
Geography: Emea · Middle East · Iran
Iran operates multiple state-sponsored cyber organizations under the Islamic Revolutionary Guard Corps (IRGC) and the Ministry of Intelligence and Security (MOIS). Key groups tracked by Western cybersecurity firms include MuddyWater (state-directed operations against OT/ICS systems), APT33/Elfin (energy and aviation sector espionage), and APT35/Charming Kitten (intelligence collection and influence operations). These groups employ custom malware, supply chain compromises, and spear-phishing campaigns targeting government and critical infrastructure networks.
Iran's cyber program was catalyzed by the Stuxnet attack on its Natanz enrichment facility (discovered 2010), which demonstrated both vulnerability and the potential of cyber weapons. Since then, Iran has conducted retaliatory operations including destructive malware attacks (Shamoon against Saudi Aramco, 2012), DDoS campaigns against US financial institutions, and intelligence collection operations against dissidents and foreign government officials. The sophistication has increased over time, though independent assessments still place Iranian capabilities below those of the US, Russia, China, and Israel.
The March 2026 escalation brought renewed attention to Iranian cyber capabilities, with Palo Alto Unit 42 and other threat intelligence firms issuing advisories about potential retaliatory cyberattacks on critical infrastructure. The program's strategic significance lies in asymmetry: cyber operations allow Iran to project force and impose costs on adversaries at relatively low cost, without the escalatory dynamics of kinetic military action. The ecosystem has also expanded to include hacktivist proxies and cybercriminal front groups that provide deniability.