Cyber Security

Iranian APT Groups Intensify Cyberattacks on Critical Infrastructure Amid Rising Geopolitical Tensions

A dramatic escalation in Middle Eastern tensions began last week with Operation Lion’s Roar, a joint U.S.-Israeli military strike on Iranian nuclear and military sites.

Iran retaliated with missiles and drones, disrupting energy, air travel, and diplomatic stability across the Gulf. Amid this kinetic conflict, Iranian state-affiliated advanced persistent threats (APTs) have ramped up cyber operations targeting critical infrastructure worldwide.​

Nozomi Networks reports a spike in Iran-linked APT alerts, with the manufacturing and transportation sectors prioritized.

Telemetry shows systematic increases in attacks during the conflict’s early days, echoing a 133% rise in prior escalations. Groups like MuddyWater, OilRig, APT33, and UNC1549 lead the surge, focusing on espionage and disruption.

Number of recently raised alerts associated with Iran-affiliated threat actors (Source : Nozomi Networks).
 Number of recently raised alerts associated with Iran-affiliated threat actors (Source : Nozomi Networks).

MuddyWater (aka APT34, Seedworm), tied to Iran’s Ministry of Intelligence and Security (MOIS), uses spear-phishing, credential theft, and living-off-the-land techniques for persistence. It recently targeted MENA organizations in Operation Olalampo with custom malware like GhostFetch.

Iranian APT Groups

OilRig (APT34, Helix Kitten) employs phishing, web shells, and PowerShell for espionage against energy and telecom in the Middle East.​


Nozomi Threat Intelligence is tracking MuddyWater targeting organizations across the globe (Source : Nozomi Networks).
Nozomi Threat Intelligence is tracking MuddyWater targeting organizations across the globe (Source : Nozomi Networks).

APT33 (Elfin, Refined Kitten) hits aerospace, energy, and government via supply chain attacks and password spraying. UNC1549, active in 2H 2025, targets defense and telecom aligned with Iranian priorities.

Threat ActorAliasesPrimary TargetsKey TTPs nozominetworks​
MuddyWaterAPT34, OilRigEnergy, Telecom, GovernmentSpear-phishing, LOLBins
OilRigAPT34, Helix KittenFinancial, DefenseWeb shells, Credential harvesting
APT33ElfinAerospace, EnergyPassword spraying, Supply chain
UNC1549CURIUMDefense, TelecomEspionage, Disruption

Middle East Attack Surface Vulnerabilities

Middle Eastern organizations show high vulnerability exposure: 61% of 2025-discovered flaws have high/critical CVSS scores, vs. global 48%. EPSS scores >1% affect 8% of vulns, double the global average. Air-gapping alone fails; efficient patching is essential.

March 2026 distribution of recent vulnerabilities by CVSS score in the ME region (Source : Nozomi Networks).
March 2026 distribution of recent vulnerabilities by CVSS score in the ME region (Source : Nozomi Networks).

Top MITRE ATT&CK TTPs in recent Middle East detections include default credential abuse (T1110), valid account use (T1078), brute force (T1110.001), and scanning (T1595). These signal early reconnaissance for future disruption.​

Activate continuous OT monitoring with heightened alert sensitivity for Iranian TTPs. Update threat intelligence signatures Nozomi customers should enable real-time feeds.​

 

Patch vulnerabilities, change default credentials, and reassess IT/OT segmentation. Baseline industrial protocols and validate detections against groups like MuddyWater.

Hunt for low-and-slow activity in network traffic. Prepare incident response for hybrid threats blending cyber and physical risks.Organizations blending visibility, segmentation, and tested plans best withstand these campaigns.

Leave a Reply

Your email address will not be published. Required fields are marked *