Skip to main content
Mallory

Iranian Cyber Operations Shift Toward Identity Abuse and Broader Hybrid Targeting

state-sponsored-espionagefinancial-sector-threatcredential-access-methodcritical-infrastructure-threatembedded-device-vulnerability
Updated April 28, 2026 at 06:02 PM12 sources
Share:
Iranian Cyber Operations Shift Toward Identity Abuse and Broader Hybrid Targeting

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Iranian state-aligned and affiliated cyber activity has expanded beyond traditional disruptive malware into a broader campaign of hybrid operations that combines espionage, reconnaissance, credential abuse, and destructive effects. Reporting describes a tactical shift from bespoke wipers toward living-off-the-land methods, including the compromise of highly privileged identities and the use of legitimate enterprise administration capabilities to issue remote-wipe actions at scale. At the same time, Iranian operators and aligned personas have been linked to sustained access into US organizations in sectors including banking, aviation, defense-adjacent industries, and healthcare, while also targeting internet-connected surveillance infrastructure in the Middle East for intelligence collection and battlefield awareness.

The activity is unfolding alongside a wider surge in hostile traffic associated with the regional conflict, with major increases in infrastructure scanning, automated reconnaissance, credential harvesting, and DDoS preparation against critical businesses, especially banking and fintech. One report highlights Handala/Void Manticore as emblematic of the disruptive trend, while another ties MuddyWater to persistent footholds in US networks and notes exploitation of camera vulnerabilities such as CVE-2017-7921 and CVE-2021-33044. Together, the reporting indicates that Iranian cyber operations remain active and adaptive, using proxy infrastructure, compromised identities, and exposed edge devices to sustain pressure on commercial and strategic targets without relying solely on custom malware.

Timeline

  1. Apr 17, 2026

    MuddyWater-linked campaign hits Middle East critical sectors

    By 2026-04-17, a multi-stage campaign with tradecraft consistent with MuddyWater was reported targeting Middle Eastern aviation, energy, and government organizations. The activity combined large-scale vulnerability scanning, credential harvesting, and confirmed data exfiltration, indicating successful follow-on intrusions beyond reconnaissance.

  2. Mar 23, 2026

    Check Point reports Iran-linked M365 password-spraying campaign

    On 2026-03-23, suspected Iran-linked operators were assessed to have conducted three waves of password-spraying attacks against Microsoft 365 accounts at hundreds of organizations, with the heaviest targeting against municipalities in Israel and additional victims in the UAE. Check Point said the activity also hit technology, transportation, logistics, healthcare, and manufacturing organizations, and may have supported Iranian kinetic operations by enabling post-strike bomb-damage assessment.

  3. Mar 16, 2026

    Unit 42 reports Handala-style remote wipe of 200,000+ devices

    On March 16, 2026, Palo Alto Networks Unit 42 described a recent operation under the Void Manticore/Handala persona in which attackers allegedly compromised highly privileged identities and issued legitimate remote-wipe commands to more than 200,000 devices globally. The report framed this as part of a broader shift in Iranian state-aligned operations from custom wipers to identity abuse and enterprise management platform misuse.

  4. Mar 16, 2026

    Akamai observes cybercrime surge after start of Iran war

    After the start of the Iran war, Akamai reported overall malicious cyber activity rose 245 percent, with banks, fintech and other critical businesses heavily targeted. The most common activity included infrastructure scanning, botnet-driven discovery, automated reconnaissance, credential harvesting and reconnaissance preceding DDoS attacks.

  5. Mar 11, 2026

    Handala allegedly abuses Intune to attack Stryker

    On March 11–12, 2026, Handala allegedly used pre-existing access and abused Microsoft Intune remote-wipe functionality in an attack on Stryker. The incident was cited as an example of Iranian-aligned operators activating previously established access for disruptive effect.

  6. Jan 1, 2026

    Handala claims destructive attack on Stryker

    In early 2026, the Iran-aligned hacktivist group Handala claimed responsibility for a destructive attack on medical technology company Stryker. The claimed operation involved large-scale data theft and system wiping.

  7. Jan 1, 2026

    Iran-linked infrastructure exploits Hikvision and Dahua cameras

    In early 2026, Iran-linked infrastructure was observed exploiting internet-connected Hikvision and Dahua surveillance cameras across the Middle East. The activity was described as supporting intelligence, surveillance and reconnaissance during regional hostilities and battlefield awareness.

  8. Jan 1, 2026

    MuddyWater maintains footholds in U.S. and Canadian organizations

    In early 2026, Iran-linked operators associated with MuddyWater were reported to have maintained covert access in multiple organizations in the United States and Canada. Affected sectors included banking, aviation, defense-related entities and other organizations, with malware such as Dindoor, Fakeset, Stagecomp and Darkcomp used for persistence and possible data exfiltration.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Iranian MOIS-Linked Threat Actors Increasingly Leverage Cybercrime Tools and Infrastructure

Iranian MOIS-Linked Threat Actors Increasingly Leverage Cybercrime Tools and Infrastructure

Check Point Research reported that **Iranian Ministry of Intelligence and Security (MOIS)-linked actors** are increasingly moving beyond simply *posing* as cybercriminals and are instead **directly engaging with the cybercrime ecosystem**—using criminal tooling, services, and operational models to support state objectives while complicating attribution. The activity is highlighted in operations tied to **Void Manticore** (including the *Handala Hack* persona) and **MuddyWater**, where researchers observed repeated overlaps with criminal tools and infrastructure, suggesting an affiliate-style or service-consumption model that improves resilience and capability. Reporting on the research noted that **Void Manticore** has incorporated the commercially sold infostealer **Rhadamanthys** (marketed on cybercrime forums) into campaigns, including phishing activity targeting Israeli entities; the infostealer has been paired with custom wipers and lure themes such as impersonated **F5 updates** and even messages spoofing the **Israeli National Cyber Directorate (INCD)**. The same coverage reiterated that **MuddyWater** continues MOIS-aligned espionage activity and is also associated with cybercrime-style tooling and services, reinforcing the assessment that Iranian state operators are increasingly blending state tradecraft with criminal malware, infrastructure, and monetized services rather than relying solely on false-flag “ransomware” or hacktivist branding.

2 weeks ago
Geopolitically driven cyber activity surges following Operation Epic Fury

Geopolitically driven cyber activity surges following Operation Epic Fury

Iran-linked threat actors escalated from espionage to **disruptive and destructive operations** in the wake of the US/Israel military campaign dubbed **Operation Epic Fury**, with reporting describing a coordinated hybrid offensive against Western, Israeli, and regional economic and critical infrastructure targets. Tenable assessed **MOIS-affiliated** groups as increasingly masking activity behind cybercriminal infrastructure to complicate attribution, and highlighted a notable rise in Iranian-nexus targeting of **internet-connected IP cameras** using known, exploitable vulnerabilities; the same reporting pointed to increased activity from **MuddyWater** and the **Void Manticore/Handala** persona, including indications of pre-positioned access ahead of the kinetic operations. Separate threat-intelligence reporting described **China-nexus** actors rapidly pivoting in the same geopolitical window, including activity against **Qatari entities** shortly after the initial strikes: **Camaro Dragon** attempted to deploy a **PlugX** variant using conflict-themed lures, and another intrusion attempt used **DLL hijacking** to deliver **Cobalt Strike**, consistent with China-aligned tradecraft. Other items in the set cover unrelated campaigns and incidents—an exposed **APT28** Roundcube exploitation toolkit targeting Ukrainian government mail infrastructure, a pro-Russian **NoName057(16)** DDoS campaign heavily targeting German and Israeli public-sector and commercial services, a Russian-speaking **BlackSanta** BYOVD “EDR killer” delivered via HR-themed lures and steganographic images, and a weekly bulletin summarizing multiple breaches (e.g., AkzoNobel, LexisNexis, Wikimedia, TriZetto)—and do not materially add to the Operation Epic Fury–linked escalation narrative.

1 months ago
Iran-Linked Cyber Activity Escalates Amid Middle East Conflict

Iran-Linked Cyber Activity Escalates Amid Middle East Conflict

Iran-nexus cyber activity intensified alongside regional military escalation, with multiple reporting streams describing both opportunistic and targeted operations. Check Point Research observed a coordinated campaign to compromise internet-connected **IP cameras** across Israel, the UAE, Qatar, Bahrain, Kuwait, Lebanon, and Cyprus, with spikes in exploitation attempts aligning to geopolitical events; activity was traced to infrastructure linked to Iran-nexus actors using commercial VPN exit nodes (e.g., *Mullvad*, *ProtonVPN*, *Surfshark*, *NordVPN*) and VPS infrastructure to mask origin, and the most targeted vendors were **Hikvision** and **Dahua**. Separately, Symantec reported **Seedworm** (*MuddyWater/Temp Zagros/Static Kitten*) activity on multiple U.S. and Canadian organizations beginning in February 2026, including a U.S. bank, airport, non-profit, and the Israeli operations of a U.S. software supplier to defense/aerospace; Symantec identified a previously unknown backdoor dubbed **Dindoor** (leveraging the *Deno* runtime) and a Python backdoor **Fakeset**, with malware signed using certificates issued to “**Amy Cherne**” (and in some cases “**Donald Gay**”), and noted attempted data exfiltration using **Rclone** to a *Wasabi* cloud storage bucket. Additional coverage indicates broader pro-Iranian cyber activity but is less specific to the above intrusions. ASEC’s weekly “Ransom & Dark Web Issues” roundup flags **pro-Iranian/pro-Islamist hacktivist** attacks against Middle Eastern and pro-Western targets, but provides limited technical detail in the excerpt. A podcast episode describing “Iran’s 12 days of cyber war” and global OT targeting (including *Unitronics* PLCs) is largely commentary and retrospective framing rather than a discrete, verifiable incident report, and two other items in the set (a Russia-linked **APT28** phishing/malware campaign in Ukraine and a China-nexus **UAT-9244** telecom intrusion set in South America) describe unrelated threat activity outside the Iran-focused escalation.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Iranian Cyber Operations Shift Toward Identity Abuse and Broader Hybrid Targeting | Mallory