New in NodeZero®
Close-up of a hand using a backlit tablet displaying digital data

When Conflict Extends Into Cyberspace: What Security Leaders Should Expect

Drew Vanover
March 16, 2026

Geopolitical conflicts rarely stay confined to the physical world. Modern conflicts increasingly spill into cyberspace, where governments, proxy groups, and aligned actors seek to impose economic pressure, disrupt services, and create strategic uncertainty.

In recent weeks, activity associated with Iranian threat actors has shown signs of shifting toward a more decentralized and opportunistic model. Rather than a single coordinated campaign, defenders should expect a sustained pattern of distributed attacks designed to create disruption across Western commercial infrastructure.

Security leaders in sectors such as energy, financial services, telecommunications, manufacturing, healthcare, and the defense supply chain should assume they may be targeted, not because of anything unique about their organization, but because they operate systems that modern economies depend on.

Region / CountryPrimary Threat ActorsTargeting Rationale
IsraelAll major groupsPrimary adversary; military, government, media, water, tech
United StatesCyberAv3ngers, Fox Kitten, APT33, APT35US support for Israel; DIB, water infra, election interference
UAE, Bahrain, Saudi ArabiaOilRig/APT34, CyberAv3ngersGulf adversaries with US alignment; energy sector intelligence
AlbaniaVoid Manticore, IRGCHosting MEK/PMOI Iranian opposition group
UK, France, BelgiumAPT35, APT42Policy researchers, academics, Iran diaspora communities
IraqOilRig/APT34Political intelligence; MOIS interest in Iraqi governance
Poland, Turkey, JordanCyberAv3ngersOT/ICS targeting expansion; regional spillover from 2026 campaign
AustraliaFox Kitten / Lemon SandstormEnergy sector; Five Eyes nation

The most productive response is neither speculation nor alarm. It is preparation grounded in how these operators actually work.

Two companion resources published alongside this article — Iranian APT Threat Intelligence Report and Iranian APT Activity since the war — provide deeper technical analysis and supporting observations for security teams seeking to study these patterns in detail.

The Operational Pattern Behind Iranian Cyber Campaigns

Iranian cyber operators have demonstrated consistent operational habits over the past decade. While tools and infrastructure evolve, several patterns repeatedly appear across campaigns.

Rapid exploitation of internet-facing infrastructure

Iranian operators have repeatedly shown the ability to weaponize newly disclosed vulnerabilities in internet-facing infrastructure, often within days of disclosure.

Recent campaigns have targeted vulnerabilities affecting:

  • VPN gateways and SSL-VPN infrastructure
  • Remote access systems
  • Firewalls and edge appliances
  • Internet-facing application gateways

Platforms widely used across enterprise environments have been repeatedly targeted when patching delays or misconfigurations expose them to the internet. For attackers, these devices represent something extremely valuable: direct entry points into otherwise well-defended environments. Once compromised, edge infrastructure allows attackers to establish an initial foothold without triggering many traditional endpoint defenses.

For defenders, this makes patching and exposure management around edge infrastructure one of the most important early lines of defense.

Identity infrastructure becomes the primary battleground

Once inside a network, Iranian operators consistently pivot toward identity systems and Active Directory. This approach is efficient and highly effective. If attackers can control identity infrastructure, they can move laterally across an organization with relative ease.

Observed techniques include:

  • Credential dumping from LSASS memory
  • Password spraying across enterprise accounts
  • Abuse of weak or default credentials
  • Privilege escalation through poorly monitored service accounts
  • Exploitation of domain controller vulnerabilities

Iranian operators have also demonstrated the ability to extend operations into cloud identity environments, where attacker-controlled cloud tenants and legitimate cloud traffic can help blend malicious activity into normal operations.

In practice, identity systems become the center of enterprise defense. Once compromised, the scope of an incident can expand rapidly from a single foothold to enterprise-wide control.

Targeting systems with disproportionate operational impact

Recent campaigns also show a growing focus on systems capable of producing outsized disruption relative to the effort required to compromise them. Operational technology environments, internet-exposed industrial devices, and remote management infrastructure are increasingly attractive targets.

In a recent campaign documented in the accompanying threat research, Iranian operators exploited default credentials on internet-exposed programmable logic controllers used in water and wastewater facilities, affecting dozens of devices across multiple U.S. utilities.

The attack did not rely on sophisticated malware or novel techniques. It relied on a simple but effective reality: critical operational systems were reachable from the internet with weak authentication controls.

The lesson is not simply about industrial control systems. It reflects a broader strategic pattern: attackers seek digital entry points that connect directly to physical or operational impact.

Supply chain and service provider leverage

Iranian operators have also demonstrated a willingness to pursue access through service providers and management platforms capable of providing downstream access to multiple organizations. Managed service providers and remote management platforms are particularly attractive targets because compromise of a single platform can allow attackers to pivot into dozens — or even hundreds — of customer environments.

Campaigns have previously targeted widely deployed remote management tools used by managed service providers to administer client networks. This supply chain leverage allows attackers to achieve large-scale operational impact with relatively limited effort.

For defenders, this reinforces a difficult but important reality: cyber risk increasingly extends beyond the boundaries of any single organization.

Disruption, espionage, and destructive activity

Iranian cyber operations increasingly combine multiple objectives:

  • Intelligence collection
  • Service disruption
  • Psychological impact through public messaging
  • Destructive attacks designed to cause operational outages

Recent operations have included the use of data-wiping malware designed to overwrite files and master boot records, alongside ransomware-style operations intended to increase pressure on victims. This hybrid model means organizations must prepare not only for data theft or espionage, but also loss of availability.

GroupAffiliationPrimary 2026 Role
CyberAv3ngersIRGC-CECOT/ICS attacks, WhiteLock ransomware
Cotton Sandstorm (ASA)IRGCIO operations, DDoS, media manipulation
Cyber Islamic ResistanceIRGC-alignedHacktivist operations, DDoS amplification
MuddyWaterMOISEdge device exploitation, persistence
Fox KittenIRGCVPN exploitation, access brokering
OilRig/APT34MOISCredential theft, espionage

In practical terms, the ability to restore operations quickly is just as important as preventing compromise.

Turning Intelligence Into Defensive Action

Threat intelligence is only valuable when organizations can determine whether those same techniques would succeed in their own environment.

Security leaders increasingly ask a straightforward question:

If an adversary used these methods today, would they work against us? Answering that question requires more than static vulnerability scans or occasional penetration testing. It requires continuous validation of real attack paths across identity systems, edge infrastructure, and critical services.

In practice, many organizations are beginning to treat adversary tradecraft as something that must be tested and measured regularly, not simply studied. Platforms capable of safely emulating attacker behavior, such as Horizon3.ai’s autonomous security platform, allow organizations to translate threat intelligence into executable attack paths that show exactly how adversaries could move through their environment. When used well, this type of capability turns abstract threat reports into concrete remediation priorities.

Communicating Clearly During Elevated Cyber Risk

During periods of heightened geopolitical tension, security leaders play an important role in ensuring that concern inside the organization is directed toward preparedness rather than speculation.

Effective communication should remain calm, factual, and operational. Rather than attempting to predict specific attacks, leaders should emphasize that the organization is actively validating its exposure, strengthening critical controls, and ensuring response teams are ready to act if needed.

To maintain clarity and confidence across the organization, security leaders should:

Anchor the conversation in preparedness.

Explain that while geopolitical cyber activity may increase, the organization is actively testing its security posture, validating exploitable paths, and ensuring that defenses and response teams are ready.

Connect cyber risk to business operations.

Focus leadership discussions on practical outcomes: which systems are most critical, how quickly threats can be detected and contained, and how quickly operations could be restored if disruption occurs.

Provide clear guidance to staff.

Reinforce security fundamentals such as patching timelines, credential hygiene, phishing vigilance, and escalation procedures so employees understand their role in reducing risk.

Demonstrate operational readiness.

Share that security teams are reviewing exposure across internet-facing systems, validating monitoring and detection capabilities, and rehearsing incident response and recovery scenarios.

When communicated clearly, elevated cyber risk becomes less about uncertainty and more about disciplined preparation. Calm leadership, consistent messaging, and operational verification help organizations remain resilient even as the external threat environment evolves.

Five Actions Security Leaders Should Prioritize

Periods of geopolitical tension reward organizations that prepare early. Based on observed Iranian tradecraft, several defensive priorities stand out.

1. Quantify exposure across internet-facing infrastructure

Organizations should assume vulnerabilities affecting VPNs, firewalls, and remote-access infrastructure will be targeted quickly.

Security leaders should require rapid exposure assessments covering:

  • Internet-facing gateways
  • VPN appliances
  • Firewall management interfaces
  • Remote access infrastructure

These assessments should result in clear remediation timelines, not simply technical reports.

2. Strengthen identity security

Credential theft and privilege escalation remain among the most reliable paths to enterprise compromise.

Organizations should continuously evaluate:

  • Privilege escalation paths to domain administrator
  • Weak or reused credentials
  • Service account permissions
  • Cloud identity privileges

Reducing identity-based attack paths dramatically limits the blast radius of an intrusion.

3. Validate detection against real adversary behaviors

Security operations centers should ensure they can detect behaviors commonly used in Iranian campaigns, including:

  • Rapid exploitation of edge infrastructure
  • Password spraying and credential abuse
  • Web shell deployment
  • Misuse of remote management tools
  • PowerShell-based “living off the land” activity

Detection capabilities should be demonstrated through proof-based testing, not assumed.

4. Rehearse incident response under realistic scenarios

Cyber incidents during geopolitical crises rarely unfold slowly.

Organizations should rehearse scenarios such as:

  • Compromise of VPN gateways
  • Unauthorized access to cloud identity accounts
  • Loss of remote management infrastructure
  • Exposure of operational technology environments

Exercises should include both technical responders and executive leadership to ensure decisions can be made quickly under pressure.

5. Treat recovery as a primary defensive capability

Modern cyber operations increasingly involve destructive activity.

Recovery planning must explicitly address:

  • Identity infrastructure
  • Core business applications
  • Operational technology systems
  • Critical data stores

Backup and restoration capabilities should be tested regularly under worst-case assumptions.

A Moment That Rewards Prepared Organizations

Cyber operations associated with geopolitical conflict are difficult to predict in timing and scale. What is predictable is the tradecraft adversaries rely on and the types of systems they seek to exploit.

Organizations that focus on exposure management, identity security, operational readiness, and recovery capability are far better positioned to withstand disruptive campaigns.

For security leaders, this moment is not about reacting to headlines. It is about reinforcing the systems that matter most and ensuring the organization can detect, contain, and recover from the kinds of attacks adversaries are already demonstrating.

Security teams interested in deeper technical detail can explore the Iranian APT Threat Intelligence Report and Iranian APT Activity since the war, which provide the technical research and operational observations that informed this analysis.

How can NodeZero help you?
Let our experts walk you through a demonstration of NodeZero®, so you can see how to put it to work for your organization.
Get a Demo
Share: