WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

The Iranian Cyber Playbook: What Security Teams Should Expect

It’s a common misconception that geopolitical crises stay confined to the physical battlefields. If all of the action is overseas, it can’t possibly impact us over here, right? Absolutely wrong. They spill into cyberspace, where state-aligned actors test defenses, probe infrastructure, and exploit organizations that are slow to adapt.

Iranian cyber groups have spent the past decade refining a playbook that favors speed, persistence, and opportunism over complex zero-day exploits. Their operations frequently rely on misconfigurations, unpatched systems, and legitimate administrative tools already present in enterprise environments.

For security teams, that reality carries an important lesson: many of the techniques used by Iranian actors are not exotic, but predictable, repeatable, and preventable with the right defensive posture. Let’s be clear: This piece is not intended to fearmonger, but to help organizations understand how these groups operate.

The Iranian Cyber Playbook: TTPs That Matter

 

1. Password Spraying: The Low-Effort Entry Point

Iranian threat groups frequently begin with credential attacks against internet-facing services, particularly Microsoft 365 tenants and VPN gateways.

Password spraying—testing common passwords against many accounts—remains a highly effective way to gain an initial foothold. Groups such as Pioneer Kitten (UNC757) have historically used this technique to compromise corporate environments and then sell the resulting access to ransomware affiliate networks. (Cybersecurity and Infrastructure Security Agency [CISA], 2024)

Many attacks begin not with sophisticated exploits, but with weak credential hygiene.

2. Exploiting N-Day Vulnerabilities

Iranian actors are also known for aggressively exploiting N-day vulnerabilities—security flaws that already have patches available (Quintero-Bonilla & Martín del Rey, 2020). Rather than discovering new vulnerabilities, they focus on organizations that are slow to update widely used technologies such as:

  • Citrix
  • Fortinet
  • VMware

This strategy allows attackers to weaponize known vulnerabilities quickly against organizations that lag behind patch cycles. For defenders, the risk window between patch release and full deployment is often where breaches occur (CISA, 2022).

3. Living off the Land

Once inside a network, Iranian actors frequently avoid custom malware in favor of “Living off the Land” techniques. Instead of deploying obvious attack tools, they leverage legitimate administrative utilities such as:

  • PowerShell
  • RDP
  • Net scanning tools

This approach allows attackers to blend into normal IT activity and evade traditional security controls (CISA, 2024).

In several documented incidents, attackers moved laterally across systems using built-in Windows accounts and remote access protocols before staging additional payloads.

4. Persistent Backdoors

Groups such as Seedworm have used custom backdoors—such as the Phoenix malware—to maintain long-term access even after initial vulnerabilities are patched (Microsoft Threat Intelligence, 2022).

These tools are designed for persistent espionage, allowing attackers to return to compromised environments months or even years later.

Persistence is often the goal, not quick disruption.

Critical Infrastructure Is a Target

Iranian cyber operations increasingly focus on industrial control systems (ICS) and operational technology environments.

Groups linked to the IRGC have scanned for internet-connected PLCs and other controllers that still use default credentials or exposed management interfaces.

In one incident, attackers targeted Israeli PLC devices that were:

  • internet-facing
  • using default passwords
  • accessible via default ports

These conditions allowed attackers to take control of industrial equipment remotely. The lesson is clear: many attacks succeed because basic security practices were never implemented (CISA, 2023).

The Reverse Engineering Advantage

When attackers gain access to physical or digital infrastructure—such as a captured drone, PLC firmware, or proprietary control software—they can reverse engineer the technology to build new attack capabilities.

By extracting firmware or analyzing embedded code, adversaries can:

  • map control logic
  • identify hidden credentials
  • develop targeted exploits against specific systems

This “weaponized mirroring” allows attackers to turn a defender’s own technology into a future attack vector.

The Supply Chain Angle

Modern infrastructure also depends heavily on third-party software and open-source libraries, creating another attack surface.

Iranian actors have demonstrated increasing sophistication in supply-chain attacks, including:

  • Compromising Managed Service Providers (MSPs)
  • Breaching regional IT integrators to access downstream clients
  • Hijacking legitimate vendor update mechanisms

In these scenarios, attackers may remain dormant until their code detects it is running within a specific environment—such as industrial systems or drone control software (Microsoft Threat Intelligence, 2022).

Why Continuous Security Testing Matters

One of the defining characteristics of the Iranian cyber playbook is that it exploits slow-moving security programs.

Organizations that rely on periodic security testing often leave long windows of opportunity for attackers to:

  • exploit misconfigurations
  • reverse engineer systems
  • move laterally within networks

Continuous offensive security testing, like pentesting or red teaming, can help close these gaps by identifying vulnerabilities as soon as new systems, assets, or configurations appear (Salim et al., 2023).

Instead of reacting months later, security teams can detect weaknesses before attackers do.

The Reality for Security Teams

Iranian cyber groups are not out to exploit the next big zero-day, but their tactics are not theoretical, either. They are built around a simple principle: attack what organizations forget to secure. This usually involves weak passwords, unpatched software, default credentials, and misconfigured infrastructure.

For most organizations, the biggest risks are not unknown vulnerabilities—but the known weaknesses that remain exposed for too long. In moments of geopolitical tension, cyber operations often intensify. But the tactics themselves rarely change. Attackers do not need exotic capabilities to cause damage.

References

Barr-Smith, F., Ugarte-Pedrero, X., Graziano, M., Spolaor, R., & Martinovic, I. (2021). Survivalism: Systematic analysis of Windows malware living-off-the-land. 2021 IEEE Symposium on Security and Privacy (SP), 1557–1574. https://doi.org/10.1109/sp40001.2021.00047

Cybersecurity and Infrastructure Security Agency. (2022). Alert AA22-257A: Iranian Islamic Revolutionary Guard Corps-affiliated cyber actors exploiting vulnerabilities for data extortion and disk encryption for ransom operations. U.S. Department of Homeland Security. https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-257a

Cybersecurity and Infrastructure Security Agency. (2023). Alert AA23-335A: IRGC-affiliated cyber actors exploit PLCs in multiple sectors. U.S. Department of Homeland Security. https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a

Cybersecurity and Infrastructure Security Agency. (2024). Alert AA24-038A: Identifying and mitigating living off the land techniques. U.S. Department of Homeland Security. https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a

Cybersecurity and Infrastructure Security Agency. (2024). Alert AA24-241A: Iran-based cyber actors enabling ransomware attacks on US organizations. U.S. Department of Homeland Security. https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a

Microsoft Threat Intelligence. (2022). MuddyWater actor provides access to Middle East targets. Microsoft Security. https://www.microsoft.com/en-us/security/blog/2022/11/17/muddywater-actor-provides-access-to-middle-east-targets/

Quintero-Bonilla, S., & Martín del Rey, A. (2020). A new proposal on the advanced persistent threat: A survey. Applied Sciences, 10(11), 3874. https://doi.org/10.3390/app10113874

Salim, D. T., Singh, M. M., & Keikhosrokiani, P. (2023). A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model. Heliyon, 9(3), e17156. https://doi.org/10.1016/j.heliyon.2023.e17156

Back to Blog
About Joe Brinkley
Joe Brinkley, also known in the community as BlindHacker, serves as the Director of Offensive Security Research & Community at Cobalt. Bringing over 20 years of "in the trenches" experience to the offensive security space, Joe’s career began in 2005 with a decade as a high-level government consultant before he transitioned into commercial penetration testing in 2016. He joined Cobalt in late 2025, drawn by a mission to evolve traditional Pentesting into a more dynamic, community-driven research model. When he isn't obsessing over cybersecurity, you’ll likely find him tinkering in his home lab or perfecting a smoked brisket. More By Joe Brinkley