🚀 CloudSEK has raised $19M Series B1 Round – Powering the Future of Predictive Cybersecurity
Read More
CloudSEK uncovered a surge in Iran-linked cyberattacks targeting Israel and its allies. Groups like APT42, APT34, MuddyWater, and hacktivist Handala are conducting espionage, data theft, and DDoS attacks. These actors use phishing, credential theft, and stealthy tools to infiltrate sensitive sectors. CloudSEK advises organizations to patch vulnerabilities, monitor DNS traffic, and enforce zero-trust security policies.
Proactively monitor and defend your organization against threats from the dark web with CloudSEK XVigil.
Schedule a DemoThis report outlines the evolution and current capabilities of Iran-aligned cyber threat actors, particularly in the context of heightened Iran-Israel geopolitical tensions. Iran's offensive cyber operations are orchestrated primarily by the Islamic Revolutionary Guard Corps (IRGC) and the Ministry of Intelligence and Security (MOIS), often executed through contractors and proxies like Emennet Pasargad and Afkar System. While there are numerous actors affiliated with the Iranian-state, key actors include APT42, focused on espionage via social engineering and cloud compromise; MuddyWater, leveraging PowerShell and public exploits under MOIS direction; and APT34, a stealthy group employing DNS tunneling and supply chain attacks. Recent escalations have also seen the emergence of Handala, a politically motivated hacktivist group targeting Israeli-linked entities with DDoS and data leaks. Despite varied sophistication levels, all groups display consistent patterns of phishing-based initial access, persistence via credential theft and LOLBins, and data exfiltration through covert channels. These actors continue to evolve in alignment with Iran’s regional strategic interests and retaliatory agendas.
ALSO READ: Part 1: The Iran-Israel Cyber Standoff - The Hacktivist FrontPart 1: The Iran-Israel Cyber Standoff - The Hacktivist Front
Iran’s cyber operations are primarily driven by two main state-aligned entities, both playing distinct yet sometimes overlapping roles in advancing national objectives in cyberspace:
Both the IRGC and MOIS coordinate through the Supreme Council of Cyberspace, which helps align cyber strategy with national security objectives.
Contractors and Proxies:
Iran frequently outsources cyber operations to private contractors, front companies, and proxy groups to obscure attribution and expand operational capacity.
These groups enable Iran to conduct deniable operations while scaling their reach and sophistication.
APT42 is a state-sponsored cyber espionage group attributed to Iran's Islamic Revolutionary Guard Corps (IRGC). The group specializes in highly targeted reconnaissance and social engineering campaigns against individuals and organizations of strategic interest to Iran. Their campaigns are not typically wide-ranging "spray and pray" attacks; instead, they are patient, bespoke operations focused on compromising specific accounts for intelligence gathering. Based on their meticulous impersonation techniques, custom malware development (e.g., PowerKitten), and persistence, APT42 is assessed as a highly sophisticated and resourceful threat actor. Their notable technical observations include the use of fake login pages, tailored malware droppers delivered via spear-phishing, and extensive reconnaissance to make their social engineering lures highly credible.
At a high level, APT42's operations follow a clear pattern. IN: They gain initial access almost exclusively through hyper-targeted spear-phishing campaigns that impersonate trusted contacts or services. THROUGH: They move laterally by using the compromised account to target the victim's contacts and deploy lightweight reconnaissance scripts or backdoors. OUT: Their primary goal is achieved by exfiltrating data directly from the victim's cloud or email account.
Note: There is industry debate about the exact boundaries between MuddyWater and APT34 (OilRig), with some researchers assessing them as distinct groups with occasional tool sharing.
MuddyWater is a state-sponsored group acting in support of the Iranian MOIS. It is classified as an espionage actor but has demonstrated capabilities for disruptive attacks. The group specializes in gaining access to networks and maintaining long-term persistence for intelligence gathering. Their campaigns often start with spear-phishing but quickly pivot to exploiting vulnerabilities in public-facing applications. MuddyWater's sophistication is assessed as moderate; they are highly adaptable and effective but rely heavily on "living off the land" techniques and publicly available tools, which makes attribution challenging. Notable technical observations include their heavy use of PowerShell for backdoors (e.g., POWERSTATS), DNS for command and control (C2), and the exploitation of vulnerabilities like Log4j.
MuddyWater's operational flow is efficient and built for stealth. IN: They gain access via phishing emails containing malicious documents or by exploiting unpatched, internet-facing servers. THROUGH: They immediately deploy PowerShell backdoors and use legitimate Windows tools (LOLBins) to blend in with normal network traffic while performing reconnaissance and escalating privileges. OUT: Data is collected, staged in archives, and exfiltrated slowly over obfuscated C2 channels to avoid detection.
Threat Actor Aliases:
Note: While sometimes linked to MuddyWater due to shared state sponsors, APT34 is considered a distinct group with its own unique and often more sophisticated toolset and operational methodologies.
APT34 is a state-sponsored cyber espionage group, active since at least 2014 and widely believed to operate on behalf of the Iranian government, potentially its Ministry of Intelligence and Security (MOIS). The group specializes in long-term intelligence collection campaigns that align with Iran's strategic national interests. Their campaigns are characterized by the heavy use of custom-developed tools, a focus on maintaining stealth, and the ability to adapt their tactics based on the target's environment. Based on their extensive custom malware arsenal (e.g., BondUpdater, QUADAGENT), use of advanced techniques like DNS tunneling for C2, and their operational discipline, APT34 is assessed as a highly sophisticated and mature threat actor. Their technical hallmarks include using legitimate credentials to blend in and exploiting trusted relationships in supply chain attacks to bypass perimeter defenses.
APT34's operations are methodical and stealthy. IN: They favor spear-phishing with lures relevant to the target's industry or compromising a trusted third-party IT provider to gain initial access. THROUGH: They live off the land where possible but are known to deploy a powerful and evolving set of custom PowerShell tools to perform reconnaissance, escalate privileges, and move laterally. OUT: Their signature technique is the use of DNS as a covert channel to communicate with C2 servers and exfiltrate stolen data, making their traffic difficult to spot among legitimate DNS requests.
Handala is a politically motivated hacktivist group that emerged in the context of the Israeli-Hamas conflict. The group is classified as a hacktivist entity, but some researchers assess them to be state-aligned, likely operating in support of Iran's geopolitical objectives, similar to the operational model of groups like CyberAv3ngers. Handala specializes in disruptive and public-facing attacks, including DDoS, website defacement, and data theft and subsequent leaking. Their goal is to punish entities they view as enemies of the Palestinian cause and to spread their political message.
Handala's sophistication is assessed as low to moderate. They do not appear to use zero-day exploits but are effective at leveraging known vulnerabilities in web applications (e.g., SQL injection) and using readily available tools and botnets to launch powerful DDoS attacks. Their notable technical characteristic is their speed in publicizing attacks on their Telegram channel, often posting evidence of the breach or data leaks in near real-time to maximize media attention.
Handala's operational playbook is direct and built for speed and public impact. IN: They either overwhelm a target's services with high-volume DDoS traffic or exploit a vulnerability on their public website to gain access. We have also seen cases where Handala has sent phishing emails to its targets. THROUGH:Once in, they quickly navigate to and exfiltrate sensitive databases or files. OUT: Their final step is to exfiltrate the stolen data and immediately publish it on their Telegram channel, often accompanied by a defacement of the victim's website and public taunts.
Legend:
Light blue: APT42
Gray: Muddywater
Orange: APT34
Dark Blue: Handala
Common TTPs in 2 or more groups: Red
#Traffic Light Protocol - Wikipedia
Take action now
CloudSEK Platform is a no-code platform that powers our products with predictive threat analytic capabilities.
Digital Risk Protection platform which gives Initial Attack Vector Protection for employees and customers.
Software and Supply chain Monitoring providing Initial Attack Vector Protection for Software Supply Chain risks.
Creates a blueprint of an organization's external attack surface including the core infrastructure and the software components.
Instant Security Score for any Android Mobile App on your phone. Search for any app to get an instant risk score.