CRITICAL THREAT LEVEL | Iran Cyber Operations Active | Updated March 20, 2026
TLP:CLEAR

Iran Cyber Threat Intelligence Center

Situation reports, threat actor profiles, and hunting queries for the active conflict.

CRITICAL
Threat Level
15+
Active Threat Groups
11
Threat Groups Profiled
200K+
Devices Wiped (Stryker)

Situation Overview

Bottom Line Up Front -- from the Iran Conflict Situation Report v1.5, published April 7, 2026

CRITICAL RISK HIGH CONFIDENCE DECISION REQUIRED TLP:CLEAR
WHAT

Day 39. President Trump set an 8:00 PM ET April 7 "final" deadline for Iran to reopen the Strait of Hormuz, threatening to destroy "every bridge" and "every power plant in Iran" in a four-hour campaign. Iran rejected the demand and rejected a Pakistan-Egypt-Turkey "Islamabad Accord" ceasefire framework. Israel struck Asaluyeh and Mahshahr petrochemical complexes; the IDF assesses ~85% of Iran's petrochemical export capacity has now been hit. On April 1, the IRGC fired cruise missiles at the QatarEnergy-leased tanker AQUA 1 inside Qatari territorial waters. CISA, FBI, and NSA published joint advisory AA26-097A confirming an Iranian-affiliated APT group has actually disrupted internet-exposed Rockwell/Allen-Bradley PLCs across US Government Services, Water and Wastewater, and Energy sectors -- with operational and financial loss. On March 27, Handala (MOIS-linked) breached FBI Director Kash Patel's personal Gmail in retaliation for the DOJ seizure of four Handala domains, and separately doxxed 28 Lockheed Martin engineers in Israel with kinetic threats.

SO WHAT

Day 39 is the most volatile decision window since onset. Trump's ultimatum and Iran's rejection of the Islamabad Accord leave no diplomatic overlap; US strikes against Iranian civilian infrastructure are plausible within 24-48 hours. Israel's destruction of 85% of Iranian petrochemical export capacity accelerates regime financial pressure but reduces Iran's incentive to spare Gulf energy infrastructure from retaliation. AA26-097A is the most consequential cyber publication of the conflict to date: it confirms Iranian APT actors have actually disrupted US critical infrastructure PLCs (not merely attempted access). CISA's March 18 "steady state" framing is functionally retracted. The Handala/Patel breach and Lockheed Martin doxxing extend the threat aperture from corporate networks to personal accounts and physical security of named US officials and defense contractor employees.

NOW WHAT

Treat the period through April 10 as an elevated retaliation window. Apply Rockwell mitigations per AA26-097A: take Rockwell/Allen-Bradley PLCs off the public internet, change default credentials, deploy SD1771 hardening. Audit all internet-exposed PLCs of any manufacturer (TCP 20256, 44818, 502, 102). Operate under the assumption that Iranian APT groups are actively disrupting US critical infrastructure PLCs -- this is no longer a forecast. For named US officials and senior defense contractor employees, harden personal accounts (hardware-key MFA, recovery channel audit, scrub publicly accessible address data). Defense contractors with named employees in Israel should activate physical security review. Maintain elevated wiper hunt posture. Pre-stage communications language for Iranian retaliation following any Trump strikes, or for Handala-affiliated breach claims against your organization.

Sector Risk Assessment

Sector Espionage Wiper / Destructive Ransomware Influence Ops
Energy Critical Critical High Medium
Financial Services Critical High Critical High
Water / Wastewater NEW Medium Critical Medium Low
Government Critical High High Critical
Healthcare Medium Critical High Low
Transportation Medium High Medium Low
Cloud / Data Centers NEW Medium Critical High Low
Technology / MSPs High High High Medium
Critical
High
Medium
Low
↑ Increasing   → Stable

Active Threat Actors

Eleven Iranian threat groups with confirmed or assessed operations during the conflict. Ordered by operational significance.

Critical MOIS

Agrius

Also tracked as: Pink Sandstorm, Americium
Custom Wiper Malware Deployment
Dedicated wiper operations. Deploys custom destructive malware (BlueWipe, SewerGoo, BeepFreeze) disguised as ransomware. Targets data destruction over financial gain.
Energy Financial Services Government
Critical IRGC

Lemon Sandstorm

Also tracked as: Rubidium, Parisite
VPN Exploitation & Pre-Positioned Access
Pre-positioned in critical infrastructure networks via VPN exploitation. Longest dwell times of any Iranian APT. Now includes Fox Kitten / Pioneer Kitten access brokerage operations (VPN exploitation, Pay2Key ransomware, access sales to other Iranian groups).
Energy Government Transportation
Critical MOIS

MuddyWater

Also tracked as: Mango Sandstorm, Mercury
RMM Tool Abuse & Custom Backdoors
New Dindoor and FakeSet backdoors targeting US financial and aviation sectors. Active espionage operations with new malware families deployed during the conflict.
Financial Services Government Aviation
Critical MOIS

Handala

Also tracked as: Void Manticore, Storm-0842
MDM Weaponization & Destructive Operations
Executed first confirmed large-scale destructive cyber attack of the conflict. Wiped 200,000+ Stryker devices by weaponizing Microsoft Intune remote wipe.
Healthcare Technology Cloud
Critical IRGC

APT33 / Peach Sandstorm

Also tracked as: Refined Kitten, Elfin, Magnallium, Holmium
Cloud Infrastructure Abuse & Password Spraying
IRGC-affiliated group targeting energy, aviation, and defense sectors. Known for large-scale password spraying against Azure AD/M365, custom backdoors (Tickler, StoneDrill), and cloud VM abuse for C2. Connected to Shamoon destructive operations.
Energy Aviation Defense Petrochemical
Critical IRGC

APT34 / OilRig

Also tracked as: Hazel Sandstorm, Helix Kitten, Chrysene, COBALT GYPSY
DNS Tunneling C2 & Sleeper Access
Long-running IRGC espionage group specializing in DNS tunneling C2, custom backdoors (SideTwist, Saitama, Karkoff, MrPerfectionManager), and credential harvesting. Maintains dormant sleeper access in financial and aviation networks.
Financial Services Government Telecommunications Energy Aviation
Critical IRGC Intelligence Organization

APT35 / APT42 / Charming Kitten

Also tracked as: Mint Sandstorm, Educated Manticore, TA453, Phosphorus, Yellow Garuda
Social Engineering & MFA Token Interception
Iran's premier social engineering group. Conducts multi-week relationship-building campaigns against journalists, researchers, and security professionals. Deploys React-based phishing kits to intercept MFA tokens in real time across 130+ domains.
Think Tanks Academia Media Government Defense
Critical IRGC-CEC

CyberAv3ngers

Also tracked as: BAUXITE (Dragos), Soldiers of Solomon
OT/ICS Targeting & PLC Exploitation
IRGC-CEC unit targeting water utilities and fuel management systems. Exploits default credentials on internet-exposed Unitronics PLCs (TCP 20256). Deployed IOCONTROL malware against US water infrastructure.
Water/Wastewater Energy Fuel Management
Critical IRGC-CEC

Hydro Kitten

Also tracked as: CrowdStrike designation
ICS/OT to Financial Sector Pivot
IRGC-CEC unit with ICS/OT origins now expanding to financial sector targeting. Linked to Unitronics PLC exploitation campaign (November 2023) and IOCONTROL malware deployment. Limited public documentation; assessed with medium confidence.
Financial Services Water/Wastewater ICS/OT
Critical IRGC

Cotton Sandstorm

Also tracked as: Neptunium, Haywire Kitten, Emennet Pasargad, Aria Sepehr Ayandehsazan
Influence Operations & Hack-and-Leak
IRGC influence operations and hack-and-leak specialist. Behind the 2020 US election voter intimidation campaign (FBI indictment). Conducts website defacement, mass email campaigns, and data destruction via front company Emennet Pasargad.
Elections Government Media Technology
Critical IRGC Proxy

FAD Team (Fatimion Cyber Team)

Also tracked as: Fatemiyoun Electronic Squad
Hacktivist OT/ICS Targeting
IRGC-directed hacktivist proxy group focused on OT/ICS disruption. Claims SCADA/PLC access to water and agricultural systems. Limited technical IOCs; claims often exceed demonstrated capability.
Critical Infrastructure Water Agriculture Energy

Respond Now

Immediate actions and detection queries you can deploy today.

Immediate Actions (0-48 Hours)

From the Iran Conflict Situation Report, Section 8: Action Response Framework

14 actions across CISO, SOC, IT Ops, Cloud/DevOps, and OT
  1. 1
    Elevate SOC to 24/7 operations with dedicated Iranian threat monitoring shift
    CISO High Effort
  2. 2
    Deploy emergency detection rules for Iranian APT TTPs. Prioritize Lemon Sandstorm VPN exploitation indicators, Agrius wiper signatures, and MuddyWater Operation Olalampo malware families
    SOC Med Effort
  3. 3
    Emergency patch all internet-facing VPN appliances (Fortinet, Pulse Secure, Citrix, Palo Alto) — Lemon Sandstorm's primary initial access vector
    IT Ops High Effort
  4. 4
    Review and enforce MFA on all critical systems, particularly OT/ICS jump hosts, VPN concentrators, and cloud admin portals
    IT Ops Med Effort
  5. 5
    Activate incident response retainer with external forensics provider; confirm SLA and escalation contacts
    CISO Low Effort
  6. 6
    Verify offline backup integrity for critical systems; test restoration procedures for wiper scenario
    IT Ops Med Effort
  7. 7
    NEW Audit cloud infrastructure for single-region dependencies on Middle East availability zones (AWS me-south-1, me-central-1). Verify multi-region failover is active and tested
    Cloud/DevOps High Effort
  8. 8
    NEW Review disaster recovery plans for cloud-hosted services. Ensure RPO and RTO account for complete facility loss, not just software failure
    CTO / Cloud Arch Med Effort
  9. 9
    NEW Harden enterprise device management platforms (Microsoft Intune, SCCM, Jamf, Google Workspace MDM). Restrict remote wipe permissions to dedicated admin accounts with hardware-bound MFA. Monitor for anomalous MDM commands. Segment MDM administrative access from general IT infrastructure
    IT Ops / Security High Effort
  10. 10
    NEW Assess GPS-dependent operational systems for spoofing resilience. Review navigation, timing, logistics, and financial transaction systems that rely on GNSS signals
    IT Ops / OT Med Effort
  11. 11
    NEW Take ICS/SCADA interfaces off the internet immediately. Change default credentials on all PLCs and HMIs. Block industrial protocol ports (TCP 20256, 102, 502, 44818)
    OT / IT Ops High Effort
  12. 12
    NEW Audit RMM platform access and patch SolarWinds N-central (CVE-2025-9316). Review all remote management tool installations for unauthorized instances
    IT Ops / SOC High Effort
  13. 13
    NEW Build pre-approved communications protocols for responding to Telegram breach claims before journalists call. Do not assume CISA early warning is functioning at normal capacity; establish independent threat intelligence sources
    CISO / Comms Med Effort
  14. 14
    NEW Treat any ransomware incident in targeted sectors as a potential wiper until proven otherwise. Preserve forensic evidence before assuming criminal intent
    SOC / IR Med Effort

Featured Hunting Queries

Copy-paste ready detection queries. One from each threat actor's hunting guide.

MDM Mass Wipe Detection KQL Handala
Detects Intune device management operations including remote wipes, retires, and resets pushed by compromised admin accounts.
AuditLogs
| where LoggedByService == "Intune"
| where OperationName has_any ("Wipe", "Retire", "Reset", "remoteLock", "cleanWindowsDevice", "windowsDefenderScan")
| project TimeGenerated, OperationName, InitiatedBy.user.userPrincipalName, TargetResources[0].displayName, Result
| sort by TimeGenerated desc
VPN Exploitation C2 Detection KQL Lemon Sandstorm
Detects DNS queries to Lemon Sandstorm confirmed C2 infrastructure domains used in VPN exploitation campaigns.
let C2Domains = dynamic([
    "apps.gist.githubapp.net", "githubapp.net",
    "api.gupdate.net", "gupdate.net",
    "login.forticloud.online", "fortigate.forticloud.online",
    "cloud.sophos.one"
]);
DnsEvents
| where Name has_any (C2Domains)
| extend AlertSeverity = "High"
| project TimeGenerated, ClientIP, Name, QueryType, AlertSeverity
| sort by TimeGenerated desc
Wiper Staging Directory Detection Sigma Agrius
Detects .NET executables created in the Windows temp staging directory used by Agrius for wiper deployment and data staging.
title: Suspicious .NET Executable in Windows Temp Staging Directory (Agrius)
id: b2c3d4e5-f6a7-8901-bcde-a91105000001
status: experimental
description: |
    Detects .NET executables created in the Windows temp staging
    directory C:\windows\temp\s\, a known Agrius wiper deployment location.
logsource:
    category: file_event
    product: windows
detection:
    selection_staging_dir:
        TargetFilename|startswith: 'C:\windows\temp\s\'
        TargetFilename|endswith:
            - '.exe'
            - '.dll'
    selection_tool_names:
        TargetFilename|endswith:
            - '\sql.net4.exe'
            - '\systems.exe'
            - '\IPsecHelper.exe'
    condition: selection_staging_dir or selection_tool_names
falsepositives:
    - Legitimate software installation to temp directories
level: high
Unauthorized RMM Tool Execution KQL MuddyWater
Detects execution of known RMM tools abused by MuddyWater for command and control, including Atera, ScreenConnect, and SimpleHelp.
let MuddyWaterRMM = dynamic([
    "AteraAgent.exe", "ScreenConnect.ClientService.exe",
    "SimpleHelp.exe", "AnyDesk.exe", "Syncro.Overmind.Service.exe",
    "RemoteUtilities.exe", "rutserv.exe", "rfusclient.exe",
    "level-windows-amd64.exe", "PDQConnect.Agent.exe"
]);
DeviceProcessEvents
| where FileName in~ (MuddyWaterRMM)
| project Timestamp, DeviceName, FileName, FolderPath, ProcessCommandLine, InitiatingProcessFileName, AccountName
| sort by Timestamp desc

Full detection libraries available in the hunting guides below.

Running these queries manually? BRACE continuously monitors for these TTPs and 200+ additional Iranian threat indicators across your environment. Learn about BRACE →

Download Reports

All reports are TLP:CLEAR. Free and ungated. Share with your team.

Threat Actor Reports

MOIS TLP:CLEAR

Agrius

INT-TAP-2026-AGRIUS-v1.0

Custom Wiper Malware Deployment

IRGC TLP:CLEAR

Lemon Sandstorm

INT-TAP-2026-LEMONSANDSTORM-v1.1

VPN Exploitation & Pre-Positioned Access

MOIS TLP:CLEAR

MuddyWater

INT-TAP-2026-MUDDYWATER-v1.0

RMM Tool Abuse & Custom Backdoors

MOIS TLP:CLEAR

Handala

INT-TAP-2026-HANDALA-v1.0

MDM Weaponization & Destructive Operations

IRGC TLP:CLEAR

APT33 / Peach Sandstorm

INT-TAP-2026-APT33-v1.0

Cloud Infrastructure Abuse & Password Spraying

IRGC TLP:CLEAR

APT34 / OilRig

INT-TAP-2026-APT34-v1.0

DNS Tunneling C2 & Sleeper Access

IRGC Intelligence Organization TLP:CLEAR

APT35 / APT42 / Charming Kitten

INT-TAP-2026-APT35-v1.0

Social Engineering & MFA Token Interception

IRGC-CEC TLP:CLEAR

CyberAv3ngers

INT-TAP-2026-CYBERAV3NGERS-v1.0

OT/ICS Targeting & PLC Exploitation

IRGC-CEC TLP:CLEAR

Hydro Kitten

INT-TAP-2026-HYDROKITTEN-v1.0

ICS/OT to Financial Sector Pivot

IRGC TLP:CLEAR

Cotton Sandstorm

INT-TAP-2026-COTTONSANDSTORM-v1.0

Influence Operations & Hack-and-Leak

IRGC Proxy TLP:CLEAR

FAD Team (Fatimion Cyber Team)

INT-TAP-2026-FADTEAM-v1.0

Hacktivist OT/ICS Targeting

Stay Informed on the Iran Cyber Conflict

Subscribe to Intruvent Edge for ongoing threat intelligence updates as the situation evolves.