NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Realize the Full Value of Microsoft Security
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Guide Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Read Guide
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • ARC-AMPE Compliance
      • CJIS Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • SOC as a Service
      • Microsoft Security Managed Services
      • Splunk Managed Services
      • Tenable Managed Services
      • CrowdStrike Managed Detection and Response (MDR)
      • Vendor Security Assessments
      • Curated Threat Intelligence
      • Vulnerability Management
    Guide Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Read Guide
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Downloadable Assets icon Downloadable Assets
    Guide Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Read Guide
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Guide Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Read Guide
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Industry Insights
    • Security Operations
    • Compliance
    • Advisory and Planning
    • Cybersecurity Technology
    • Security Testing
    • Application Security
    • Threat Intelligence
    • Managed Detection and Response
    • Cyber Talent
    • Managed Services
    • NuHarbor
April 21, 2026

Applying 2025 Lessons Learned to 2026 Readiness for Iran-Linked Cyber Conflict Spillover

Justin Fimlaid Justin Fimlaid

Why the 2025 playbook is suddenly the right playbook for 2026:

The Middle East-driven risk story going into the rest of 2026 is not “brand new cyber warfare.” It is familiar weaknesses being exploited with escalation dynamics (disruption, coercion, signaling) that look more like crisis behavior than ordinary cybercrime. An April 2026 joint advisory from the Federal Bureau of Investigation, National Security Agency, Environmental Protection Agency, Department of Energy, United States Cyber Command, and the Cybersecurity and Infrastructure Security Agency warns that Iran-affiliated APT actors are exploiting internet-facing operational technology (OT) devices, including programmable logic controllers (PLCs) from Rockwell Automation, and that victim organizations have experienced disruption through manipulation of human-machine interface (HMI) and SCADA displays, interaction with project files, and related operational impacts. 


That “operational disruption and financial loss” framing matters because it aligns cleanly with what the 2025 lessons learned post already emphasized: concentrated vendor/platform risk, identity and access weaknesses, brittle continuity planning, and dependency-driven ripple effects across essential services. The difference in 2026 is pace and intent. The same gaps can be used to:

A. create visible disruption

B. threaten escalation

C. generate leverage for influence/psychological impact especially against public services and critical infrastructure.

How 2025 lessons map directly to the current geopolitical landscape

Our research of 2025 breaches show that high-impact incidents were driven less by exotic techniques and more by “familiar weaknesses failing at scale” (third parties, identity, continuity, and uneven operational discipline). Public reporting and annual breach analyses reinforce that 2025’s scale was significant. The Identity Theft Resource Center reported 3,322 U.S. data compromises in 2025, and the Privacy Rights Clearinghouse reported 4,080 unique breach events affecting at least 375 million individuals.

Risk: Iranian tradecraft will exploit the same weaknesses that 2025 exposed

Likelihood: High One hard lesson from 2025 was that public sector organizations did not mostly fail because of exotic new cyber magic. They failed because familiar weaknesses kept failing such as weak identity controls, exposed internet-facing systems, brittle operational dependencies, and too much trust concentrated in systems that cannot go down. That maps uncomfortably well to the Iranian playbook. U.S. agencies say CyberAv3ngers has targeted internet-facing PLCs in multiple sectors, including water and energy, often by taking advantage of default passwords and poor exposure management. Separate U.S. and Allied advisories show Iranian actors using brute force, password spraying, MFA fatigue, MFA-registration hijacking, and downstream access development against government, healthcare, IT, engineering, and energy organizations. Microsoft’s reporting on Peach Sandstorm, the actor also known as APT33 or Elfin, shows the same pattern in more mature form: password spraying, social engineering, cloud reconnaissance, persistence, and data theft against government, education, energy, and defense-related targets. To put it plainly, the 2025 breaches are dangerous because they are exactly the cracks Iranian operators know how to widen.

Risk: The Iran conflict widens into a colder, broader multi-front cyber pressure campaign

Likelihood: Medium
I would not frame this as a guaranteed, centrally coordinated bloc operation between Iran, Russia, China, and North Korea. I see this as a very plausible parallel pressure environment where several adversaries exploit the same moment for different reasons. The current disruption around the Strait of Hormuz is already putting stress on shipping, energy markets, and regional logistics. In that kind of environment, cyber operations become an inexpensive way to create more uncertainty, more delay, and more political pressure without every actor having to cross the same military line.

If that pressure broadens, the impacts will not all look the same. Iran is the most likely to lean into critical infrastructure access, exposed controllers, identity abuse, and disruptive operations timed for political effect. Russia is more likely to add scanning, data theft, leaks, defacements, and disruption against logistics, transport, government, and other civic systems. China will likely stay patient and strategic, using long-dwell access, living-off-the-land tradecraft, and edge-device compromise to pre-position inside critical infrastructure for a future crisis. North Korea is the wildcard on the supply-chain and financial side, using developer compromise, credential theft, and software ecosystem attacks to generate revenue while also creating operational fallout. That is the real risk picture for the rest of 2026, not a giant synchronized cyberattack, but a crowded threat environment where public-sector defenders could face disruption, espionage, access brokering, and supply-chain compromise at the same time.

Iran-linked TTP signatures you can build detections and readiness around

CyberAvengers-style OT targeting patterns

The 2026 joint advisory describes Iranian-affiliated actors targeting internet-exposed PLCs to cause disruptions by interacting with project files and manipulating HMI/SCADA display data; it also notes traffic directed at OT-relevant ports and highlights actionable mitigations such as removing PLCs from direct internet exposure. The report explicitly connects the activity to previously reported campaigns by CyberAv3ngers (also known as Shahid Kaveh Group) affiliated with the Islamic Revolutionary Guard Corps.

Looking back at the earlier 2023 advisory on IRGC-affiliated activity, the signature pattern includes exploitation of exposed devices and weak/default credentials, specifically targeting Unitronics PLC/HMI devices and leaving political defacement messages. That exposed management console, weak credentials, and high-impact OT surface pattern is consistent with later observations of custom tooling that Claroty documented as IOCONTROL, IoT/OT malware linked to Iran-affiliated attackers, used across device types (routers, PLCs, HMIs, firewalls, fuel systems) and positioned as a “cyberweapon” aimed at civilian infrastructure.

The good news, and bad news, is that the access pattern is largely opportunistic against internet-exposed OT, often using common weaknesses (default passwords, insecure remote exposure) rather than novel exploitation, which is the good news in all this. This is emphasized both in the 2023 IRGC advisory and in later government warnings that Iranian-affiliated actors often exploit unpatched/outdated software and default/common passwords on internet connected accounts and devices.

The operational objective is primarily disruption including manipulation of HMI/SCADA display data, extraction/modification of PLC project files, and in some cases configuration wiping and tampering, effects that are visible to operators and therefore valuable for coercion and influence.

Elfin-style enterprise intrusion patterns

“Elfin” is known by a few different names but mainly as tracking cluster APT33. The MITRE ATT&CK knowledge base describes APT33 as active since at least 2013, attachments, est in aviation and energy sectors, and documents techniques including password spraying, PowerShell usage, and spear phishing attachments among others. That same ATT&CK entry also links APT33-associated tooling to destructive behavior (e.g., software associated with disk wipe), underscoring that some Iran-linked clusters straddle espionage and disruption.

APT33 has a history of blending bespoke malware with fast, practical scripting once it gets a foothold. Public reporting and ATT&CK mappings show the group using password spraying for access, then leaning on PowerShell, VBScript, and other post-compromise tooling to download payloads, execute commands, move laterally, and establish persistence. Microsoft’s more recent reporting also shows the group continuing to evolve its tooling, including deploying custom backdoors like Tickler in 2024. The important point for defenders is not just that APT33 can build malware, but that it doesn’t need to wait for a perfect, polished framework to keep an intrusion moving. It can combine purpose-built malware with quick scripting and operator-driven adjustments inside a live environment, which makes the group flexible and harder to pin down.

A technical hunt report from Booz Allen Hamilton summarizes APT33/Elfin targeting history and describes spear phishing as a primary vector, alongside credential theft and password spray activity against cloud-hosted infrastructure in later campaigns. A more recent overview from Wiz similarly frames the actor as long running and notes a dual espionage/disruptive risk posture.

Russia, China, North Korea, and other aligned pressures on the cyber front

Russia is the most credible “ally amplifier” risk to mention right now because recent reporting describes alleged Russia–Iran collaboration and coordination in the cyber domain, including interactions via Telegram and joint signaling activity by groups described as pro-Russian and Iran-linked.

China’s role is likely the one to apply “parallel strategic pressure” rather than direct coordination. In the same time window as Middle East-driven escalation concerns, defenders are also contending with long-dwell access campaigns such as BRICKSTORM. A joint malware analysis report asserts that PRC state-sponsored actors use BRICKSTORM for long-term persistence in government services and IT sectors, including targeting VMware vSphere/vCenter environments and using that access for credential extraction and hidden rogue virtual machines.

North Korea’s role is distinct. Tt is routinely framed as dual-purpose—revenue generation plus intelligence—and is often opportunistic during periods when defenders are distracted by other crises. The 2026 axios npm supply chain compromise is a concrete illustration of how DPRK-linked actors can scale credential theft and access via the developer ecosystem: both Microsoft and the Google Threat Intelligence Group attribute the campaign to North Korea–nexus activity and describe cross-platform RAT deployment via a malicious dependency.

I don’t want to drift into hand-waving or lazy conjecture. The point is not that every adversary will move in perfect lockstep, or that every headline signals a formal combined cyber campaign. The point is that these states already share interests and already exchange support in other domains. In at least one recent Reuters report, alleged Russian and Iranian cyber collaboration was significant enough to merit attention, including reported interaction between Russian and Iranian hacker groups and broader intelligence-sharing ties under their strategic partnership. If the war expands and Iranian allies are pulled further into the fold, defenders should be prepared for cyber coordination, whether that shows up as shared tradecraft, parallel targeting, opportunistic disruption, or one actor exploiting the distraction created by another. We are already seeing the early shape of that risk.

Our lessons from 2025

In summary, the real value of the 2025 lessons is that they should leave us better prepared for exactly this kind of moment. Last year reminded us that the most damaging cyber events rarely come from nowhere. They exploit familiar weaknesses, exposed systems, weak identity controls, concentrated dependencies, and gaps in preparedness that were already sitting in plain view. If geopolitical conflict expands and Iranian allies add pressure on the cyber front, the answer is not panic or speculation. It is disciplined preparation built on what 2025 already taught us: tighten exposure, harden identity, know your critical dependencies, and assume overlapping campaigns are possible. The organizations that take these lessons seriously will be in a far better position to withstand what comes next.

Included Topics

  • Advisory and Planning,
  • Cyber Talent
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Compliance 7 min read
CJIS Compliance Requirements: The 2026 CJIS Checklist for State & Local
CJIS Compliance Requirements: The 2026 Checklist for State & Local Agencies
Read More
Industry Insights 3 min read
Cybersecurity Podcast: The Top 10 Pwned Episodes of 2023
Pwned Podcast Logo with
Read More
Advisory and Planning 25 min read
Creating Asymmetric Advantage: Neuroscience and the Electronic Battlefield
Creating Asymmetric Advantage: Neuroscience and the Electronic Battlefield
Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2026 NuHarbor Security. All rights reserved.