top of page

Subscribe to our newsletter

Iran’s Cyberwar Has Begun: Targeted Attacks on Israeli and Unitronics ICS/OT Systems, Threat Intelligence and Mitigation Insights (2026)

  • Mar 4
  • 5 min read
Image for post about research Iran's cyberwar has begun (The Register)

Executive Summary

Publication Date: March 2, 2026

The Register’s March 2, 2026 report, “Iran’s cyberwar has begun,” marks a significant escalation in Iranian state-sponsored cyber operations following recent US and Israeli missile strikes. Iranian Advanced Persistent Threat (APT) groups have launched a coordinated campaign targeting Israel, Persian Gulf states, and organizations with US or Israeli ties. The campaign leverages advanced reconnaissance, custom malware, ransomware, distributed denial-of-service (DDoS) attacks, and a sophisticated disinformation apparatus. This advisory synthesizes the latest technical intelligence, threat actor tactics, and mitigation recommendations, providing actionable insights for executive and technical stakeholders.

Technical Information

Strategic Context

The current Iranian cyber offensive is a direct response to kinetic military actions in the region. The campaign is characterized by its multi-vector approach, targeting both critical infrastructure and psychological resilience through information warfare. The Register and corroborating sources report that Iranian APTs, including Cotton Sandstorm (also known as Haywire Kitten and Altoufan Team), CyberAv3ngers, and the Cyber Islamic Resistance, are orchestrating attacks with a focus on operational technology (OT), industrial control systems (ICS), and supply chain vulnerabilities.

Attack Vectors and Tactics

Reconnaissance and Initial Access

Beginning in early February 2026, Iranian actors initiated a surge in reconnaissance against APIs and mobile applications integral to government operations in Israel and the Persian Gulf. According to Approov CEO Ted Miracco, these probes were highly targeted, seeking to enumerate exposed endpoints and identify exploitable vulnerabilities. The activity paused briefly during Iran’s nationwide internet blackout on February 27, then resumed with increased sophistication.

Malware Staging and Delivery

Prior to the missile strikes, threat intelligence from Binary Defense and Check Point Research observed the staging of custom malware, notably the modular infostealer WezRat. Delivered via spearphishing campaigns, WezRat masquerades as urgent software updates, exploiting user trust and leveraging social engineering to gain initial access. The malware is capable of credential harvesting, lateral movement, and establishing persistent command and control (C2) channels.

Ransomware and DDoS Operations

The deployment of WhiteLock ransomware against Israeli targets marks a return to state-sponsored ransomware as a tool for both disruption and financial gain. Iranian actors have also orchestrated DDoS attacks, targeting critical infrastructure and government portals to degrade operational capacity and sow uncertainty. These attacks are often synchronized with disinformation campaigns to maximize psychological impact.

Disinformation and Psychological Operations

Iranian cyber actors have amplified their operations with extensive disinformation campaigns across social media platforms. These campaigns are designed to exaggerate the scale and impact of cyberattacks, erode public trust, and manipulate geopolitical narratives. Many claims of successful attacks remain unverified, underscoring the importance of corroborating incident reports with trusted threat intelligence sources.

Threat Actor Profiles

Cotton Sandstorm (Haywire Kitten, Altoufan Team)

Affiliated with the Islamic Revolutionary Guard Corps (IRGC), Cotton Sandstorm has resumed operations after a period of dormancy. The group specializes in spearphishing, custom malware deployment, and ransomware attacks, with a recent focus on Bahrain and other Gulf states. Their Tactics, Techniques, and Procedures (TTPs) align with MITRE ATT&CK techniques such as Spearphishing (T1566.001) and Data Encrypted for Impact (T1486).

CyberAv3ngers

This group has a documented history of targeting US and Israeli water and fuel management systems, exploiting default credentials on Unitronics programmable logic controllers (PLCs) and human-machine interfaces (HMIs). Their campaigns in 2023 and 2024 demonstrated the ability to remotely manipulate critical infrastructure, with public bragging on Telegram channels serving both operational and psychological objectives.

Cyber Islamic Resistance and APT IRAN

These actors have claimed responsibility for sabotage operations against Jordanian infrastructure and unauthorized access to Israeli routers. While technical details remain sparse, their activities highlight the expanding geographic scope of Iranian cyber operations.

Exploitation in the Wild

Industrial Control Systems (ICS) and Operational Technology (OT)

Multiple Iranian-aligned groups have claimed successful compromises of ICS and OT assets in Israel, Poland, Turkey, Jordan, and Gulf countries. The exploitation of Unitronics PLCs and HMIs, particularly those exposed to the internet with default credentials, remains a critical vulnerability. The CyberAv3ngers campaign, detailed in a December 2023 CISA alert, underscores the persistent risk to organizations utilizing Israeli-origin OT/ICS equipment.

Supply Chain and Third-Party Risks

Organizations with Israeli technology in their supply chain, even if not directly connected to Israel, face elevated risk. The targeting of APIs and mobile applications used by regional governments further expands the attack surface, necessitating rigorous third-party risk management and continuous monitoring.

Ransomware and DDoS Impact

The deployment of WhiteLock ransomware and coordinated DDoS attacks has resulted in operational disruptions for several Israeli entities. While the full extent of the impact is still being assessed, these attacks demonstrate the adversaries’ capability to blend destructive and disruptive tactics.

Technical Indicators and MITRE ATT&CK Mapping

Spearphishing (T1566.001): Delivery of WezRat and other malware via email lures mimicking urgent software updates.

Command and Control (T1071): Establishment of persistent C2 channels for remote access and lateral movement within compromised networks.

Data Encrypted for Impact (T1486): Deployment of WhiteLock ransomware to encrypt critical data and demand ransom payments.

Impair Process Control (T0813): Manipulation of PLCs and HMIs in water and fuel management systems, potentially leading to physical process disruption.

Disinformation (T1582): Orchestration of social media campaigns to spread fear, uncertainty, and doubt regarding the scope and success of cyber operations.

Indicators of Compromise (IOCs)

Malware:WezRat (modular infostealer), WhiteLock ransomware, custom ICS/OT malware attributed to CyberAv3ngers.

Infrastructure: Internet-accessible Unitronics PLCs and HMIs with default credentials, Telegram channels used for operational bragging and coordination.

Targeted Products:Unitronics Vision Series PLCs and HMIs (all versions with default credentials), unspecified government APIs and mobile applications in Israel and the Persian Gulf, Israeli-origin OT/ICS equipment, and internet routers in Israel.

Impact Assessment

The current Iranian cyber campaign represents a significant escalation in both scale and sophistication. The blending of technical attacks with psychological operations increases the challenge for defenders, as organizations must contend with both tangible disruptions and the intangible effects of disinformation. The targeting of critical infrastructure, particularly ICS and OT assets, raises the potential for real-world consequences beyond data loss or financial impact.

Recommendations

Organizations operating in or with ties to Israel, the Persian Gulf, or the United States—especially those in critical infrastructure sectors—should immediately review their exposure to the following risks:

Monitor for spearphishing campaigns leveraging urgent software update lures, and ensure robust email filtering and user awareness training are in place. Audit and secure ICS/OT systems, with particular attention to Unitronics PLCs and HMIs; change default credentials, restrict internet exposure, and apply available security patches. Implement continuous monitoring for ransomware and DDoS activity, and establish incident response protocols tailored to blended cyber-physical threats. Validate all claims of cyberattacks through trusted threat intelligence sources to avoid falling victim to disinformation campaigns. Strengthen third-party risk management processes, focusing on suppliers and partners utilizing Israeli-origin technology.

References

Rescana is here for you

Rescana’s Third-Party Risk Management (TPRM) platform empowers organizations to continuously monitor, assess, and mitigate cyber risks across their entire supply chain. Our advanced analytics and threat intelligence capabilities provide actionable insights, enabling proactive defense against emerging threats. Whether you are concerned about supply chain vulnerabilities, critical infrastructure exposure, or the evolving tactics of state-sponsored actors, Rescana delivers the visibility and control you need to stay secure. We are happy to answer questions at ops@rescana.com.

bottom of page