 14–15 and January 24, coinciding with geopolitical tensions, including Iran’s temporary airspace closure and a US Central Command visit to Israel.
First reported: 04.03.2026 17:002 sources, 2 articlesShow sources
- Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers — www.infosecurity-magazine.com — 04.03.2026 17:00
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Defenders are advised to eliminate public WAN exposure for cameras, enforce strong credentials, segment camera networks on dedicated VLANs, and monitor for unusual login attempts and outbound connections.
First reported: 04.03.2026 17:001 source, 1 articleShow sources
- Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers — www.infosecurity-magazine.com — 04.03.2026 17:00
-
149 hacktivist DDoS attacks targeted 110 organizations across 16 countries between February 28 and March 2, 2026, with 70% of activity driven by Keymous+ and DieNet.
First reported: 04.03.2026 19:212 sources, 2 articlesShow sources
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Kuwait (28%), Israel (27.1%), and Jordan (21.5%) were the most targeted nations in the Middle East, accounting for 76.6% of regional attack claims.
First reported: 04.03.2026 19:212 sources, 2 articlesShow sources
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Pro-Russian hacktivist groups Cardinal and Russian Legion claimed breaches of Israeli military networks, including the Iron Dome missile defense system.
First reported: 04.03.2026 19:212 sources, 2 articlesShow sources
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
An SMS phishing campaign used a rogue replica of Israel’s RedAlert application to deliver mobile surveillance malware, exploiting wartime urgency to sideload malicious APKs.
First reported: 04.03.2026 19:211 source, 1 articleShow sources
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
-
Iran’s IRGC targeted Saudi Aramco and an AWS data center in the U.A.E. to maximize global economic disruption as retaliation for military losses.
First reported: 04.03.2026 19:212 sources, 2 articlesShow sources
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Cotton Sandstorm (aka Haywire Kitten) revived its old persona, Altoufan Team, to claim hacks of Bahraini websites, signaling reactive campaign escalation.
First reported: 04.03.2026 19:212 sources, 2 articlesShow sources
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
UNC1549 (Nimbus Manticore/Subtle Snail) ranked as the fourth most active threat actor in H2 2025, focusing on defense, aerospace, telecommunications, and regional governments.
First reported: 04.03.2026 19:212 sources, 2 articlesShow sources
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Major Iranian cryptocurrency exchanges adjusted operations (suspended/batched withdrawals) and warned users of potential connectivity disruptions amid sanctions evasion stress tests.
First reported: 04.03.2026 19:211 source, 1 articleShow sources
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
-
Sophos assessed the surge in hacktivist activity as high-volume but low-risk, primarily involving DDoS, defacements, and unverified claims from pro-Iran personas like Handala Hack and APT Iran.
First reported: 04.03.2026 19:211 source, 1 articleShow sources
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
-
CrowdStrike noted Iranian adversaries expanding tradecraft into cloud and identity-focused operations, enabling rapid, large-scale hybrid environment attacks.
First reported: 04.03.2026 19:212 sources, 2 articlesShow sources
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict — thehackernews.com — 04.03.2026 19:21
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Iran's cyber-kinetic doctrine integrates IP camera compromises for real-time operational support and battle damage assessment, with targeting patterns observed before and after the February 28, 2026, US-Israel strikes, including specific areas in Lebanon and prior activity in January 2026 anticipating US military action.
First reported: 06.03.2026 16:011 source, 1 articleShow sources
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
The IP camera attacks exploit five distinct vulnerabilities: CVE-2017-7921, CVE-2021-36260, CVE-2023-6895 (Hikvision), and CVE-2025-34067, CVE-2021-33044 (Dahua), all of which have available patches but remain widely unpatched in deployed devices.
First reported: 06.03.2026 16:011 source, 1 articleShow sources
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Check Point Research assesses that tracking Iranian IP camera-targeting activity from attributed infrastructures may serve as an early indicator of potential follow-on kinetic missile strikes.
First reported: 06.03.2026 16:011 source, 1 articleShow sources
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Pro-Iranian actors breached the Jordan Silos and Supply General Company via phishing, demonstrating logistics sabotage as part of the broader cyber-kinetic campaign.
First reported: 06.03.2026 16:011 source, 1 articleShow sources
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
CrowdStrike observed muted but targeted IRGC-linked cyberattacks, including a surge in pro-Iranian Russian hacktivism targeting ICS, SCADA systems, and CCTV networks of US-based entities, coinciding with Operation Epic Fury.
First reported: 06.03.2026 16:012 sources, 2 articlesShow sources
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
Flashpoint identified ongoing Iranian propaganda campaigns, missile strikes against data centers, and government entity targeting with DDoS attacks in the UAE and Bahrain as part of the retaliatory operations.
First reported: 06.03.2026 16:011 source, 1 articleShow sources
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Alexander Leslie (Recorded Future) characterizes Iran’s strategy as an integrated campaign sequencing kinetic operations, cyber effects, psychological operations, and economic coercion to impose costs across domains and stretch adversary defenses.
First reported: 06.03.2026 16:011 source, 1 articleShow sources
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Kathryn Raines (Flashpoint) asserts that the blend of cyber and kinetic tactics in the Middle East conflict represents the new blueprint for modern warfare, where cyber operations shape the physical battlespace with low-cost, high-impact methods.
First reported: 06.03.2026 16:011 source, 1 articleShow sources
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Adam Meyers (CrowdStrike) warns that while current IRGC-linked cyberattacks are limited in scope, Western organizations should prepare for potential escalation beyond hacktivism into destructive operations as the conflict continues.
First reported: 06.03.2026 16:011 source, 1 articleShow sources
- Iran's Cyber-Kinetic War Doctrine Takes Shape — www.darkreading.com — 06.03.2026 16:01
-
Pay2Key, an Iranian-linked ransomware group active since 2020, has re-emerged with enhanced evasion, execution, and anti-forensics capabilities, coinciding with escalated US-Iran tensions in early 2026.
First reported: 26.03.2026 12:451 source, 1 articleShow sources
- Iran-Linked Pay2Key Ransomware Group Re-Emerges — www.infosecurity-magazine.com — 26.03.2026 12:45
-
In a March 2026 attack on a US healthcare provider, Pay2Key used TeamViewer for interactive network access, harvested credentials via Mimikatz/LaZagne/ExtPassword, and enumerated backups (IBackup, Barracuda Yosemite, Windows Server Backup) before deploying ransomware via a 7zip SFX archive (abc.exe).
First reported: 26.03.2026 12:451 source, 1 articleShow sources
- Iran-Linked Pay2Key Ransomware Group Re-Emerges — www.infosecurity-magazine.com — 26.03.2026 12:45
-
The group deployed a 'No Defender' evasion toolkit, which was later removed to obscure forensic traces, and encrypted the victim’s entire infrastructure within three hours, with no evidence of data exfiltration—suggesting deliberate destruction of evidence.
First reported: 26.03.2026 12:451 source, 1 articleShow sources
- Iran-Linked Pay2Key Ransomware Group Re-Emerges — www.infosecurity-magazine.com — 26.03.2026 12:45
-
Pay2Key’s operational ties to Iran remain debated: while its 2025 attacks aligned with US missile strikes and it has received over $8M in ransoms from 170 victims, its attempted sale in late 2025 and links to Russian-speaking actors on criminal forums raise questions about current ownership and control.
First reported: 26.03.2026 12:451 source, 1 articleShow sources
- Iran-Linked Pay2Key Ransomware Group Re-Emerges — www.infosecurity-magazine.com — 26.03.2026 12:45
-
Analysts assess Pay2Key as an unpredictable, politically motivated threat that may prioritize strategic destruction over financial gain, particularly during geopolitical tensions, warranting heightened monitoring by defenders.
First reported: 26.03.2026 12:451 source, 1 articleShow sources
- Iran-Linked Pay2Key Ransomware Group Re-Emerges — www.infosecurity-magazine.com — 26.03.2026 12:45
-
Iranian-affiliated APT actors are targeting internet-exposed Rockwell/Allen-Bradley PLCs in U.S. critical infrastructure sectors, including Government Services and Facilities, Water and Wastewater Systems, and Energy, since March 2026.
First reported: 07.04.2026 21:021 source, 1 articleShow sources
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
The ongoing attacks have resulted in financial losses and operational disruptions, with confirmed extraction of PLC project files and manipulation of data displayed on HMI and SCADA systems.
First reported: 07.04.2026 21:021 source, 1 articleShow sources
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
The FBI assesses that the escalation in targeting U.S. organizations is likely a response to geopolitical hostilities between Iran, the United States, and Israel.
First reported: 07.04.2026 21:021 source, 1 articleShow sources
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
The joint advisory from FBI, CISA, NSA, EPA, DOE, and U.S. Cyber Command CNMF links the activity to the same tactics used by CyberAv3ngers in 2023–2024, which compromised 75 Unitronics PLCs, half of which were in Water and Wastewater Systems (WWS) networks.
First reported: 07.04.2026 21:021 source, 1 articleShow sources
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
-
In March 2026, the pro-Palestinian Handala hacktivist group wiped approximately 80,000 devices on the network of U.S. medical giant Stryker, including employees' mobile devices and company-managed personal computers.
First reported: 07.04.2026 21:021 source, 1 articleShow sources
- US warns of Iranian hackers targeting critical infrastructure — www.bleepingcomputer.com — 07.04.2026 21:02
Similar Happenings
Ransomware Attacks Decline in France in 2025, ANSSI Reports
France's National Cybersecurity Agency (ANSSI) reported a decline in ransomware attacks in 2025, attributing the drop to successful preventive interventions and law enforcement operations. Despite the decrease, ransomware remains a significant threat, particularly targeting SMBs, healthcare, and education sectors. The most prevalent ransomware strains observed were Qilin, Akira, and LockBit 3.0/LockBit Black. ANSSI also noted a rise in data exfiltration incidents and a drop in DDoS attacks. The agency highlighted the increasing overlap between nation-state groups and cybercriminals, complicating attribution efforts. Vincent Strubel, ANSSI’s director general, warned of potential hybrid attacks on critical infrastructure by 2030.
Iranian Hacktivist Group Claims Wiper Attack on Stryker
The Iranian hacktivist group Handala—linked to Iran’s Ministry of Intelligence and Security (MOIS)—conducted a destructive wiper attack against Stryker, a U.S. Fortune 500 medical technology company, on March 11, 2026. The attack affected over 200,000 systems across 79 countries, disrupted operations in Ireland, and sent over 5,000 workers home. Handala claimed responsibility, citing retaliation for a U.S. missile strike. The attack leveraged Microsoft Intune to issue remote wipe commands and defaced Stryker’s Entra login page. Stryker confirmed the incident in an SEC filing and reported no evidence of data exfiltration. Recovery efforts prioritized restoring supply-chain systems. In a separate but related development, Handala breached the personal email account of FBI Director Kash Patel on March 28, 2026, and leaked historical emails from 2010 and 2019. The FBI acknowledged the targeting and stated the leaked data was not government-related. Handala operates under multiple monikers, including Banished Kitten and Void Manticore, and has integrated criminal tools such as Rhadamanthys stealer to enhance its operations. The group’s activities align with broader Iranian cyber operations targeting Western entities amid heightened geopolitical tensions, including destructive attacks, hack-and-leak campaigns, and psychological influence operations. U.S. authorities have seized multiple domains linked to Handala and offered a $10 million reward for information on group members.
RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App
A new mobile espionage campaign, dubbed RedAlert, targets civilians during the Israel-Iran conflict by distributing a trojanized version of Israel's official Red Alert rocket warning app. The malicious app mimics the legitimate application, delivering real alerts while running a surveillance payload in the background. The malware aggressively requests high-risk permissions, including access to SMS messages, contacts, and precise GPS location data. It uses sophisticated anti-detection techniques to evade standard integrity checks and conceal secondary payloads. The campaign poses strategic and physical security risks, including the potential exposure of civilian shelter locations and the bypassing of two-factor authentication (2FA).
Drone Strikes Damage AWS Data Centers in Middle East
Drone strikes have damaged three AWS data centers in the UAE and one in Bahrain, causing extensive outages across multiple cloud services. The attacks are suspected to be part of Iran's response to recent U.S. and Israeli strikes in the Middle East. The incidents have disrupted the AWS Middle East (UAE) Region (ME-CENTRAL-1) and the AWS Middle East (Bahrain) Region (ME-SOUTH-1), with significant structural and power infrastructure damage reported. Amazon is working on recovery efforts, including restoring physical infrastructure and implementing software-based recovery paths. Customers are advised to back up data and migrate workloads to unaffected regions.
Iran-linked Dust Specter Targets Iraqi Officials with AI-Assisted Malware
An Iran-linked cyber threat actor, Dust Specter, has been targeting Iraqi government officials using AI-powered tools and previously undocumented malware. The campaign, detected in January 2026, involves impersonating the Iraqi Ministry of Foreign Affairs and compromising government infrastructure to host malicious payloads. The attack chains include the use of SplitDrop, TwinTask, TwinTalk, and GhostForm malware, with TwinTalk also linked to a previous campaign in July 2025. The campaign employs advanced techniques such as randomly generated URI paths for C2 communication, geofencing, and User-Agent verification. The use of compromised Iraqi government infrastructure and AI-assisted malware development highlights the sophistication of the attack.