
I. Executive Summary
The current geopolitical landscape in the Middle East is marked by a significant escalation in tensions between Israel and Iran, with direct involvement from the United States. This heightened kinetic conflict has created a volatile environment ripe for increased cyber warfare. The recent intensification began with Israeli airstrikes targeting Iranian nuclear and military sites, including critical infrastructure and high-value military commanders.1 In response, Iran has launched retaliatory missile attacks, notably a “limited missile attack” on U.S. forces in Qatar, signaling a clear intent for further “punishment operations”.1 The direct U.S. military intervention, specifically “Operation Midnight Hammer” aimed at dismantling Iran’s nuclear enrichment capacity, further amplifies the cyber threat landscape.4 In light of these developments, the Department of Homeland Security (DHS) has issued advisories warning of likely “low-level cyberattacks” from pro-Iranian hacktivists and potential “targeted intrusions” by government-affiliated actors against U.S. networks, underscoring the immediate nature of the threat.6
Iran operates a highly structured and multi-layered cyber strategy, leveraging both official government entities like the Islamic Revolutionary Guard Corps (IRGC) and the Ministry of Intelligence and Security (MOIS), alongside a network of private contractors.11 Iran’s cyber capabilities span a range of activities, from sophisticated espionage and data exfiltration to disruptive and destructive attacks. A crucial aspect of Iran’s cyber operations is their strong emphasis on psychological manipulation, aiming to sow fear, disrupt public trust, and control the narrative surrounding purported breaches.5 This approach is evident in instances where Iranian actors fabricate or exaggerate the effects of their cyber activities, as seen with the CyberAv3ngers’ false claims regarding Israel’s Dorad power station, where only a temporary Distributed Denial of Service (DDoS) attack was confirmed, while the primary effort was to create a misleading narrative.13 This deliberate focus on psychological impact means that U.S. and Israeli defense strategies must extend beyond purely technical cybersecurity measures to include robust public communication and counter-disinformation campaigns. Avoiding the inadvertent amplification of Iranian claims is critical, as this directly plays into their strategic objectives.10
Likely targets for Iranian cyber campaigns include critical infrastructure sectors such as water, energy, and healthcare, as well as financial institutions, government networks, and defense-related entities in both Israel and the U.S..5 The U.S. defense posture relies on a collaborative effort involving key government agencies like the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), DHS, the Federal Bureau of Investigation (FBI), and U.S. Cyber Command (USCYBERCOM).19 This defense is guided by national strategies that prioritize risk reduction, bolstering critical infrastructure resilience, and enhancing interagency and public-private information sharing.19
II. Geopolitical Drivers and Iran’s Motivation for Cyber Warfare
The current geopolitical climate in the Middle East is characterized by a rapid escalation of direct military confrontations between Israel and Iran, drawing in the United States. The conflict intensified with Israel’s “surprise barrage of attacks” on June 13, 2025, targeting Iran’s nuclear and military sites, including critical infrastructure and high-ranking military officials.2 These strikes aimed to systematically dismantle Iran’s air defenses and offensive missile capabilities, while also damaging its nuclear enrichment facilities.4 The United States further escalated its involvement on June 21st with “Operation Midnight Hammer,” launching coordinated strikes against three Iranian nuclear facilities at Fordow, Isfahan, and Natanz. This operation, as stated by President Trump, was intended to “destroy Iran’s nuclear enrichment capacity” and eliminate the nuclear threat.4
In direct retaliation, Iran has explicitly vowed “further attacks” and a “punishment operation”.1 This has included a “limited missile attack” on U.S. forces at Qatar’s Al Udeid Air Base, an action described as “more symbolic than harmful” due to advance notice given to Qatar.2 The U.S. has responded to these threats by strategically repositioning military aircraft and warships in the Middle East to protect Israel and prepare for potential Iranian threats against U.S. military installations.1
Iran has a well-established history of deploying “retaliatory cyber operations” in response to military interventions, economic sanctions, and broader geopolitical pressures.5 The Department of Homeland Security (DHS) anticipates a “heightened threat environment” in the U.S., with cyberattacks identified as a highly probable form of Iranian retaliation following recent kinetic actions.4 This strategic choice of cyber warfare is particularly significant given that Iran’s conventional military capabilities are considered “completely outmatched” by Israel.8 Furthermore, the Russian and Chinese-assisted air defense systems in Iran have proven “useless” against Israeli F-35s, highlighting a critical limitation in Iran’s conventional defense.24 This context suggests that cyber warfare serves as Iran’s most viable and preferred asymmetric tool, allowing it to inflict costs, project power, and achieve strategic objectives without risking a disproportionate conventional conflict that it cannot sustain.
Beyond intelligence gathering, Iranian cyberattacks are explicitly used to “intimidate and destabilize political opponents”.11 Iranian actors often prioritize “high-impact, very visible and very inconvenient” targets designed to disrupt daily life and induce societal panic, even if the actual technical damage is contained.9 This aligns directly with their broader psychological warfare objectives.13 The pattern of Iran’s kinetic and cyber responses reveals a deliberate strategy where the perception of impact and capability is prioritized over achieving extensive, deep technical damage. For instance, Iran’s missile attack on the U.S. air base in Qatar was described as “more symbolic than harmful” due to advance notice.5 Similarly, Iranian cyber operations are known to “fabricate and exaggerate their effects” 5 and aim to “get on the nerves of people who aren’t that educated on cyber”.5 The CyberAv3ngers’ false claims about the Dorad power station hack and their defacement of U.S. water systems exemplify this approach.13 This means that for U.S. and Israeli cyber defenders, differentiating between genuine technical compromises and Iranian influence operations or exaggerated claims is crucial. Overreacting to purely symbolic or propagandistic cyber actions could inadvertently serve Iran’s psychological warfare goals, necessitating a calm, factual, and resilient response to deny Iran its desired psychological impact.
III. Iran’s Cyber Capabilities: Structure, Key Groups, and Attack Modus Operandi
A. Command and Control
Iran’s cyber strategy is built upon a “highly structured and multi-layered approach,” which integrates both government-controlled organizations and private contractors to conduct offensive cyber operations.11 This organizational model provides Iran with flexibility and efficiency while ensuring governmental control and ideological alignment.11 The two primary state actors orchestrating Iran’s cyber activities are the Islamic Revolutionary Guard Corps (IRGC) and the Ministry of Intelligence and Security (MOIS).11 These entities frequently operate with overlapping objectives, creating a dynamic of both collaboration and internal competition within the Iranian intelligence apparatus.12
The IRGC’s Cyber-Electronic Command, established in 2015, holds specific responsibility for cyber warfare and cybersecurity operations.25 Within the IRGC, the Intelligence Organization focuses on analyzing and collecting information.12 The MOIS plays an expansive role, deeply involved in foreign intelligence operations, gathering information on Iranian opposition groups, and neutralizing perceived threats to the regime. It comprises 15 directorates covering various aspects of security, counterintelligence, foreign operations, and economic activities.12 Both the IRGC commander, the IRGC Quds Force (IRGC-QF) commander, and the intelligence minister report directly to Iran’s Supreme Leader, Ali Khamenei, indicating a centralized ultimate authority over strategic cyber objectives.12 The Quds Force, functioning as Iran’s external intelligence and covert operations arm, collaborates closely with the MOIS on managing proxy militias, conducting assassinations, and running disinformation campaigns abroad.12
The Basij militias, a paramilitary organization under IRGC control, reportedly command over 1,000 cyber battalions across the country, suggesting a broad base of potential cyber operatives and a capacity for large-scale, lower-sophistication attacks.11 Furthermore, Iranian foreign officers and diplomats frequently maintain ties to either the MOIS or IRGC, often utilizing embassies, cultural centers, and charities as hubs for espionage, logistical coordination, and intelligence gathering abroad.12 This operational model, characterized by centralized strategic control and decentralized operational execution, allows Iran to be agile and provides plausible deniability for its cyber actions. By using ostensibly independent hacktivist groups or private contractors, often with clear state ties, Iran complicates attribution efforts, making it harder to hold the Iranian state directly accountable under international law. For defenders, this means that any significant “hacktivist” activity aligning with Iranian interests should be considered potentially state-directed or at least state-supported, requiring a more robust and comprehensive response than typical criminal hacktivism.
B. Prominent Advanced Persistent Threat (APT) Groups
Iran fields a diverse array of active APT groups, many with direct links to the IRGC or MOIS, engaged in a spectrum of cyber operations from espionage to disruption and influence campaigns.11
- MuddyWater (APT MuddyWater, Seedworm, Static Kitten, TEMP.Zagros): This state-sponsored APT group is widely believed to operate under the direction of the MOIS. Its primary focus is espionage and disruption, targeting government agencies, critical infrastructure, telecommunications, energy, airlines, and media, particularly in the Middle East, including Israel.11 MuddyWater employs sophisticated phishing campaigns, malware-laden documents, custom backdoors, and abuses legitimate tools like Atera for remote monitoring and management.26 It has also deployed destructive malware such as PowGoop and Thanos ransomware variants.27
- APT33 (Elfin, Magnallium): A sophisticated cyber espionage group with deep roots in Iran, active since at least 2013.11 APT33 targets sectors vital to global infrastructure, including aerospace, defense, energy, and petrochemicals, with a specific emphasis on infiltrating critical systems in the Middle East, Europe, and North America.11 Known for spear-phishing, password spraying, and credential theft, it utilizes destructive tools like StoneDrill (paralleling Shamoon malware) in high-impact attacks.26 Recent campaigns have seen the deployment of a new custom multi-stage backdoor named Tickler, leveraging Microsoft Azure infrastructure for command-and-control.26
- CyberAv3ngers: This group is suspected of being an Iranian Government-affiliated APT linked to the IRGC, active since at least 2020.7 They gained notoriety for defacing numerous water system displays in the U.S. in late 2023 and have increasingly shifted operations from technical intrusions to psychological manipulation.13 The group has been tied to at least 29 confirmed intrusions into industrial control systems (ICS) and operational technology (OT) environments in the U.S. between November 2023 and April 2024, affecting municipal water utilities, energy networks, and camera systems.13 They exploited Israeli-made Unitronics PLCs by leveraging default credentials.7 CyberAv3ngers utilizes custom Linux-based malware for persistent access 13 and IOCONTROL modular malware.26 Notably, they have employed AI tools like ChatGPT for reconnaissance, coding, and vulnerability research.26
- APT34 (OilRig, Helix Kitten, Chrysene, Earth Simnavaz): A long-standing Iranian cyberespionage group with confirmed links to the Ministry of Intelligence and Security (MOIS), active since 2014.11 OilRig primarily targets organizations in the Middle East, focusing on the financial, energy, telecom, and government sectors.11 The group is known for its modular malware, PowerShell-based tools, DNS tunneling, and custom backdoors such as Helminth, QUADAGENT, Stealthhook, MINIBIKE, and MINIBUS.26 They frequently exploit on-premises Microsoft Exchange servers and publicly known vulnerabilities for initial access.26
- Magic Hound (APT 35, Charming Kitten, Cobalt Illusion): Directly tied to the IRGC.11 This group is infamous for its extensive use of social engineering, particularly spear-phishing campaigns designed to harvest credentials or gain access to personal accounts.11 Their targets typically include journalists, researchers, human rights activists, and government officials, especially those critical of the Iranian regime.27 Magic Hound often employs fake personas (e.g., academics, journalists) to build trust and has exploited software vulnerabilities.27 Recently, it has been observed leveraging tactics similar to North Korea’s ‘Dream Job’ campaign.28
- APT 42: Reportedly affiliated with the IRGC Intelligence Organization, this group focuses on the surveillance of individuals and institutions perceived as adversarial to the Iranian regime.27 They utilize cloud-based platforms, mobile spyware, and credential phishing to collect information and monitor dissident activity.27
- Fox Kitten (Pioneer Kitten, Parisite): An Iranian state-sponsored threat group active since at least 2017.26 Fox Kitten specializes in exploiting edge infrastructure vulnerabilities, specifically targeting VPN gateways, Citrix appliances, and remote desktop solutions for initial access.7 Their operations focus on establishing long-term persistence and privilege escalation, often using open-source tools. They have reportedly sold or shared access with other Iranian APTs and have assisted ransomware affiliates by providing initial network access.26
- Agrius (TA455, Smoke Sandstorm): This Iranian threat actor is known for conducting wiper attacks disguised as ransomware, deploying malware families such as Apostle and Deadwood.27 Their primary targets are Israeli organizations.27
- Moses Staff: An Iranian-linked group that employs custom ransomware, defacement, and data leaks to embarrass or undermine targets, primarily focusing on Israeli public and private sector entities.27
- Other notable groups include Tracer Kitten (spearphishing, credential harvesting, targets Western think tanks, academic institutions, dissidents) 27,
Tortoiseshell (targets IT service providers and supply chain entities) 27,
HomeLand Justice (combines ransomware with hacktivist branding) 27, and
GreenCharlie (a newer group focusing on cyber espionage).27
Table 1: Key Iranian APT Groups, Affiliations, and Primary Tactics/Targets
| Group Name (Aliases) | Primary Affiliation | Primary Focus | Key Tactics/Tools | Typical Targets |
| MuddyWater (Seedworm, Static Kitten, TEMP.Zagros) | MOIS-linked | Espionage, Disruption | Sophisticated phishing, Malware-laden documents, Custom backdoors, Abuse of Atera RMM, PowGoop, Thanos ransomware | Government agencies, Critical infrastructure (Telecommunications, Energy), Airlines, Media, Israel, Turkey, Saudi Arabia, Azerbaijan |
| APT33 (Elfin, Magnallium) | State-sponsored | Cyber espionage, Destructive operations | Spear-phishing, Password spraying, Credential theft, StoneDrill wiper, Tickler backdoor, Microsoft Azure C2 | Aerospace, Defense, Energy, Petrochemicals, Critical infrastructure in Middle East, Europe, North America, Saudi Arabia, US, South Korea, UAE |
| CyberAv3ngers | Suspected IRGC-affiliated, Hacktivist front | Psychological operations, Disruptive attacks, ICS/OT targeting | Defacement, DDoS, Exploiting default credentials, Custom Linux malware, IOCONTROL malware, AI tools (ChatGPT) for recon/coding | U.S. water utilities, Energy networks, Camera systems, Israeli-made PLCs, Israeli infrastructure, Western institutions |
| APT34 (OilRig, Helix Kitten, Chrysene, Earth Simnavaz) | MOIS-linked | Cyber espionage | Modular malware, PowerShell tools, DNS tunneling, Custom backdoors (Helminth, QUADAGENT, Stealthhook, MINIBIKE, MINIBUS), Exploiting Microsoft Exchange & public vulnerabilities | Financial, Energy, Telecom, Government sectors across Middle East |
| Magic Hound (APT 35, Charming Kitten, Cobalt Illusion) | IRGC-tied | Cyber espionage, Credential harvesting | Social engineering, Spear-phishing, Fake personas, Exploiting software vulnerabilities, Leveraging ‘Dream Job’ campaign tactics | Journalists, Researchers, Human rights activists, Government officials critical of Iran, Aerospace industry |
| APT 42 | IRGC Intelligence Organization | Surveillance, Human intelligence collection | Cloud-based platforms, Mobile spyware, Credential phishing | Journalists, Researchers, NGOs, Iranian diaspora |
| Fox Kitten (Pioneer Kitten, Parisite) | State-sponsored | Initial access broker, Espionage | Exploiting VPN/edge infrastructure vulnerabilities (Fortinet, Citrix, F5), SSH tunneling, Mimikatz | Corporate networks, Oil & gas, Technology, Government, Defense, Healthcare, Manufacturing, Engineering (Middle East, North Africa, Europe, Australia, North America) |
| Agrius (TA455, Smoke Sandstorm) | State-sponsored | Destructive wiper attacks (disguised as ransomware) | Apostle, Deadwood malware, Legitimate remote access tools, Custom loaders | Primarily Israeli organizations |
| Moses Staff | Iranian-linked | Ransomware, Defacement, Data leaks | Custom ransomware, Telegram for public victim information | Primarily Israeli entities (public and private sector) |
C. Cyberattack Techniques and Tools
Iranian cyber actors employ a diverse toolkit and a range of techniques, often prioritizing effectiveness and psychological impact over sheer technical sophistication.
- Destructive Malware (Wipers): Iran has a history of deploying highly destructive wiper malware, such as Shamoon, which caused “considerable damage” to IT systems in 2012, 2016, and 2018.5 Other groups like APT33 employ StoneDrill 26, and Agrius utilizes Apostle and Deadwood.27 The potential for similar destructive attacks remains a significant concern, particularly as a form of retaliation.5
- Distributed Denial of Service (DDoS) Attacks: These are a frequently used tactic aimed at overwhelming target websites and services with traffic, rendering them inaccessible.7 Historical targets include Israeli radio stations, government websites, telecommunications services 30, major U.S. financial institutions (e.g., Bank of America, JPMorgan Chase, Wells Fargo in 2016) 17, and even political platforms like President Trump’s Truth Social network.5
- Phishing and Spear Phishing: These remain highly effective techniques for stealing user credentials and gaining initial access to target networks.11 Groups like Charming Kitten 11, MuddyWater 26, APT33 26, and APT 42 27 extensively use these methods, often employing deceptive tactics such as fake login pages, password reset lures, and impersonation.27
- Exploitation of Known Vulnerabilities: Iranian actors consistently exploit publicly known vulnerabilities for initial access, particularly targeting VPN gateways and firewalls from various vendors (e.g., Pulse Secure, Fortinet, Palo Alto Networks, F5, Citrix).7 Specific Common Vulnerabilities and Exposures (CVEs) previously exploited include CVE-2024-30088 (Windows Kernel), CVE-2022-47966 (Zoho ManageEngine), CVE-2022-42475 (Fortinet FortiOS), CVE-2021-34473 (Microsoft Exchange), CVE-2020-5902 (F5 BIG-IP TMUI), CVE-2020-1472 (Microsoft Windows Netlogon), and CVE-2019-19781 (Citrix ADC).7
- Targeted Intrusions into Industrial Control Systems (ICS) / Operational Technology (OT): This is a significant and growing area of focus, notably by CyberAv3ngers, who have targeted water, energy, and manufacturing sectors.7 These intrusions often leverage basic security weaknesses such as default credentials and publicly exposed systems.7 Malware like IOCONTROL is specifically designed for Unix-based IoT/OT platforms to establish persistent backdoors.26 This continued focus on ICS/OT systems underscores Iran’s intent to cause physical disruption or the
perception of it, leveraging the high societal and economic impact of such attacks. - Credential Harvesting and Brute Force Attacks: These are common methods employed to compromise networks and obtain credentials, including multi-factor authentication “push bombing” or “fatigue attacks”.15
- Abuse of Legitimate Tools: Iranian threat actors frequently abuse legitimate Remote Monitoring and Management (RMM) tools (e.g., Atera, AnyDesk, SimpleHelp, ScreenConnect, RemoteUtilities) and communication platforms like Telegram for data exfiltration and to evade detection.7
- Emerging Use of AI: CyberAv3ngers has notably leveraged AI tools, including ChatGPT, for tasks such as reconnaissance, coding, and vulnerability research, indicating a trend towards accelerating attack preparation.26 Google’s findings corroborate this, reporting that hackers from China, Iran, and North Korea are using AI-enabled Gemini chatbots to “supercharge cyberattacks,” making them more efficient.31 The adoption of AI by Iranian threat actors, even if not yet a “game changer” in terms of fundamentally new attack types, signifies a critical evolution. This implies that future attacks will be executed with greater speed, scalability, and potentially more precise target identification and initial access. This development necessitates that U.S. and Israeli defense strategies rapidly integrate AI into their own detection, analysis, and prevention mechanisms to maintain parity in the evolving cyber arms race. Proactive research into AI’s defensive applications is crucial to counter the increased efficiency of adversarial AI-assisted campaigns.
IV. Probable Targets: Critical Infrastructure and Strategic Assets in Israel and the U.S.
A. Targets in Israel
Iranian-linked groups have explicitly claimed to compromise the Israeli early warning system, Tzofar, which is crucial for alerting civilians to incoming missile attacks.30 While some claims may be exaggerated, the intent to target such critical systems is clear. Israeli radio stations, government websites, and telecommunications services have been subjected to coordinated Distributed Denial of Service (DDoS) attacks, aiming to disrupt public communication and services.30 The purported hack of Israel’s Dorad power station by CyberAv3ngers, although later debunked as psychological manipulation, demonstrated a clear intent to target energy infrastructure.13 The fact that they
claimed this attack highlights the sector’s perceived strategic value. The healthcare sector in Israel is also at risk, as evidenced by a kinetic missile strike on Soroka Medical Center 3, and general warnings about the vulnerability of healthcare and public health organizations to Iranian cyber threats.15 The pro-Israeli group Predatory Sparrow’s claims of draining $90 million from Iran’s largest crypto exchange, Nobitex, and attacking the Iranian state bank Bank Sepah 6 indicate that financial institutions are a mutual and highly contested target in the cyber domain.
B. Targets in the United States
DHS warnings consistently highlight various critical infrastructure sectors as historical and likely future targets for Iranian cyber operations. These include water systems, financial institutions, energy pipelines, and government networks.5
- Water and Wastewater: The Iranian-affiliated group CyberAv3ngers notably infiltrated U.S. water utilities in late 2023, exploiting Israeli-made programmable logic controllers (PLCs) and causing “limited but symbolic disruptions”.7
- Energy and Utilities: Oil, gas, electric grids, and pipelines have been previously targeted by Iranian threat actors.7 Historical attacks include destructive wiper malware campaigns and targeted intrusions.7 Custom malware has also been developed to target fuel management systems.5
- Healthcare: U.S. federal authorities have issued warnings about an increased risk of Iranian cyber threats against healthcare and public health sector organizations, including ransomware and DDoS attacks.15 A specific incident includes a thwarted cyberattack on Boston Children’s Hospital in 2021.17
- Transportation and Supply Chains: Ports, rail, and logistics networks have been identified as past targets, indicating their vulnerability in heightened geopolitical tensions.16
The pervasive interconnectedness and often insufficient segmentation within critical infrastructure mean that even a successful, limited breach in one part of the system can have cascading and amplified effects across multiple dependent systems and supply chains.15 This significantly increases the potential impact of an attack, making the entire ecosystem more vulnerable. This highlights that U.S. and Israeli defense strategies must adopt a holistic, ecosystem-wide approach to critical infrastructure protection, meticulously mapping and securing supply chain dependencies, and ensuring robust segmentation between IT and OT networks to contain potential breaches and prevent widespread disruption.
- Financial Institutions: A 2016 indictment revealed that seven individuals linked to the IRGC conducted DDoS attacks against major U.S. banks (e.g., Bank of America, JPMorgan Chase, Wells Fargo), resulting in tens of millions of dollars in losses.17 The financial sector is explicitly anticipated to be a target for destructive wiper and malware attacks.14
- Government Networks: DHS alerts indicate that “low-level cyber-attacks” against U.S. networks by pro-Iranian hacktivists are likely, and that government-affiliated cyber actors may conduct more direct attacks.6 Iranian hackers previously pilfered and distributed sensitive documents from President Donald Trump’s 2024 campaign.6 Cyberespionage against federal government departments is also a noted activity.14
- Psychological Targets: Beyond technical disruption, Iranian hackers may post fabricated screenshots of operational technology (OT) systems to create a “show of force” and generate psychological impact, even if full system control is not achieved.5 Influence operations, involving the use of fake accounts on social media platforms (like Telegram and X) to disseminate demoralizing messages, are also actively underway.14 Iranian cyber campaigns are fundamentally multi-faceted, aiming not just for technical compromise but equally for shaping public perception, undermining trust in institutions, and creating a sense of vulnerability. The technical attacks often serve as a pretext or a component of a larger psychological operation. This necessitates a defense strategy that seamlessly integrates traditional cybersecurity measures with robust public information campaigns and counter-disinformation efforts. Governments and critical infrastructure operators must be prepared to rapidly and transparently communicate accurate information to the public to neutralize Iranian attempts at narrative control and prevent panic.
Table 2: Historical and Likely Future Iranian Cyberattack Targets and Methods against the U.S. and Israel
| Target Sector/Entity | Year(s) of Incident(s) | Key Iranian Group(s) Involved | Primary Attack Method(s) | Impact/Objective | Likely Future Threat Level |
| U.S. Water Utilities | Late 2023, Nov 2023-Apr 2024 | CyberAv3ngers, IRGC-linked actors | Exploiting default credentials, Custom Linux malware, Defacement, Symbolic disruption | Limited but symbolic disruption, Psychological impact | High, Persistent |
| Israeli Early Warning System (Tzofar) | Recent days (June 2025) | Iranian-linked groups | Claimed compromise, DDoS | Disrupt public alerts, Psychological impact | High, Persistent |
| U.S. Financial Sector | 2016, Recent warnings | IRGC-linked actors, APTs | DDoS attacks, Destructive wiper/malware | Financial loss, Operational disruption, Psychological impact | High, Persistent |
| Israeli Financial Sector | Recent days (June 2025) | APT34 (OilRig), CyberAv3ngers | Claimed compromise (Dorad), DDoS, IOCONTROL malware | Operational disruption, Data destruction, Psychological impact | High, Persistent |
| U.S. Energy & Utilities (Oil, Gas, Electric Grids, Pipelines) | Historical, Late 2023, Recent warnings | CyberAv3ngers, APTs | Destructive wiper malware, DDoS, Targeted intrusions, Custom malware (fuel management systems) | Operational disruption, Psychological impact | High, Persistent |
| U.S. Healthcare Sector | 2021 (thwarted), Recent warnings | Iranian-linked actors, MuddyWater | Ransomware, DDoS, Brute force, MFA push bombing, Spear-phishing | Operational disruption, Data breaches, Psychological impact | High |
| U.S. Government Networks | 2024 (Trump campaign), Recent warnings | Pro-Iranian hacktivists, Government-affiliated actors, IRGC-CEC | Low-level cyberattacks, Targeted intrusions, Data pilfering, Cyberespionage, DDoS | Data theft, Disruption, Psychological impact | High, Persistent |
| U.S. Political Campaigns | 2024 | Iranian state-backed threat actors | Spear-phishing, Accessing sensitive data | Sow discord, Espionage | Persistent |
| Israeli Radio/Telecom | Recent days (June 2025) | Iranian-linked groups | Coordinated DDoS attacks | Disrupt public communication, Psychological impact | Moderate to High |
| Psychological Targets (Social Media) | Recent days (June 2025) | Iranian accounts, 313 Team | Fabricated screenshots, Demoralizing messages, DDoS (Truth Social) | Narrative control, Erosion of public trust, Psychological impact | Very High, Persistent |
V. Iran’s Cyber Collaboration and Proxy Networks
A. State-Level Cooperation
Iran’s cyber strategy is noted to be in “possible cooperation with Russia”.9 The Office of the Director of National Intelligence (ODNI) 2025 Threat Assessment explicitly states that Iran has become a “key military supplier to Russia,” particularly of Unmanned Aerial Vehicles (UAVs), and in return, Moscow has offered Tehran “military and technical support to advance Iranian weapons, intelligence, and cyber capabilities”.34 Russia is recognized for its advanced cyber capabilities and its unique experience in integrating cyberattacks with wartime military actions, which could potentially amplify its combined impact on U.S. targets in times of conflict.34 However, recent events suggest potential limitations in the practical effectiveness of this military cooperation, as Russian-supplied S-300 air defense systems proved “useless” against Israeli F-35s over Iran.24 This observed limitation in kinetic defense might influence Iran’s reliance on cyber as a primary retaliatory tool, potentially pushing it to seek more direct assistance or inspiration from its cyber allies.
With China, the 2021 China-Iran 25-Year Cooperation Agreement includes provisions for significant investments in key sectors, including energy, banking, transportation, and cybersecurity, indicating a strategic alignment and potential for deeper collaboration in the cyber domain.35 Chinese government-backed breaches of U.S. telecommunications and critical infrastructure have been documented.36 Google’s recent report indicates that Chinese hackers are actively using AI-enabled Gemini chatbots to “supercharge cyberattacks,” suggesting a shared interest in leveraging advanced technologies for offensive cyber operations.31
For North Korea, the current geopolitical climate presents an opportunity for Pyongyang to “flex its military muscle and potentially deepen ties with Iran”.37 Experts have warned of potential North Korean assistance to Iran in missile technology and and even in providing nuclear materials for “dirty bombs”.37 The ODNI 2025 Threat Assessment identifies North Korea as a state actor challenging U.S. interests through cyber operations.34 Furthermore, Iranian state-sponsored actors, specifically Charming Kitten, have been observed leveraging North Korea’s ‘Dream Job’ spear-phishing campaign tactics, although direct North Korean assistance in these specific attacks remains unclear.28 North Korean state-backed APTs are also noted for their use of AI tools like Gemini.31 While a formal, unified “axis” might be an oversimplification, there is clear evidence of technology sharing, tactical inspiration, and strategic alignment among these states in the cyber domain. This creates a more complex and interconnected adversarial ecosystem for the U.S. and its allies. U.S. and allied defenses cannot view Iranian cyber threats in isolation; they must be understood and countered within this broader, interconnected adversarial ecosystem. Enhanced intelligence sharing among allies regarding the capabilities, tactics, and intentions of all these state actors is critical.
B. State-Backed Hacktivism and Proxies
Iran frequently “may support sympathetic hacktivist groups or create fake ones as fronts for state operations” to obscure attribution and broaden its reach.8 The CyberAv3ngers group is a prime example of this strategy, blurring the lines between independent activism and state-sponsored operations, with strong and suspected ties to Iran’s IRGC.7 The “313 Team,” a Shia hacking group operating in Iraq, claimed responsibility for a DDoS attack on President Trump’s Truth Social network shortly after U.S. strikes, illustrating the role of aligned non-state actors in immediate retaliation.5
Hezbollah, a well-known Iranian proxy, is believed to have a significant presence in Latin America, including Bolivia, Chile, and the tri-border area of Argentina, Brazil, and Paraguay.39 This group has been linked to thwarted terrorism plots against Jewish and Israeli interests in the region.39 This presence suggests a potential for Iran to leverage these proxies for both physical and cyberattacks outside the immediate Middle East conflict zone. A 2023 accord between Bolivia and Iran on cybersecurity and military training further indicates Iran’s interest in expanding its influence and potentially capabilities in the region.39 Iran has a history of “attacking in an asymmetrical manner” and “reacting outside of the country”.39 The established presence of its proxies and growing state-level ties in Latin America provide a plausible avenue for Iran to conduct cyber or even kinetic attacks against U.S. or Israeli interests in a geographically distant and potentially less fortified theater. This means the theater of potential conflict extends beyond the immediate Middle East, requiring U.S. and Israeli intelligence and defense agencies to expand their vigilance and intelligence sharing with Latin American partners to monitor and preempt potential Iranian proxy activities in this region.
VI. U.S. Defense and Protection Strategies Against Iranian Cyber Threats
A. Key Government Agencies
The United States employs a multi-agency, collaborative approach to cyber defense against threats like those posed by Iran.
- Cybersecurity and Infrastructure Security Agency (CISA): CISA is the designated national leader for understanding, managing, and reducing risk to U.S. cyber and physical infrastructure.19 It serves as the operational lead for federal cybersecurity and the national coordinator for critical infrastructure security and resilience.19 CISA actively provides timely alerts, advisories, and comprehensive resources, including the crucial Known Exploited Vulnerabilities (KEV) Catalog, to both government and private sector entities.40 Its strategic plan (2023-2025) emphasizes spearheading national cyber defense and mitigating significant cyber risks to National Critical Functions.23 CISA also plays a pivotal role in coordinating incident response across public and private sectors.41
- National Security Agency (NSA): The NSA leads the U.S. government in cryptology, signals intelligence (SIGINT), and cybersecurity.21 Its core cybersecurity mission is to prevent and eradicate threats to U.S. national security systems, with a particular focus on the Defense Industrial Base (DIB) and enhancing weapons systems security.21 The NSA develops advisories and mitigations for evolving cybersecurity threats and engages in combined defense and offense operations with key government partners.42 It also collaborates with CISA on developing cybersecurity guidance.43
- Department of Homeland Security (DHS): DHS issues National Terrorism Advisory System (NTAS) bulletins to warn the public and private sectors about potential cyber threats, including those from Iran.4 DHS administers the Cyber Safety Review Board (CSRB) through CISA, fostering public-private collaboration in incident review.19
- Federal Bureau of Investigation (FBI): The FBI actively collaborates with CISA and NSA, issuing joint advisories regarding Iranian cyber threats.15 It is involved in investigating and disrupting Iranian plots on U.S. soil, including both kinetic and cyber threats.44
- U.S. Cyber Command (USCYBERCOM): USCYBERCOM is a unified combatant command of the Department of Defense (DoD) responsible for unifying cyberspace operations, strengthening DoD cyber capabilities, and bolstering cyber expertise.20 It operates in both defensive and offensive cyber operations, with missions including U.S. election defense, counter-ransomware operations, global hunt operations to combat foreign malicious cyber actors, and providing support to national security operations.20 USCYBERCOM’s Cyber National Mission Force (CNMF) conducts global hunt operations to identify malicious cyber activity and vulnerabilities on significant networks, having been requested in 18 countries and over 50 foreign networks since 2018.20
B. National Cybersecurity Strategy and Frameworks
U.S. cyber defense is guided by comprehensive national strategies and frameworks designed to enhance resilience and response capabilities. President Biden’s National Cybersecurity Strategy aims to rebalance the responsibility for cyber defense onto more capable actors and realign incentives for long-term cybersecurity investments.22 The National Cybersecurity Strategy Implementation Plan (NCSIP) serves as a roadmap, outlining 100 high-impact initiatives across five pillars, including setting cybersecurity requirements for critical infrastructure sectors, integrating federal cybersecurity centers, and disrupting and dismantling threat actors.22
CISA’s 2023-2025 Strategic Plan further details the agency’s commitment to spearhead national cyber defense, reduce risks to critical infrastructure, and strengthen “whole-of-nation operational collaboration and information sharing”.23 This emphasis on collaboration extends to state, local, tribal, and territorial (SLTT) governments, the private sector, and international partners.19
The National Institute of Standards and Technology (NIST) provides foundational guidelines for cybersecurity, including the NIST framework for incident response. This framework outlines a structured process for organizations to prepare for, detect, contain, and recover from security incidents, emphasizing continuous improvement.46 Federal agencies are mandated to adhere to NIST guidelines for demonstrating incident response capabilities under the Federal Information Security Modernization Act (FISMA).47
C. Defensive Measures and Best Practices
Effective defense against Iranian cyber threats requires a multi-layered approach incorporating both technical and procedural measures.
- Vulnerability Management and Patching: Prioritizing the patching of known vulnerabilities, especially those previously exploited by Iranian threat actors, is critical.7 This includes vulnerabilities in Windows Kernel (CVE-2024-30088), Zoho ManageEngine (CVE-2022-47966), Fortinet FortiOS (CVE-2022-42475), Microsoft Exchange (CVE-2021-34473), F5 BIG-IP TMUI (CVE-2020-5902), Microsoft Windows Netlogon (CVE-2020-1472), and Citrix ADC (CVE-2019-19781).7 CISA and NSA also issue guidance on reducing memory-related vulnerabilities in software development.43
- Access Control and Authentication: Enforcing strong, unique passwords across all systems and enabling multi-factor authentication (MFA) for all accounts are fundamental.7 Monitoring for credential reuse, especially for administrative accounts, is also advised.16 Iranian government-affiliated actors are known to utilize brute force methods, such as password spraying and MFA “push bombing,” to compromise networks and obtain credentials.15
- Network Segmentation and Hardening: Robust network segmentation is crucial to limit the impact of potential compromises and prevent lateral movement to sensitive operational networks, particularly between IT and OT layers.7 Disabling unused services or ports and minimizing internet exposure of ICS/SCADA devices are essential hardening measures.7 The continued targeting of legacy and poorly secured ICS/OT systems, often through default credentials and publicly exposed systems, highlights that fundamental cyber hygiene remains a paramount defensive measure.7
- Incident Response Planning: Organizations must have a well-defined and regularly tested Incident Response Plan (IRP) that includes clear escalation paths, communication protocols, and backup procedures.16 This aligns with the NIST incident response framework, which emphasizes preparation, detection/analysis, containment/eradication, and post-incident activity.46
- Threat Intelligence Sharing: Leveraging threat intelligence is critical for strengthening cybersecurity defenses, allowing organizations to anticipate and mitigate risks proactively.48 Government agencies encourage this sharing, especially in regulated industries like finance and critical infrastructure.48 Platforms like the Cyber Threat Alliance (CTA) facilitate secure, timely exchange of threat intelligence among cybersecurity companies.48
- Supply Chain Security: Given the increasing reliance on third-party vendors and the potential for supply chain compromise, securing the supply chain is vital.32 The FDA emphasizes embedding cybersecurity into advanced technologies used in medical product manufacturing, and federal programs like FedRAMP ensure security requirements for cloud systems.33
- Cyber Hygiene and Awareness Training: Embedding cyber hygiene in society from an early age is crucial, as the human factor remains the weakest link in the cybercrime chain, responsible for almost 70% of incidents.36 Ongoing cybersecurity awareness training for employees empowers them to recognize and mitigate cyber risks effectively.7
D. International Cooperation and Information Sharing
In an era where cyber threats seamlessly bypass national boundaries, focusing solely on internal cyber defense is inadequate.36 The globalized technology market means devices and software are built from components sourced worldwide, including from potential adversaries, making it impossible for a country to be resilient against cybercrimes by protecting only its borders.36
Over the past few years, all NATO member states have made significant efforts to enhance cross-border collaboration and counter emerging cyber threats.36 Rapid intelligence sharing, multinational cyber drills (like TRYZUB, which leverages Ukrainian experience with Russian APTs), and public-private partnerships are crucial for strengthening cyber resilience and staying ahead of adversaries.36 These partnerships, such as those between Ukrainian state cyber forces and U.S.-based companies, demonstrate effective models for sharing war-tested experience in withstanding advanced persistent threats.36
VII. Conclusions and Recommendations
The escalating geopolitical tensions between Iran, Israel, and the United States have significantly heightened the risk of a widespread and impactful cyberattack campaign. Iran, facing limitations in conventional military capabilities, views cyber warfare as a primary asymmetric tool for retaliation, deterrence, and, crucially, psychological manipulation. Its cyber strategy is characterized by centralized control but decentralized execution, often leveraging state-backed hacktivist groups to obscure attribution and amplify perceived impact. The increasing adoption of AI tools by Iranian actors signals a future where attacks will be more efficient and scalable. Furthermore, the persistent targeting of legacy and poorly secured Industrial Control Systems (ICS) and Operational Technology (OT) highlights a pragmatic focus on high-impact targets with easily exploitable vulnerabilities.
The interconnectedness of critical infrastructure means that even limited breaches can have cascading effects, posing a dual threat of technical disruption and information warfare aimed at eroding public trust. While Iran’s state-level cyber collaborations with Russia, China, and North Korea create a complex adversarial ecosystem, the practical effectiveness of these partnerships in all domains may vary, potentially driving Iran to lean more heavily on its indigenous cyber capabilities and less sophisticated, high-volume attacks. The potential for Iranian proxies, such as Hezbollah, to conduct cyber or kinetic operations in regions like Latin America also expands the theater of concern beyond the immediate Middle East.
To effectively protect itself against this evolving threat, the United States should implement the following recommendations:
- Prioritize Fundamental Cyber Hygiene and Resilience: Aggressively enforce patching of known vulnerabilities, particularly those in the CISA KEV Catalog, and ensure robust multi-factor authentication across all systems. Critical infrastructure operators must prioritize network segmentation, minimize internet exposure of ICS/SCADA devices, and change all default passwords. These basic measures remain the most effective defense against many common Iranian tactics.
- Enhance AI-Driven Defense Capabilities: Rapidly integrate AI into U.S. cyber defense mechanisms for detection, analysis, and prevention. Proactive research into AI’s defensive applications is crucial to counter the increased efficiency of adversarial AI-assisted campaigns.
- Strengthen Public Communication and Counter-Disinformation: Develop and execute robust public communication strategies to counter Iranian psychological operations. This includes rapidly and transparently communicating accurate information during and after cyber incidents to neutralize Iranian attempts at narrative control and prevent public panic. Avoid inadvertently amplifying exaggerated claims by Iranian actors.
- Deepen Intelligence Sharing and International Collaboration: Intensify intelligence sharing with allies, particularly Israel and NATO partners, regarding the evolving tactics, techniques, and procedures (TTPs) of Iranian APTs and their state-level collaborators (Russia, China, North Korea). Engage in more multinational cyber drills and public-private partnerships to enhance collective defense capabilities and share lessons learned from real-world incidents.
- Expand Vigilance to Non-Traditional Theaters: Extend intelligence gathering and defensive measures to regions like Latin America, where Iranian proxies may seek to exploit “soft targets” to conduct cyber or kinetic attacks against U.S. or Israeli interests. This requires a broader geopolitical and cybersecurity lens to anticipate and mitigate threats.
- Reinforce Supply Chain Security: Implement stringent cybersecurity requirements for all third-party vendors and supply chain entities, especially those involved in critical infrastructure, to mitigate the risk of compromise through trusted suppliers.
Works cited
- Intense Israeli strikes hit Tehran after Trump demands ‘unconditional surrender’, accessed June 24, 2025, https://apnews.com/article/israel-iran-missile-attacks-nuclear-news-tehran-trump-06-17-2025-3f08988b5e8fd375645967b6e22916f3
- Travel disruptions still hit Middle East in wake of US-Israel-Iran conflict, accessed June 24, 2025, https://www.aljazeera.com/news/2025/6/24/travel-disruptions-still-hit-middle-east-in-wake-of-us-israel-iran-conflict
- Trump says he’ll decide whether US will directly attack Iran within 2 weeks, accessed June 24, 2025, https://apnews.com/article/israel-iran-attacks-nuclear-news-06-19-2025-b508817b78ed8d2f6067c1516215cf94
- The Latest: US claims strikes on Iran’s nuclear sites caused severe damage but full impact unclear, accessed June 24, 2025, https://apnews.com/article/israel-palestinians-iran-war-latest-06-22-2025-7ab46578cb56feecc16f4e4940a46e0a
- Warnings Ratchet Over Iranian Cyberattack – BankInfoSecurity, accessed June 24, 2025, https://www.bankinfosecurity.com/warnings-ratchet-over-iranian-cyberattack-a-28793
- DHS expects Iran’s cyber forces will target US networks after strikes on nuclear sites, accessed June 24, 2025, https://www.nextgov.com/cybersecurity/2025/06/dhs-expects-irans-cyber-forces-will-target-us-networks-after-strikes-nuclear-sites/406214/
- Cybersecurity Risks Amid Rising Iran–U.S. Tensions – Arctic Wolf, accessed June 24, 2025, https://arcticwolf.com/resources/blog/cybersecurity-risks-amid-rising-iran-u-s-tensions/
- Bay Area technology experts comment on possibility of cyberattacks following U.S. strikes on Iran – CBS News, accessed June 24, 2025, https://www.cbsnews.com/sanfrancisco/news/us-iran-strikes-potential-cyberattacks-bay-area-tech-experts-comment/
- NTAS bulletin highlights rising cyber, terror threats to US critical infrastructure from Iran-linked hackers, accessed June 24, 2025, https://industrialcyber.co/threat-landscape/ntas-bulletin-highlights-rising-cyber-terror-threats-to-us-critical-infrastructure-from-iran-linked-hackers/
- US Warns of Heightened Risk of Iranian Cyber-Attacks After Military Strikes, accessed June 24, 2025, https://www.infosecurity-magazine.com/news/us-risk-iranian-cyber-attacks/
- Iran’s cyber capabilities and hackers – German Lawyer Ferner, accessed June 24, 2025, https://www.ferner-alsdorf.com/irans-cyber-capabilities-and-hackers/
- Analysis: Unpacking Iran’s counterintelligence apparatus – FDD’s Long War Journal, accessed June 24, 2025, https://www.longwarjournal.org/archives/2025/02/analysis-unpacking-irans-counterintelligence-apparatus.php
- Report: Iranian hackers are trying to create a psychological war in cyberspace – Nextgov, accessed June 24, 2025, https://www.nextgov.com/cybersecurity/2025/06/report-iranian-hackers-are-trying-create-psychological-war-cyberspace/406267/
- Iran cyberattacks against US biz more likely following air strikes – The Register, accessed June 24, 2025, https://www.theregister.com/2025/06/23/iran_cyberattacks_against_us/
- Feds Warn Healthcare Sector of Rising Iranian Cyberthreats – BankInfoSecurity, accessed June 24, 2025, https://www.bankinfosecurity.com/feds-warn-healthcare-sector-rising-iranian-cyberthreats-a-28804
- Cyber Threats to U.S. Critical Infrastructure: What’s Going On and How to Stay Prepared, accessed June 24, 2025, https://www.bitlyft.com/resources/cyber-threats-to-u.s.-critical-infrastructure-whats-going-on-and-how-to-stay-prepared
- Iran may hit US with ‘high-impact’ cyberattack as Israel tensions rise, expert warns, accessed June 24, 2025, https://www.fox5dc.com/news/iran-may-hit-us-high-impact-cyberattack-israel-tensions-rise-expert-warns
- Cyber Threats Linked to Iran-Israel Conflict – ReliaQuest, accessed June 24, 2025, https://reliaquest.com/blog/cyber-threats-linked-to-iran-israel-conflict/
- Cybersecurity | Homeland Security, accessed June 24, 2025, https://www.dhs.gov/topics/cybersecurity
- United States Cyber Command – Wikipedia, accessed June 24, 2025, https://en.wikipedia.org/wiki/United_States_Cyber_Command
- About the National Security Agency – Intelligence Careers, accessed June 24, 2025, https://www.intelligencecareers.gov/nsa/about-nsa
- NATIONAL CYBERSECURITY STRATEGY IMPLEMENTATION PLAN – Biden White House Archives, accessed June 24, 2025, https://bidenwhitehouse.archives.gov/wp-content/uploads/2024/05/National-Cybersecurity-Strategy-Implementation-Plan-Version-2.pdf
- Strategic Plan – CISA, accessed June 24, 2025, https://www.cisa.gov/strategic-plan
- Russiaworld, Iran and a Cascade of Collapse – CEPA, accessed June 24, 2025, https://cepa.org/article/russiaworld-iran-and-a-cascade-of-collapse/
- Islamic Revolutionary Guard Corps Cyber Command – Wikipedia, accessed June 24, 2025, https://en.wikipedia.org/wiki/Islamic_Revolutionary_Guard_Corps_Cyber_Command
- Middle East Geopolitical Tensions Driving the Evolution of AI-Driven …, accessed June 24, 2025, https://www.cyberproof.com/blog/middle-east-geopolitical-tensions-driving-the-evolution-of-ai-driven-cyber-warfare/
- Inside the Shadows: Understanding Active Iranian APT Groups, accessed June 24, 2025, https://www.picussecurity.com/resource/blog/understanding-active-iranian-apt-groups
- Iranian hackers now leveraging NK’s ‘Dream Job’ campaign – Field Effect, accessed June 24, 2025, https://fieldeffect.com/blog/iranian-hackers-now-leveraging-nks-dream-job-campaign
- Feds Warn Healthcare Sector of Rising Iranian Cyberthreats, accessed June 24, 2025, https://www.govinfosecurity.com/feds-warn-healthcare-sector-rising-iranian-cyberthreats-a-28804
- Cyber war: Iranian & Israeli hackers in a systems war | IT Security – BearingPoint Store, accessed June 24, 2025, https://bearingpoint.services/it-security/en/know-how/cybersecurity-insights-cyberattacks-iran-israel-critical-infrastructure/
- Generative AI makes Chinese, Iranian hackers more efficient, report says – VOA, accessed June 24, 2025, https://www.voanews.com/a/generative-ai-makes-chinese-iranian-hackers-more-efficient-report-says/7956403.html
- Top 10 Cybersecurity Risks Threatening Critical Infrastructure Today …, accessed June 24, 2025, https://www.certrec.com/blog/top-10-cybersecurity-risks-threatening-critical-infrastructure-today/
- FDA warns of public health risks from lax cybersecurity in medical …, accessed June 24, 2025, https://industrialcyber.co/medical/fda-warns-of-public-health-risks-from-lax-cybersecurity-in-medical-product-manufacturing-calls-for-stronger-standards/
- ODNI 2025 Threat Assessment notes threats from Russia, China, Iran, North Korea targeting critical infrastructure, telecom – Industrial Cyber, accessed June 24, 2025, https://industrialcyber.co/reports/odni-2025-threat-assessment-notes-threats-from-russia-china-iran-north-korea-targeting-critical-infrastructure-telecom/
- War in Iran: China’s Short- and Long-term Strategic Calculations – The Diplomat, accessed June 24, 2025, https://thediplomat.com/2025/06/war-in-iran-chinas-short-and-long-term-strategic-calculations/
- Bridging the Gap in Cross-Border Cyber Defense Strategies …, accessed June 24, 2025, https://www.afcea.org/signal-media/cyber-edge/bridging-gap-cross-border-cyber-defense-strategies
- Experts Assess Iran Strikes, Response and What Comes Next – The Cipher Brief, accessed June 24, 2025, https://www.thecipherbrief.com/experts-assess-strikes-response-and-what-comes-next
- Cyber Crossroads in the Indo-Pacific | CNAS, accessed June 24, 2025, https://www.cnas.org/publications/reports/cyber-crossroads-in-the-indo-pacific
- Explainer: Iran’s Relationship with Latin America – AS/COA, accessed June 24, 2025, https://www.as-coa.org/articles/explainer-irans-relationship-latin-america
- Cyber Threats and Advisories | Cybersecurity and Infrastructure …, accessed June 24, 2025, https://www.cisa.gov/topics/cyber-threats-and-advisories
- National Cybersecurity Incident Response Plan – FDD, accessed June 24, 2025, https://www.fdd.org/analysis/2025/02/12/national-cybersecurity-incident-response-plan/
- NSA Cybersecurity – National Security Agency, accessed June 24, 2025, https://www.nsa.gov/Cybersecurity/Overview/
- New Guidance Released for Reducing Memory-Related … – CISA, accessed June 24, 2025, https://www.cisa.gov/news-events/alerts/2025/06/24/new-guidance-released-reducing-memory-related-vulnerabilities
- As US cities heighten security, Iran’s history of reprisal points to murder-for-hire plots, accessed June 24, 2025, https://apnews.com/article/iran-fbi-justice-department-46d6b7dec78dca861a32c901f8e3b307
- en.wikipedia.org, accessed June 24, 2025, https://en.wikipedia.org/wiki/United_States_Cyber_Command#:~:text=The%20Cyber%20National%20Mission%20Force%20operates%20in%20both%20defensive%20and,support%20to%20national%20security%20operations.
- NIST Incident Response: 4-Step Life Cycle, Templates and Tips – Cynet, accessed June 24, 2025, https://www.cynet.com/incident-response/nist-incident-response/
- NIST Incident Response: Framework and Key Recommendations – BlueVoyant, accessed June 24, 2025, https://www.bluevoyant.com/knowledge-center/nist-incident-response-framework-and-key-recommendations
- Threat Intelligence Sharing: Can Competitors Collaborate To Strengthen Cyber Defense?, accessed June 24, 2025, https://brandefense.io/blog/drps/threat-intelligence-sharing-cyber-defense/


Leave a reply to Inside Iran’s Cyber Objectives: What Do They Want? – BearyAngry Cancel reply