Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • Vocab
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Aegis
  4. State-Sponsored Offensive Cyber Operations

State-Sponsored Offensive Cyber Operations

IRGC and MOIS-linked APT groups (MuddyWater, APT33/Elfin, APT35/Charming Kitten) conduct espionage, sabotage, and influence operations against critical infrastructure globally.

Geography: Emea · Middle East · Iran

Back to AegisBack to IranView interactive version

Iran operates multiple state-sponsored cyber organizations under the Islamic Revolutionary Guard Corps (IRGC) and the Ministry of Intelligence and Security (MOIS). Key groups tracked by Western cybersecurity firms include MuddyWater (state-directed operations against OT/ICS systems), APT33/Elfin (energy and aviation sector espionage), and APT35/Charming Kitten (intelligence collection and influence operations). These groups employ custom malware, supply chain compromises, and spear-phishing campaigns targeting government and critical infrastructure networks.

Iran's cyber program was catalyzed by the Stuxnet attack on its Natanz enrichment facility (discovered 2010), which demonstrated both vulnerability and the potential of cyber weapons. Since then, Iran has conducted retaliatory operations including destructive malware attacks (Shamoon against Saudi Aramco, 2012), DDoS campaigns against US financial institutions, and intelligence collection operations against dissidents and foreign government officials. The sophistication has increased over time, though independent assessments still place Iranian capabilities below those of the US, Russia, China, and Israel.

The March 2026 escalation brought renewed attention to Iranian cyber capabilities, with Palo Alto Unit 42 and other threat intelligence firms issuing advisories about potential retaliatory cyberattacks on critical infrastructure. The program's strategic significance lies in asymmetry: cyber operations allow Iran to project force and impose costs on adversaries at relatively low cost, without the escalatory dynamics of kinetic military action. The ecosystem has also expanded to include hacktivist proxies and cybercriminal front groups that provide deniability.

TRL
8/9Deployed
Impact
3/5
Investment
4/5
Category
Applications

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions