Iranian APT activity rises as Middle East conflict widens, putting critical infrastructure on alert


Critical infrastructure operators should treat the current Iran-related cyber risk as elevated. New research from Nozomi Networks says it is already seeing a systematic increase in activity tied to Iran-linked threat actors, with manufacturing and transportation the most targeted sectors so far. At the same time, Nozomi stresses that the data is still early and not enough has been collected yet to draw definitive conclusions.

That caution matters. The sample article overstates a few points. The strongest public evidence right now supports this narrower conclusion: Iran-linked cyber risk is rising during a fast-moving regional war, but much of the visible activity still appears to be early-stage intrusion work, reconnaissance, opportunistic probing, and hacktivist noise rather than confirmed large-scale destructive attacks on critical infrastructure.

The geopolitical backdrop is real and severe. Reuters reported on March 3, 2026 that Israel’s U.N. envoy said the United States and Israel had launched strikes on Iran and now claimed control over most Iranian airspace, while the conflict had already spread beyond Iran and Israel. Nozomi’s March 2 threat brief places its cyber warning in that same wartime context.

Number of recently raised alerts associated with Iran-affiliated threat actors (Source – Nozomi Networks)

What Nozomi says it is seeing

Nozomi says it has tracked an increase in alerts associated with MuddyWater, OilRig, APT33, and UNC1549 over the past two weeks. It says manufacturing and transportation are the most targeted sectors in its telemetry at the moment.

Nozomi Threat Intelligence tracking MuddyWater targeting organizations globally (Source – Nozomi Networks)

The report does not say these groups have already moved into widespread destructive operations. Instead, Nozomi says the current pattern points to attackers still being in an exploratory and positioning phase. It highlights default credential abuse, valid account usage, brute force, and scanning as the top signals in the region.

Nozomi Threat Intelligence is tracking OilRig targeting organizations across the globe (Source – Nozomi Networks)

That lines up with outside reporting. Palo Alto Networks Unit 42 says activity tied to Iran is likely to intensify and tells defenders to harden internet-facing assets, improve phishing resilience, and prepare for both real attacks and exaggerated breach claims. Computer Weekly also reported on March 4 that hacktivist activity is currently louder than classic state APT activity, giving defenders a short but valuable window to tighten controls.

Nozomi Threat Intelligence is tracking APT33 targeting organizations across the globe (Source – Nozomi Networks)

Who the main threat groups are

Threat groupWhat Nozomi says
MuddyWaterState-aligned espionage actor tied to MOIS, known for phishing, credential abuse, and use of legitimate admin tools
OilRigLong-running Iranian espionage group that targets government, finance, telecom, defense, and energy
APT33Group linked to Iran’s strategic objectives, with history in aerospace, aviation, energy, manufacturing, and government
UNC1549Actor overlapping with CURIUM / Tortoise Shell / Crimson Sandstorm, active against defense, aerospace, telecom, and regional government

Why critical infrastructure teams should care now

Nozomi says organizations in the Middle East face a weaker exposure profile than the global average in at least one important area. In its telemetry, 61% of vulnerabilities discovered in 2025 carried high or critical CVSS scores, versus a 48% global average. It also says about 8% had an EPSS score above 1%, versus a 4% global average.

That does not prove compromise. It does show a wider attack surface at the exact moment when Iran-linked actors and aligned hacktivists have more motive to probe exposed systems. If defenders wait until activity turns overtly destructive, they may lose the best chance to stop it.

March 2026 CVSS score distribution, Middle East region (Source – Nozomi Networks)

What defenders should do right now

  • Change default credentials immediately, especially on OT, IoT, VPN, edge, and remote-access systems. Nozomi says default credential abuse is one of the top patterns it is seeing.
  • Tighten identity controls and monitor valid-account use. The current activity pattern suggests attackers want quiet access before they escalate.
  • Patch internet-facing assets fast. Unit 42 specifically calls out websites, VPN gateways, and cloud assets as priority surfaces.
  • Segment IT and OT networks and verify the segmentation actually works. Nozomi warns that air-gapping alone is not enough.
  • Raise alert sensitivity for scanning, brute force, and authenticated reconnaissance. That is where the current signal sits.
  • Prepare for phishing tied to war themes, disruption claims, and data leaks. Unit 42 and Computer Weekly both note that hacktivist and state-linked operators may mix real attacks with exaggeration and psychological pressure.
  • Review business continuity and incident response plans now, not after a disruptive event. Unit 42 explicitly recommends this.
March 2026 EPSS score distribution, Middle East region (Source – Nozomi Networks)

What this likely means over the next few days

The visible pattern suggests many Iranian-linked actors still aim to map networks, keep access, and identify high-value targets before they move to bigger effects. Nozomi says this stage often comes before privilege escalation, data exfiltration, and operational disruption. Computer Weekly’s reporting points in the same direction, noting that the quiet period for top-tier espionage actors may not last long.

So the real takeaway is not that critical infrastructure is already under mass cyberattack everywhere. It is that defenders appear to be in a short pre-disruption window, and that window may close quickly if the regional war continues to expand.

FAQ

Are Iranian APTs actively targeting critical infrastructure right now?

Yes, public reporting says the risk is elevated and Nozomi says it sees increased Iran-linked activity. But Nozomi also says it is still too early to draw firm conclusions about the full scale of the campaign.

Which sectors look most exposed so far?

Nozomi says manufacturing and transportation are the most targeted sectors in its current telemetry.

Are these attacks already destructive?

Public evidence does not yet show broad destructive operations from the APT groups named in the sample. Nozomi says the current TTP pattern looks more like reconnaissance and early positioning.

What are the main early warning signs?

Default credential abuse, valid-account use, brute force, scanning, unusual authentication patterns, and probing of exposed edge systems are the clearest signals highlighted by Nozomi and Unit 42.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages