Gurucul Named a Leader in the 2025 Gartner Magic Quadrant TM for SIEM 

Read the Report
Close Menu
Cybersecurity Threat & Artificial Intelligence

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [sibwp_form id=1]
    What's Hot

    Iranian Cyber Attacks in the Last 10 Years (2016–2025): Timeline, Threat Groups, and Global Impact

    March 5, 2026

    Iranian Cyber Attacks: Understanding the Threat and How Organizations Can Defend

    March 4, 2026

    Defense in Depth Strategy for Enterprise Security

    February 27, 2026
    X (Twitter) YouTube
    Cybersecurity Threat & Artificial IntelligenceCybersecurity Threat & Artificial Intelligence
    • Home
      • Cybersecurity Glossary
      • AI Glossary
    • Cybersecurity
      1. Cyber Threat Intelligence
      2. Hacking attacks
      3. Common Vulnerabilities & Exposures
      4. View All

      Iranian Cyber Attacks in the Last 10 Years (2016–2025): Timeline, Threat Groups, and Global Impact

      March 5, 2026

      Iranian Cyber Attacks: Understanding the Threat and How Organizations Can Defend

      March 4, 2026

      The Rise in Akira and LockBit Ransomware Campaigns Targeting VPN and Edge Appliances

      February 11, 2026

      The Evolution of Cyber Threats Over the Last Two Decades

      February 6, 2026

      Iranian Cyber Attacks in the Last 10 Years (2016–2025): Timeline, Threat Groups, and Global Impact

      March 5, 2026

      Iranian Cyber Attacks: Understanding the Threat and How Organizations Can Defend

      March 4, 2026

      European Space Agency Data Breach Exposes Space Sector Cyber Risks

      January 23, 2026

      Venezuela US China Cyber Espionage Phishing Campaign

      January 21, 2026

      Top CVEs to Watch in July 2025: AI-Driven Threats and Exploits You Can’t Ignore

      July 8, 2025

      Browser Extensions, Supply-Chain Vulnerabilities, and Early 2026 Threat Trends

      January 9, 2026

      AI Botnets: The Emerging Cybersecurity Threat Redefining Attack and Defense

      December 24, 2025

      Major Real-World Cyberattacks Where Kali Linux Tooling Played a Role

      December 19, 2025

      Kali Linux 2025.4: What the Latest Release Means for Hackers and Cybersecurity Teams

      December 17, 2025
    • AI
      1. AI‑Driven Threat Detection
      2. AI‑Powered Defensive Tools
      3. AI‑Threats & Ethics
      4. View All

      Emerging AI-Driven Threats and Defensive Shifts in 2026

      January 7, 2026

      Holiday Panic Rising: AI-Driven Mobile Fraud Is Wrecking Consumer Trust This Shopping Season

      December 5, 2025

      How Artificial Intelligence Identifies Zero-Day Exploits in Real Time | Cybersecurity Threat AI Magazine

      June 28, 2025

      Emerging AI-Driven Threats and Defensive Shifts in 2026

      January 7, 2026

      Gurucul Unveils AI-SOC Analyst: Deep Collaboration Meets Autonomous Security Operations

      August 7, 2025

      ChatGPT Style Assistants for Security Operations Center Analysts | Cybersecurity Threat AI Magazine

      June 28, 2025

      Emerging AI-Driven Threats and Defensive Shifts in 2026

      January 7, 2026

      Holiday Panic Rising: AI-Driven Mobile Fraud Is Wrecking Consumer Trust This Shopping Season

      December 5, 2025

      Deepfake Identity Fraud: Artificial Intelligence’s Role and Defenses | Cybersecurity Threat AI Magazine

      June 28, 2025

      Narrative Warfare: How India Is Being Targeted, How Pakistan Operates It, and What India Must Do to Fight Back

      November 26, 2025

      Cyber Wars, Cyber Threats, and Cybersecurity Will Push Gold Higher

      October 20, 2025

      The Surge in AI Deepfake Enabled Social Engineering

      September 10, 2025

      Perplexity’s Comet Browser: Next-Gen AI-Powered Threat Protection for Secure Web Experiences

      July 25, 2025
    • News
      1. Tech
      2. Gadgets
      3. View All

      Browser Extensions, Supply-Chain Vulnerabilities, and Early 2026 Threat Trends

      January 9, 2026

      AI Botnets: The Emerging Cybersecurity Threat Redefining Attack and Defense

      December 24, 2025

      Major Real-World Cyberattacks Where Kali Linux Tooling Played a Role

      December 19, 2025

      Kali Linux 2025.4: What the Latest Release Means for Hackers and Cybersecurity Teams

      December 17, 2025

      EU Proposes a Major Cybersecurity Certification Overhaul: What Is Really Changing and Why It Matters

      January 30, 2026

      U.S. Congressional Email Cyberattack: What Happened and Why It Matters

      January 14, 2026

      Kali Linux 2025.4: What the Latest Release Means for Hackers and Cybersecurity Teams

      December 17, 2025

      Holiday Panic Rising: AI-Driven Mobile Fraud Is Wrecking Consumer Trust This Shopping Season

      December 5, 2025
    • Marketing
      1. Cybersecurity Marketing
      2. AI Business Marketing
      3. Case Studies
      4. View All

      Cybersecurity Marketing Strategy for Enterprise Growth

      February 17, 2026

      Cybersecurity Account Based Marketing Services

      December 22, 2025

      Cybersecurity Content Marketing Services

      December 22, 2025

      Cybersecurity Digital Marketing Services

      December 22, 2025

      Cybersecurity Marketing Strategy for Enterprise Growth

      February 17, 2026

      How a Cybersecurity SaaS Grew From 0 to 100 Enterprise Clients in 12 Months

      December 3, 2025

      Why Most AI Startups Fail at Marketing

      June 29, 2025

      Iranian Cyber Attacks in the Last 10 Years (2016–2025): Timeline, Threat Groups, and Global Impact

      March 5, 2026

      Iranian Cyber Attacks: Understanding the Threat and How Organizations Can Defend

      March 4, 2026

      Defense in Depth Strategy for Enterprise Security

      February 27, 2026

      Cybersecurity Risk Management Frameworks Explained

      February 25, 2026

      Cybersecurity Marketing Strategy for Enterprise Growth

      February 17, 2026

      Cybersecurity Account Based Marketing Services

      December 22, 2025

      Cybersecurity Content Marketing Services

      December 22, 2025

      Cybersecurity Digital Marketing Services

      December 22, 2025
    • Cybersecurity Products
      • SIEM
      • SOC
    • Contact
    X (Twitter) YouTube LinkedIn
    Cybersecurity Threat & Artificial Intelligence
    Home » Iranian Cyber Attacks in the Last 10 Years (2016–2025): Timeline, Threat Groups, and Global Impact
    Cyber Threat Intelligence

    Iranian Cyber Attacks in the Last 10 Years (2016–2025): Timeline, Threat Groups, and Global Impact

    cyber security threatBy cyber security threatMarch 5, 2026No Comments7 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    iranian cyber attacks of last 10 years
    iranian cyber attacks of last 10 years
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    Over the past decade, Iranian cyber attacks conducted by state-linked operators have become a persistent component of global cyber threat activity. Security researchers and intelligence agencies have linked numerous campaigns to Iranian advanced persistent threat (APT) groups that conduct espionage, disruptive attacks, and critical infrastructure targeting.

    These operations are typically attributed to groups such as APT33, APT34 (OilRig), APT35 (Charming Kitten), MuddyWater, and the hacktivist-style group CyberAv3ngers. Their activities range from credential harvesting and spear-phishing to industrial control system (ICS) targeting and destructive malware deployments.

    Between 2016 and 2025, researchers have documented roughly 20–25 major Iranian cyber campaigns, targeting governments, energy companies, telecom providers, universities, and critical infrastructure worldwide.

    YearCampaign / IncidentSuspected Iranian GroupTarget / RegionAttack TypeNotes
    2025Critical infrastructure reconnaissance campaignsMuddyWaterMiddle East utilitiesEspionageCredential harvesting & remote admin abuse
    2025AI-assisted phishing campaignsCharming Kitten (APT35)US & EU researchersSpear-phishingUse of fake login portals
    2024Water utility hacking attemptsCyberAv3ngersUS & Israel water systemsICS compromiseTargeted Unitronics PLC devices
    2024Israel-Hamas cyber conflict operationsMultiple Iranian groupsIsraeli infrastructureDDoS / defacementCoordinated cyber operations
    2023Israel critical infrastructure attacksCyberAv3ngersWater treatment facilitiesICS exploitationClaimed by pro-Iran hacktivist group
    2023Aerospace and defense espionageAPT33US / EuropeCyber espionageMalware delivery via spear phishing
    2022Log4Shell exploitation campaignsMuddyWaterGlobal organizationsVulnerability exploitationLeveraging CVE-2021-44228
    2022Telecom and government espionageAPT34 (OilRig)Middle EastCredential theftCustom backdoors
    2021Academic researcher phishingCharming KittenUniversities worldwideSocial engineeringCredential harvesting
    2021Israeli shipping company attacksAPT35Maritime sectorCyber disruptionLinked to regional tensions
    2020US election interference attemptsAPT35Political organizationsPhishing / influence opsAttempted credential theft
    2020Israeli water infrastructure intrusionIranian operatorsWater treatment systemsICS intrusionAttempted chemical manipulation
    2019Global telecom espionageAPT34Telecom operatorsEspionageLong-term data exfiltration
    2019Saudi energy sector attacksAPT33Energy companiesMalware deploymentIndustrial targeting
    2018Middle East aviation espionageAPT33Aviation sectorCyber espionageSupply chain reconnaissance
    2018US universities cyber espionageIranian academic hacking groupUniversitiesData theftIntellectual property targeting
    2017Saudi petrochemical attackIranian-linked actorsIndustrial plantICS malwareSafety system targeting
    2017Shamoon 2 destructive malware attacksIranian actorsSaudi energy companiesWiper malwareThousands of systems wiped
    2016Global banking DDoS attacksIranian operatorsUS financial institutionsDDoSOperation Ababil continuation
    2016Middle East government espionageOilRig (APT34)Government networksEspionageCustom malware campaigns

    Total Iranian Cyber Campaigns by Category

    Based on publicly documented incidents, Iranian cyber operations in the last decade can be categorized as follows:

    CategoryApproximate Campaigns
    Cyber espionage operations~9
    Critical infrastructure / ICS attacks~4
    Phishing and credential harvesting~4
    Destructive malware attacks~2
    DDoS / disruptive operations~2
    Total major campaigns identified~21

    Major Iranian Threat Groups

    Several Iranian cyber units have been repeatedly linked to state-backed cyber activity.

    APT33 (Elfin)

    APT33 is believed to focus primarily on energy, aviation, and industrial sectors. The group frequently uses spear-phishing and custom malware to gain access to target environments.

    APT34 (OilRig)

    APT34 primarily targets government agencies and telecommunications providers in the Middle East, conducting long-term espionage campaigns.

    APT35 (Charming Kitten)

    APT35 is widely known for phishing and social engineering campaigns, often targeting academics, journalists, researchers, and political organizations.

    MuddyWater

    MuddyWater conducts global cyber espionage campaigns and has frequently leveraged vulnerabilities and living-off-the-land techniques to maintain persistence.

    CyberAv3ngers

    CyberAv3ngers emerged as a pro-Iran hacktivist group targeting industrial control systems and water infrastructure, particularly in the United States and Israel.

    Key Trends in Iranian Cyber Operations

    1. Increasing Focus on Critical Infrastructure

    Recent campaigns show a growing interest in industrial control systems (ICS) and critical infrastructure. Water utilities, energy facilities, and industrial environments have become frequent targets.

    2. Credential Harvesting as a Primary Entry Vector

    Many Iranian campaigns begin with spear-phishing emails or fake login portals designed to steal credentials from targeted individuals.

    3. Regional Geopolitical Targeting

    Iranian cyber operations often align with geopolitical tensions and frequently target organizations in:

    • Israel
    • Saudi Arabia
    • United States
    • Gulf countries
    • Western research institutions.

    4. Use of Known Vulnerabilities

    Iranian operators have also been observed exploiting publicly disclosed vulnerabilities, including widely exploited issues like Log4Shell, to gain initial access.

    Security Implications for Organizations

    Organizations across multiple sectors should remain aware of Iranian cyber threat activity, particularly those operating in:

    • Energy and utilities
    • Telecommunications
    • Government networks
    • Defense and aerospace
    • Academic and research institutions.

    Security teams can reduce risk by implementing strong credential protection, patch management, monitoring, and threat intelligence integration.

    Threat Intelligence Report

    Iranian Cyber Operations (2016–2025)

    Report Type: Strategic Threat Intelligence
    Audience: SOC Analysts, Threat Hunters, Security Engineers, CISOs
    Report Date: 2026
    Classification: Defensive Cybersecurity Intelligence

    Executive Summary

    Over the past decade, Iranian state-aligned cyber groups have conducted a wide range of cyber operations targeting critical infrastructure, government networks, telecom providers, universities, and private industry. These campaigns primarily focus on cyber espionage, credential harvesting, and infrastructure disruption.

    Threat groups commonly attributed to Iranian cyber operations include:

    • APT33 (Elfin)
    • APT34 (OilRig)
    • APT35 (Charming Kitten)
    • MuddyWater
    • CyberAv3ngers

    Between 2016 and 2025, at least 20–25 major campaigns have been publicly documented by security researchers and government agencies. These operations demonstrate persistent targeting of Middle Eastern geopolitical adversaries, as well as Western research institutions and critical infrastructure.

    Security operations centers (SOCs) should prioritize phishing detection, credential protection, vulnerability management, and monitoring for living-off-the-land activity commonly associated with Iranian threat actors.

    Key Findings

    FindingDescription
    Persistent cyber espionageMajority of Iranian operations focus on intelligence collection
    Infrastructure targeting increasingWater utilities, energy facilities, and ICS environments are growing targets
    Credential theft primary access methodPhishing remains the most common entry vector
    Exploitation of known vulnerabilitiesGroups often leverage widely exploited vulnerabilities
    Long dwell timesIranian groups frequently maintain persistence for months

    Iranian Cyber Campaign Timeline (2016–2025), with it use the table given at the begining.

    Threat Actor Profiles

    APT33 (Elfin)

    Primary Targets

    • Aviation industry
    • Energy companies
    • Defense contractors

    Typical Tactics

    • Spear-phishing
    • Malware deployment
    • Credential harvesting

    Observed Capabilities

    • Custom backdoors
    • Long-term persistence inside enterprise networks

    APT34 (OilRig)

    Primary Targets

    • Middle Eastern governments
    • Telecommunications providers
    • Financial institutions

    Key Techniques

    • Credential harvesting portals
    • Supply-chain compromise attempts
    • Custom remote access malware

    APT35 (Charming Kitten)

    Primary Targets

    • Academics
    • Journalists
    • Security researchers
    • Political organizations

    Common Techniques

    • Social engineering
    • Fake login portals
    • Credential harvesting

    MuddyWater

    Primary Targets

    • Government organizations
    • Telecom providers
    • Critical infrastructure

    Operational Characteristics

    • Living-off-the-land techniques
    • Use of legitimate administrative tools
    • Exploitation of widely known vulnerabilities

    CyberAv3ngers

    Primary Targets

    • Industrial control systems
    • Water infrastructure

    Notable Activity

    • Attempts to access PLC devices in water treatment systems
    • Public claims of cyber disruption campaigns

    Observed Tactics, Techniques, and Procedures (TTPs)

    MITRE ATT&CK CategoryObserved Behavior
    Initial AccessSpear-phishing, vulnerability exploitation
    ExecutionScript execution using legitimate system tools
    PersistenceScheduled tasks and credential reuse
    Credential AccessPhishing portals and credential dumping
    Lateral MovementRemote administration tools
    Command and ControlEncrypted web traffic
    ImpactData exfiltration, infrastructure disruption

    Indicators and Behavioral Patterns

    SOC teams should monitor for the following behavioral patterns frequently associated with Iranian campaigns.

    Suspicious Authentication Activity

    • Login attempts from unusual geographic locations
    • Repeated failed authentication attempts
    • OAuth or identity provider abuse

    Phishing Infrastructure Indicators

    • Fake login portals impersonating cloud services
    • Domains mimicking research institutions or government portals

    Network Behavior

    • Beaconing to suspicious external servers
    • Unexpected outbound connections to new domains
    • Unusual PowerShell activity

    Endpoint Indicators

    • Execution of administrative tools outside normal workflows
    • Suspicious scheduled task creation
    • Unauthorized credential access attempts

    Detection Recommendations for SOC Teams

    Log Sources to Monitor

    • SIEM authentication logs
    • EDR process telemetry
    • Email gateway logs
    • DNS query logs
    • Firewall traffic logs

    Threat Hunting Queries (Conceptual)

    SOC analysts should investigate:

    • Unusual PowerShell or scripting activity
    • Unexpected credential authentication patterns
    • Remote administration tool usage outside approved workflows
    • Network connections to suspicious domains

    Mitigation Recommendations

    Organizations can reduce exposure to Iranian cyber operations by implementing the following security measures.

    Identity Security

    • Enforce multi-factor authentication
    • Monitor privileged account activity
    • Implement conditional access policies

    Email Security

    • Deploy advanced phishing detection
    • Train users to recognize spear-phishing attempts

    Patch Management

    • Rapidly apply security patches
    • Monitor vulnerability disclosures

    Network Security

    • Segment critical infrastructure networks
    • Restrict administrative access

    Risk Assessment

    SectorRisk Level
    EnergyHigh
    Water utilitiesHigh
    GovernmentHigh
    TelecommunicationsMedium
    UniversitiesMedium
    Private industryMedium

    Strategic Outlook

    Iranian cyber capabilities continue to evolve. Future campaigns are expected to focus on:

    • Critical infrastructure disruption
    • Supply-chain compromise
    • Credential harvesting operations
    • Industrial control system targeting

    The increasing intersection of geopolitical conflict and cyber operations suggests continued Iranian cyber activity against regional adversaries and Western institutions.

    Conclusion

    Iranian cyber groups remain a persistent threat to global organizations. While many operations focus on espionage and intelligence gathering, the targeting of critical infrastructure and industrial systems indicates growing offensive capabilities.

    Security teams should maintain strong detection capabilities, monitor credential abuse activity, and prioritize rapid vulnerability remediation to defend against Iranian cyber campaigns.

    Conclusion

    Iranian cyber operations have evolved significantly over the last decade, expanding from regional espionage campaigns to global cyber activities affecting critical infrastructure and research institutions. While destructive attacks remain relatively rare compared to espionage operations, the increasing focus on industrial systems and infrastructure highlights the growing strategic role of cyber operations in geopolitical conflict.

    Understanding the timeline, threat groups, and attack patterns associated with Iranian cyber activity is essential for organizations seeking to improve detection and defense against state-linked cyber threats.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    cyber security threat
    • Website

    Related Posts

    Iranian Cyber Attacks: Understanding the Threat and How Organizations Can Defend

    March 4, 2026

    Defense in Depth Strategy for Enterprise Security

    February 27, 2026

    Cybersecurity Risk Management Frameworks Explained

    February 25, 2026

    Understanding the CIA Triad in Modern Cybersecurity

    February 18, 2026

    Core Principles of Information Security Explained

    February 13, 2026

    The Rise in Akira and LockBit Ransomware Campaigns Targeting VPN and Edge Appliances

    February 11, 2026
    Leave A Reply Cancel Reply

    Top Picks
    Editors Picks

    Iranian Cyber Attacks in the Last 10 Years (2016–2025): Timeline, Threat Groups, and Global Impact

    March 5, 2026

    Iranian Cyber Attacks: Understanding the Threat and How Organizations Can Defend

    March 4, 2026

    Defense in Depth Strategy for Enterprise Security

    February 27, 2026

    Cybersecurity Risk Management Frameworks Explained

    February 25, 2026
    Advertisement
    Demo
    About Us
    About Us

    Artificial Intelligence & AI, The Pulse of Cybersecurity Powered by AI.

    We're accepting new partnerships right now.

    Email Us: info@cybersecuritythreatai.com

    Our Picks

    Cybersecurity Marketing Strategy for Enterprise Growth

    February 17, 2026

    Cybersecurity Account Based Marketing Services

    December 22, 2025

    Cybersecurity Content Marketing Services

    December 22, 2025
    Top Reviews
    X (Twitter) YouTube LinkedIn
    • Home
    • AI Business Marketing Support
    • Cybersecurity Marketing Support
    © 2026 Cybersecurity threat & AI Designed by Cybersecurity threat & AI .

    Type above and press Enter to search. Press Esc to cancel.

    Grow your AI & Cybersecurity Business.
    Powered by Joinchat
    HiHello , welcome to cybersecuritythreatai.com, we bring reliable marketing support for ai and cybersecurity businesses.
    Can we help you?
    Open Chat