New analysis from Broadcom’s Symantec and Carbon Black Menace Hunter Staff has found proof of an Iranian hacking group embedding itself in a number of U.S. firms’ networks, together with banks, airports, non-profit, and the Israeli arm of a software program firm.
The exercise has been attributed to a state-sponsored hacking group known as MuddyWater (aka Seedworm). It is affiliated with the Iranian Ministry of Intelligence and Safety (MOIS). The marketing campaign is assessed to have begun in early February, with current exercise detected following U.S. and Israeli army strikes on Iran.
“The software company is a supplier to the defense and aerospace industries, among others, and has a presence in Israel, with the company’s Israel operation seeming to be the target in this activity,” the safety vendor mentioned in a report shared with The Hacker Information.
The assaults focusing on the software program firm, in addition to a U.S. financial institution and a Canadian non-profit, have been discovered to pave the best way for a beforehand unknown backdoor dubbed Dindoor, which leverages the Deno JavaScript runtime for execution. Broadcom mentioned it additionally recognized an try and exfiltrate information from the software program firm utilizing the Rclone utility to a Wasabi cloud storage bucket. Nonetheless, it is at the moment not recognized if the trouble paid off.
Additionally discovered within the networks of a U.S. airport and a non-profit was a separate Python backdoor known as Fakeset, which was downloaded from servers belonging to Backblaze, an American cloud storage and information backup firm. The digital certificates used to signal Fakeset has additionally been used to signal Stagecomp and Darkcomp malware, each beforehand linked to MuddyWater.
“While this malware wasn’t seen on the targeted networks, the use of the same certificates suggests the same actor — namely Seedworm — was behind the activity on the networks of the U.S. companies,” Symantec and Carbon Black mentioned.
“Iranian threat actors have become increasingly proficient in recent years. Not only has their tooling and malware improved, but they’ve also demonstrated strong social engineering capabilities, including spear-phishing campaigns and ‘honeytrap’ operations used to build relationships with targets of interest to gain access to accounts or sensitive information.”
The findings come in opposition to the backdrop of an escalating army battle in Iran, triggering a barrage of cyber assaults within the digital sphere. Latest analysis from Examine Level has uncovered the pro-Palestinian hacktivist group often called Handala Hack (aka Void Manticore) routing its operations via Starlink IP ranges to probe externally going through functions for misconfigurations and weak credentials.
In current months, a number of Iran-nexus adversaries, equivalent to Agrius (aka Agonizing Serpens, Marshtreader, and Pink Sandstorm), have additionally noticed scanning for weak Hikvision cameras and video intercom options utilizing recognized safety flaws equivalent to CVE-2017-7921 and CVE-2023-6895.
The focusing on, per Examine Level, has intensified within the wake of the present Center East battle. The exploitation makes an attempt in opposition to IP cameras have witnessed a surge in Israel and Gulf nations, together with the U.A.E., Qatar, Bahrain, and Kuwait, together with Lebanon and Cyprus. The exercise has singled out cameras from Dahua and Hikvision, weaponizing the 2 aforementioned vulnerabilities, in addition to CVE-2021-36260, CVE-2025-34067, and CVE-2021-33044.
“Taken together, these findings are consistent with the assessment that Iran, as part of its doctrine, leverages camera compromise for operational support and ongoing battle damage assessment (BDA) for missile operations, potentially in some cases prior to missile launches,” the corporate mentioned.
“As a result, tracking camera-targeting activity from specific, attributed infrastructures may serve as an early indicator of potential follow-on kinetic activity.”
The U.S. and Israel’s struggle with Iran has additionally prompted an advisory from the Canadian Centre for Cyber Safety (CCCS), which cautioned that Iran will seemingly use its cyber equipment to stage retaliatory assaults in opposition to essential infrastructure and knowledge operations to additional the regime’s pursuits.
Another key developments which have unfolded in current days are listed beneath –
- Israeli intelligence companies hacked into Tehran’s in depth site visitors digicam community for years to observe the actions of bodyguards of Ayatollah Ali Khamenei and different prime Iranian officers within the lead as much as the assassination of the supreme chief final week, the Monetary Instances reported.
- Iran’s Islamic Revolutionary Guard Corps (IRGC) focused Amazon’s information middle in Bahrain for the corporate’s help of the “enemy’s military and intelligence activities,” state media Fars Information Company mentioned on Telegram.
- Energetic wiper campaigns are mentioned to be underway in opposition to Israeli vitality, monetary, authorities, and utilities sectors. “Iran’s wiper arsenal includes 15+ families (ZeroCleare, Meteor, Dustman, DEADWOOD, Apostle, BFG Agonizer, MultiLayer, PartialWasher, and others),” Anomali mentioned.
- Iranian state-sponsored APT teams like MuddyWater, Charming Kitten, OilRig, Elfin, and Fox Kitten “demonstrated clear signs of activation and rapid retooling, positioning themselves for retaliatory operations amid the escalating conflict,” LevelBlue mentioned, including “cyber represents one of Iran’s most accessible asymmetric tools for retaliation against Gulf states that condemned its attacks and support U.S. operations.”
- In line with Flashpoint, an enormous #OpIsrael cyber marketing campaign involving pro-Russian and pro-Iranian actors has focused Israeli industrial management methods (ICS) and authorities portals throughout Kuwait, Jordan, and Bahrain. The marketing campaign is pushed by NoName057(16), Handala Hack, Fatemiyoun Digital Staff, and Cyber Islamic Resistance (aka 313 Staff).
- Between 28 February 2026 and a couple of March 2026, pro-Russia hacktivist group Z-Pentest claimed duty for compromising a number of U.S.-based entities, together with ICS and SCADA methods and a number of CCTV networks. “The timing of these unverified claims, coinciding with Operation Epic Fury, suggests Z-Pentest likely began prioritizing U.S. entities as targets,” Adam Meyers, head of Counter Adversary Operations at CrowdStrike, instructed The Hacker Information.
“Iran’s offensive cyber capability has matured into a durable instrument of state power used to support intelligence collection, regional influence, and strategic signaling during periods of geopolitical tension,” UltraViolet Cyber mentioned. “A defining feature of Iran’s current cyber doctrine is its emphasis on identity and cloud control planes as the primary attack surface.”
“Rather than prioritizing zero-day exploitation or highly novel malware at scale, Iranian operators tend to focus on repeatable access techniques such as credential theft, password spraying, and social engineering, followed by persistence through widely deployed enterprise services.”
Organizations are suggested to bolster their cybersecurity posture, strengthen monitoring capabilities, restrict publicity to the web, disable distant entry to operational know-how (OT) methods, implement phishing-resistant multi-factor authentication (MFA), implement community segmentation, take offline backups, and make sure that all internet-facing functions, VPN gateways, and edge gadgets are up-to-date
“Western organizations should continue to remain on high-alert for potential cyber response as the conflict continues and activity may move beyond hacktivism and into destructive operations,” Meyers mentioned.



