Comprehensive intelligence assessment of Iranian state-sponsored cyber operations following the US-Israel joint offensive (Operation Epic Fury / Operation Roaring Lion). Covers active APT campaigns, hacktivist coordination, GCC-specific threats, and actionable IOCs.
⚠️ CRITICAL ALERT: On February 28, 2026, the United States and Israel launched a joint kinetic-cyber offensive against Iran — Operation Epic Fury (US) / Operation Roaring Lion (Israel). Iran's internet connectivity dropped to 1–4%, described by experts as the largest cyberattack in history. Iran is now retaliating with a multi-vector cyber campaign across the Middle East, with GCC nations as primary targets.
This advisory synthesizes intelligence from over 10 sources including HawkEye Hunt, Unit 42, SentinelOne, Nozomi Networks, Canadian Centre for Cyber Security, LevelBlue, and internal HawkEye CSOC telemetry. It provides a comprehensive operational picture of the Iranian cyber threat landscape as of March 6, 2026.
The current crisis represents the most significant escalation in cyber conflict involving Iran since the 2020 Soleimani assassination response. The combined kinetic-cyber operation has fundamentally altered Iran's internet infrastructure and triggered a cascade of retaliatory actions across the digital domain.
Iran maintains one of the world's most sophisticated state-sponsored cyber programs, split between the MOIS (Ministry of Intelligence and Security) and the IRGC (Islamic Revolutionary Guard Corps). The following 10 groups represent the most active threat actors in the current campaign, tracked through HawkEye Hunt, and allied intelligence feeds.
Operation Olalampo — Targeting META region (Middle East, Turkey, Africa) with overlapping RedKitten campaign. C2 domain: codefusiontech[.]org. Pivoted from espionage to active disruption of government and telecom infrastructure.
An open directory at 209[.]74[.]87[.]100 (NameCheap) exposed FMAPP.exe, a tunneling proxy. Hash pivoting on FMAPP.exe (e25892603c42e34bd7ba0d8ea73be600d898cadc290e3417a82c04d6281b743b) revealed a second server at 157[.]20[.]182[.]49 (Hosterdaddy, AS136557).
This second server hosted Sliver C2 on port 31337, detected March 2 but active for only 1 day — indicative of operational security rotation. The dropper reset.ps1 uses ethers.js + WebSocket for blockchain-based C2 at 185[.]236[.]25[.]119:3001, which also hosts Tsundere botnet panels on ports 80/3000.
stager_51_bot) for C2| IP | ASN / Hosting | Framework | First Seen | Last Seen | Status |
|---|---|---|---|---|---|
| 217[.]60[.]249[.]120 | AS198154 / ParsAbr | Sliver | Feb 11 | Mar 6 | ACTIVE |
| 79[.]175[.]189[.]207 | AS25184 / Afranet | Mythic | Mar 1 | Mar 4 | RECENT |
| 78[.]38[.]80[.]242 | AS58224 / Amozesh | Metasploit | Feb 11 | Mar 3 | RECENT |
| 185[.]209[.]42[.]105 | AS209836 / Toesegaran | Sliver | Feb 11 | Feb 12 | DORMANT |
Infrastructure Pattern: MuddyWater shows a clear preference for NameCheap and Hosterdaddy (AS136557) hosting. They deliberately use publicly available tools (Sliver, Mythic) to blend with cybercriminal operations and complicate attribution.
A C2 server at 38[.]180[.]239[.]161 (M247 Europe SRL) was identified via web page title fingerprinting — displaying a distinctive "Wonders Above" webpage. Certificate SAN pivoting revealed two additional nodes:
The campaign employs Cloudflare fronting to obscure C2 traffic. APT34 uses DNS tunneling for exfiltration and maintains supply chain compromises for "sleeper" access in US/Gulf financial and aviation networks.
| Domain | Purpose | Status |
|---|---|---|
| web14[.]info | C2 Communication | ACTIVE |
| anythingshere[.]shop | Phishing / C2 | ACTIVE |
| cside[.]site | C2 Communication | ACTIVE |
| footballfans[.]asia | C2 Redirect | ACTIVE |
| menclub[.]lt | C2 | ACTIVE |
| musiclivetrack[.]website | C2 | ACTIVE |
| stone110[.]store | Staging | ACTIVE |
| justweb[.]click | C2 | ACTIVE |
| girlsbags[.]shop | Phishing | ACTIVE |
| lecturegenieltd[.]pro | C2 | ACTIVE |
| ntcx[.]pro | C2 | ACTIVE |
| retseptik[.]info | C2 | ACTIVE |
APT34 is actively harvesting credentials from Azure and Microsoft 365 environments across Gulf financial and aviation sectors. Audit Azure AD sign-in logs for suspicious OAuth consent requests and impossible-travel authentication events.
⚠️ Active Campaign: WezRAT infostealer targeting Israeli organizations by impersonating the Israeli National Cyber Directorate (INCD). Malicious RedAlert APK impersonates the Israeli Home Front Command app.
Malicious RedAlert APK (83651b0589665b112687f0858bfe2832ca317ba75e700c91ac34025ee6578b72) masquerades as the official Israeli Home Front Command rocket alert app. Distributed via WhatsApp spearphishing with spoofed websites including whatsapp-meeting[.]duckdns[.]org.
A late 2025 leak exposed APT35's C2 infrastructure including server IPs, usernames, and passwords — enabling defenders to proactively hunt and block their infrastructure. Despite the leak, the group remains highly active with refreshed infrastructure.
TameCat is a modular PowerShell-based backdoor with plugin-based extensibility, supporting dynamic module loading for targeted post-compromise capabilities.
The RedKitten campaign employs generative AI for hyper-personalized surveillance — AI-generated social media personas, tailored phishing content, and deepfake-enhanced social engineering targeting senior officials.
AI-Enhanced Threat: APT42's use of generative AI for social engineering marks a paradigm shift. Traditional indicators like poor grammar or generic templates are no longer reliable detection methods.
⚠️ DESTRUCTIVE CAPABILITY: APT33 is Iran's primary destructive arm, deploying Tickler and SHAPESHIFT wiper malware targeting aerospace and petrochemical in US and Saudi Arabia.
APT33 uses password spraying against internet-facing services and supply chain compromise for initial access. Nozomi Networks 2H 2025 telemetry ranks them as one of the two most active Iranian groups (alongside MuddyWater).
VoidManticore exploited an Omani government mailbox to distribute malicious Word documents targeting critical infrastructure. Known for wiper malware designed to permanently destroy data and render systems inoperable. 91 unique SHA-256 hashes indicate prolific malware development with frequent retooling.
Active since ~2007. Updated Foudre (keylogger/infostealer) and Tonnerre (data collection/exfiltration) variants. Uses Telegram-based C2 to bypass traditional network defenses, leveraging the platform's encryption and ubiquity.
MOIS's primary surveillance arm. Targets telecommunications providers for call records, SMS metadata, and real-time location data of specific individuals — Iranian dissidents, opposition figures, and foreign intelligence targets. Also targets travel/IT companies to track movement across borders.
⚠️ PHYSICAL IMPACT: Demonstrated ability to cause physical disruption through exploitation of Unitronics PLCs at US water treatment plants. Focus on industrial controller exploitation for physical failures.
Iran's primary initial access broker. Exploits unpatched VPN appliances and edge devices, then provides access to other APT groups (MuddyWater, APT33, APT34) for mission-specific objectives. Targets: Fortinet FortiOS, Pulse Secure/Ivanti, Citrix ADC/Gateway, F5 BIG-IP. Organizations with unpatched perimeter devices are at highest risk.
The formation of the "Electronic Operations Room" on February 28 — an umbrella coordinating body — represents unprecedented hacktivist coordination. Over 60 groups are active, including pro-Russian groups (Killnet, HydraC2) aligned with Iranian interests. Many serve as proxies for state-sponsored operations, providing plausible deniability.
| Group | Allegiance | Targets | Claimed Actions | Threat |
|---|---|---|---|---|
| Handala Hack | MOIS-linked | Israel, US | Israeli energy co., Clalit healthcare, i24 news, Jordan fuel, death threats | CRIT |
| DieNet | Pro-Iran | Bahrain, UAE, Saudi, Jordan | Bahrain airport, Sharjah airport, Riyadh Bank, UAE airport, Bank of Jordan | CRIT |
| Cyber Islamic Resistance | Pro-Iran umbrella | Israel, West | Drone defense system, Israeli payment infra, coordinates RipperSec/Cyb3rDrag0nzz | CRIT |
| FAD Team (Fatimiyoun) | Pro-regime | Israel, Turkey | SCADA/PLC access, 24 Israeli security devices, Turkish media | CRIT |
| Dark Storm Team | Pro-Palestinian | Israel | Israeli bank DDoS, multiple Israeli websites | HIGH |
| 313 Team | Pro-Iran (Iraq) | Kuwait | Kuwait Armed Forces, Ministry of Defense, Govt website | HIGH |
| APT Iran | Pro-Iran | Jordan | Jordan critical infrastructure sabotage | HIGH |
| Sylhet Gang | Pro-Iran | Saudi Arabia | Saudi Ministry of Home Affairs HCM systems | HIGH |
| Evil Markhors | Pro-Iran | Israel | Israeli bank website | MED |
| HydraC2 | Pro-Iran | Various | DDoS botnet, Five Families connection | HIGH |
| Killnet | Pro-Russian/Iran | Various | DDoS coordination aligned with Iranian interests | HIGH |
| Electronic Ops Room | Umbrella (Feb 28) | All | Coordinating hacktivist front across 60+ groups | CRIT |
Notable Domains: Handala Hack operates via handala-redwanted.to and handala-hack.to for leak sites and threat distribution. Block and monitor for employee mentions.
Gulf Cooperation Council nations face disproportionate risk as regional allies of the US and Israel. The following country-specific threat profiles are derived from hacktivist claims, APT targeting patterns, and infrastructure reconnaissance since February 28.
All indicators should be immediately deployed to firewalls, EDR, SIEM, and DNS filtering. Click the copy button to copy any value to your clipboard.
| IP Address | ASN | Hosting | Malware / Framework | Actor | First Seen | Last Seen |
|---|---|---|---|---|---|---|
| 209[.]74[.]87[.]100 | NameCheap | — | Open Dir / FMAPP.exe | MuddyWater | Feb 2026 | Feb 26 |
| 157[.]20[.]182[.]49 | AS136557 | Hosterdaddy | Sliver + tools | MuddyWater | Feb 2026 | Mar 2 |
| 185[.]236[.]25[.]119 | — | — | Tsundere / blockchain C2 | MuddyWater | Feb 2026 | — |
| 38[.]180[.]239[.]161 | M247 Europe | — | "Wonders Above" C2 | Dark Scepter/APT34 | Feb 2026 | — |
| 92[.]243[.]65[.]243 | AS25467 | Akton d.o.o. | C2 | Dark Scepter/APT34 | Feb 2026 | — |
| 185[.]76[.]79[.]125 | AS57169 | EDIS GmbH | C2 | Dark Scepter/APT34 | Feb 2026 | — |
| 217[.]60[.]249[.]120 | AS198154 | ParsAbr | Sliver | Iran-based | Feb 11 | Mar 6 |
| 79[.]175[.]189[.]207 | AS25184 | Afranet | Mythic | Iran-based | Mar 1 | Mar 4 |
| 78[.]38[.]80[.]242 | AS58224 | Amozesh | Metasploit | Iran-based | Feb 11 | Mar 3 |
| 185[.]209[.]42[.]105 | AS209836 | Toesegaran | Sliver | Iran-based | Feb 11 | Feb 12 |
| Domain | Actor | Category |
|---|---|---|
| codefusiontech[.]org | MuddyWater | C2 (Op. Olalampo) |
| whatsapp-meeting[.]duckdns[.]org | APT35 | Phishing |
| web14[.]info | APT34/Dark Scepter | C2 |
| anythingshere[.]shop | APT34/Dark Scepter | C2/Phishing |
| cside[.]site | APT34/Dark Scepter | C2 |
| footballfans[.]asia | APT34/Dark Scepter | C2 |
| menclub[.]lt | APT34/Dark Scepter | C2 |
| musiclivetrack[.]website | APT34/Dark Scepter | C2 |
| stone110[.]store | APT34/Dark Scepter | Staging |
| justweb[.]click | APT34/Dark Scepter | C2 |
| girlsbags[.]shop | APT34/Dark Scepter | Phishing |
| lecturegenieltd[.]pro | APT34/Dark Scepter | C2 |
| ntcx[.]pro | APT34/Dark Scepter | C2 |
| retseptik[.]info | APT34/Dark Scepter | C2 |
| handala-redwanted.to | Handala Hack | Leak Site |
| handala-hack.to | Handala Hack | Operations |
| SHA-256 / SHA-1 | File | Actor | Type |
|---|---|---|---|
| e25892603c42e34bd7ba0d8ea73be600d898cadc290e3417a82c04d6281b743b | FMAPP.exe | MuddyWater | Tunneling Proxy |
| 83651b0589665b112687f0858bfe2832ca317ba75e700c91ac34025ee6578b72 | RedAlert APK | APT35-aligned | Mobile Malware |
| 62ED16701A14CE26314F2436D9532FE606C15407 | SOCKS5 proxy | MuddyWater | Network Tool |
Red = Custom/AI-enhanced | Amber = Custom Iranian tools | Teal = Publicly available / dual-use
Telegram C2: stager_51_bot — MuddyWater CHAR backdoor C2 via Telegram Bot API.
Nozomi Networks' 2H 2025 OT/ICS threat report reveals a critical exposure gap in the Middle East, with Iranian threat actors actively positioning for potential destructive operations.
⚠️ CRITICAL WINDOW: Iranian attackers are in an exploratory/positioning phase within OT/ICS networks. The gap between initial compromise and destructive action is narrowing as geopolitical tension escalates.
| Technique | Description | Prevalence | Risk |
|---|---|---|---|
| Default Credentials | Factory-default passwords on PLCs, HMIs, network devices | VERY HIGH | Immediate control system access |
| Valid Accounts | Stolen or compromised legitimate credentials | HIGH | Bypasses authentication |
| Brute Force | Password spraying against exposed OT interfaces | HIGH | Common with Unitronics PLCs |
| Network Scanning | Active reconnaissance of industrial networks | HIGH | Precursor to lateral movement |
Techniques used by HawkEye Hunt analysts to discover and track Iranian APT infrastructure. These can be replicated with access to threat hunting platforms.
MuddyWater prefers NameCheap and Hosterdaddy (AS136557). Monitor new infrastructure on these ASNs matching known patterns (specific ports, cert patterns, web server configs).
APT34's Dark Scepter uses Cloudflare fronting. Pivoting on SANs from known certificates bypassed Cloudflare and identified C2 nodes at 92[.]243[.]65[.]243 and 185[.]76[.]79[.]125.
Dark Scepter C2 at 38[.]180[.]239[.]161 served "Wonders Above" — scanning for this title across internet-wide datasets identified the initial C2. Actors often leave distinctive artifacts.
MuddyWater's open dir at 209[.]74[.]87[.]100 exposed FMAPP.exe and operational tools. Regular scanning reveals tooling, staging files, and operational artifacts.
FMAPP.exe hash pivoted from 209[.]74[.]87[.]100 to 157[.]20[.]182[.]49 — revealing an entirely new C2 node with Sliver, blockchain C2, and additional tooling.
Structured query languages for hunting platforms enable correlation across ASN, certificate, service banner, and port data to cluster infrastructure by operator.
JARM TLS fingerprinting identifies C2 frameworks (Sliver, Mythic, Cobalt Strike) by unique TLS handshake signatures, even behind CDNs. Effective for tracking MuddyWater's Sliver instances.
HawkEye's 24x7 CSOC and XDR platform provides continuous visibility into Iranian APT operations. The following screenshots demonstrate active monitoring, threat hunting, and detection capabilities deployed against the current threat landscape.
Real-time threat monitoring showing active feeds, IOC correlation, and detection metrics.
Active hunts across Iranian APT campaigns and associated hacktivist groups.
Hunts filtered for Iranian APT activity — MuddyWater, APT34, APT35, and associates.
Proactive hunts from HawkEye Hunt, Unit 42, and allied intelligence feeds.
Automated IOC hunting with CTIX threat intelligence platform correlation.
Attack simulation against Iranian APT TTPs — validating detection coverage.
AI-assisted hunting analyzing Iranian APT patterns and behavioral indicators.
AI-generated queries for Iranian APT infrastructure identification.
Custom rules for PowerShell abuse, Sliver/Mythic beacons, DNS tunneling.
Additional hunts covering secondary APTs, hacktivists, and reconnaissance ops.
Frequency of MITRE ATT&CK techniques observed across all 10 Iranian APT groups. Darker shading = higher frequency across multiple groups.
| ID | Technique | Tactic | Groups Using | Freq |
|---|---|---|---|---|
| T1566.001 | Spearphishing Attachment | Initial Access | MuddyWater, APT34, APT35, APT42, APT33 | 5 |
| T1059.001 | PowerShell | Execution | MuddyWater, APT34, APT35, APT42, APT33 | 5 |
| T1071 | Application Layer Protocol | C2 | MuddyWater, APT35, APT42 | 3+ |
| T1573 | Encrypted Channel | C2 | MuddyWater, APT34, APT35 | 3 |
| T1190 | Exploit Public-Facing App | Initial Access | MuddyWater, APT34 | 2 |
| T1078 | Valid Accounts | Persistence | APT34, APT42 | 2 |
| T1053.005 | Scheduled Task | Persistence | MuddyWater, APT34 | 2 |
| T1056.001 | Keylogging | Collection | APT35, APT42 | 2 |
| T1041 | Exfiltration Over C2 | Exfiltration | MuddyWater, APT34 | 2 |
| T1071.004 | DNS | C2 | MuddyWater, APT34 | 2 |
| T1566.002 | Spearphishing Link | Initial Access | APT35 | 1 |
| T1059.005 | Visual Basic | Execution | MuddyWater | 1 |
| T1574.002 | DLL Side-Loading | Persistence | MuddyWater | 1 |
| T1090.004 | Domain Fronting | C2 | APT34 | 1 |
| T1003 | OS Credential Dumping | Credential Access | APT34 | 1 |
| T1027 | Obfuscated Files | Defense Evasion | APT34 | 1 |
| T1113 | Screen Capture | Collection | APT35 | 1 |
| T1110 | Brute Force | Credential Access | APT33 | 1 |
| T1195 | Supply Chain Compromise | Initial Access | APT33 | 1 |
| T1485 | Data Destruction | Impact | APT33 | 1 |
| T1561 | Disk Wipe | Impact | APT33 | 1 |
| T1005 | Data from Local System | Collection | APT35 | 1 |