Back to Intelligence

How to Defend Against Iran-Linked Cyber Threats: Detection Strategies and Hardening

SA
Security Arsenal Team
March 30, 2026
5 min read

How to Defend Against Iran-Linked Cyber Threats: Detection Strategies and Hardening

Introduction

Recent geopolitical tensions have led to a noticeable increase in cyber activity attributed to Iran-linked threat groups. As highlighted in recent advisories, these campaigns are no longer limited to regional targets but are expanding globally, affecting critical infrastructure, government entities, and private enterprises. For defenders, this means the threat landscape has shifted from theoretical risk to active danger. Understanding the "Cyber Playbook" employed by these actors—ranging from espionage to destructive wiper attacks—is essential for maintaining organizational resilience.

Technical Analysis

Iran-linked Advanced Persistent Threats (APTs), such as those tracked as MuddyWater, APT33, and APT35, have historically utilized a blend of off-the-shelf tools and custom malware to achieve their objectives. In the current context, Rapid7 and other intelligence sources indicate an uptick in:

  1. Credential Harvesting: Utilizing web shells and custom tools to exfiltrate credentials from Active Directory environments.
  2. Destructive Malware: Deployment of disk-wiping malware (e.g., variants similar to ZeroCleare or Fantasy) designed to render systems inoperable.
  3. Living Off the Land (LotL): Abuse of native administrative tools like PowerShell, WMI, and Bitsadmin to evade detection.

Affected Systems: The primary targets are Windows-based environments, specifically domain controllers, file servers, and IIS web servers.

Severity: CRITICAL. While espionage involves data theft, the shift toward destructive attacks poses an immediate risk to business continuity and data integrity.

Defensive Monitoring

To detect these behaviors, security teams must monitor for unusual process execution patterns, signs of destructive file activity, and credential access attempts. Below are detection rules and hunt queries specifically tuned to TTPs associated with recent Iran-linked campaigns.

SIGMA Rules

The following SIGMA rules detect common patterns associated with these threat actors, including attempts to disable defenses or execute destructive commands.

YAML
---
title: Potential Volume Shadow Copy Deletion (Wiper Activity)
id: 8a7c8f92-1d3e-4b5a-9c6d-0e1f2a3b4c5d
status: experimental
description: Detects attempts to delete Volume Shadow Copies via vssadmin or PowerShell, a common precursor to wiper malware or ransomware.
references:
  - https://attack.mitre.org/techniques/T1490/
author: Security Arsenal
date: 2023/10/25
tags:
  - attack.impact
  - attack.t1490
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    CommandLine|contains:
      - 'delete shadows'
      - 'DeleteShadowStorage'
  condition: selection
falsepositives:
  - System administrators performing backup maintenance
level: high
---
title: Suspicious PowerShell Encoded Command
id: b1c2d3e4-5f6a-7b8c-9d0e-1f2a3b4c5d6e
status: experimental
description: Detects the use of EncodedCommand in PowerShell, frequently used by threat actors to obfuscate malicious scripts.
references:
  - https://attack.mitre.org/techniques/T1059/001/
author: Security Arsenal
date: 2023/10/25
tags:
  - attack.execution
  - attack.t1059.001
logsource:
  category: process_creation
  product: windows
detection:
  selection:\    Image|endswith: '\powershell.exe'
    CommandLine|contains: '-Enc'
  condition: selection
falsepositives:
  - Legitimate software installation scripts
  - System management tools
level: medium
---
title: Suspicious Certutil Download
id: c2d3e4f5-6a7b-8c9d-0e1f-2a3b4c5d6e7f
status: experimental
description: Detects certutil being used to download remote files, a technique often used for staging malware.
references:
  - https://attack.mitre.org/techniques/T1105/
author: Security Arsenal
date: 2023/10/25
tags:
  - attack.command_and_control
  - attack.t1105
logsource:
  category: process_creation
  product: windows
detection:
  selection:\    Image|endswith: '\certutil.exe'
    CommandLine|contains: 'urlcache'
  condition: selection
falsepositives:
  - Rare administrative file retrieval
level: high

KQL Queries

Use these queries in Microsoft Sentinel or Microsoft 365 Defender to hunt for indicators of compromise (IOCs) or behavioral anomalies.

KQL — Microsoft Sentinel / Defender
// Hunt for suspicious PowerShell activity often used in web shell attacks
DeviceProcessEvents
| where Timestamp > ago(7d)
| where FileName in~ ("powershell.exe", "pwsh.exe")
| where ProcessCommandLine has "Invoke-Expression" or ProcessCommandLine has "IEX"
| summarize count(), FirstSeen=min(Timestamp), LastSeen=max(Timestamp) by DeviceName, AccountName, ProcessCommandLine
| order by count_ desc


// Detect potential wiper precursor events (System file modification)
DeviceFileEvents
| where Timestamp > ago(24h)
| where FileName in~ ("lsass.exe", "ntoskrnl.exe", "hal.dll")
| where InitiatingProcessFileName !in~ ("windows", "explorer.exe", "services.exe")
| project Timestamp, DeviceName, FileName, InitiatingProcessFileName, FolderPath, ActionType

Velociraptor VQL

These Velociraptor hunts help identify artifacts of persistence and destructive activity on endpoints.

VQL — Velociraptor
-- Hunt for Scheduled Tasks that run PowerShell with encoded arguments
SELECT Name, Action, Trigger, Command
FROM foreach(
  row=glob(globs='C:\Windows\System32\Tasks\**'),
  query={
    SELECT Name, parse_xml(data=read_file(filename=OSPath)).xpath(query="//Task/Actions/Exec/@Command") AS Command,
           parse_xml(data=read_file(filename=OSPath)).xpath(query="//Task/Actions/Exec/@Arguments") AS Arguments,
           OSPath
    FROM scope()
  }
)
WHERE Command =~ "powershell.exe" AND Arguments =~ "-Enc"


-- Hunt for recent creation of hidden files in System32 (common for webshells/droppers)
SELECT FullPath, Size, Mode.Bits, Mtime, Atime
FROM glob(globs='C:\Windows\System32\**', nosymlink=TRUE)
WHERE Mtime > now() - 48h
  AND Mode.Bits & 0x02 == 0  -- Hidden file flag

PowerShell Remediation Script

Run this script on domain controllers to audit and identify suspicious Scheduled Tasks that may have been created by threat actors for persistence.

PowerShell
<#
.SYNOPSIS
    Audit Scheduled Tasks for suspicious execution patterns.
.DESCRIPTION
    This script scans the Task Scheduler for tasks running PowerShell with encoded commands or suspicious paths.
#>

Get-ScheduledTask | Where-Object {
    $_.State -eq 'Ready' -and $_.Actions.Execute -like '*powershell*'
} | ForEach-Object {
    $Action = $_.Actions.Execute
    $Arguments = $_.Actions.Arguments
    
    if ($Arguments -match '-Enc' -or $Arguments -match 'DownloadString') {
        Write-Host "[!] Suspicious Task Found: $($_.TaskName)" -ForegroundColor Red
        Write-Host "    Action: $Action $Arguments"
    }
}

Remediation

To protect your organization against these sophisticated threats, implement the following measures immediately:

  1. Patch Management: Ensure all systems, particularly Windows Servers and VPN appliances, are fully patched. Iran-linked actors frequently exploit vulnerabilities in VPN gateways (e.g., Fortinet, Pulse Secure) for initial access.
  2. Disable Unnecessary Services: Review IIS servers and disable unused extensions (e.g., WebDAV) if not required. Restrict the use of PowerShell Constrained Language Mode where possible.
  3. Identity Hardening: Enforce Multi-Factor Authentication (MFA) for all remote access and administrative accounts. Implement Privileged Access Workstations (PAWs) for IT admin tasks.
  4. Network Segmentation: Segment critical servers from user workstations to prevent lateral movement.
  5. Audit and Lockdown: Review active user accounts and disable any dormant or orphaned accounts. Audit Group Policy Objects (GPOs) for unauthorized script execution.

Executive Takeaways

  • Active Threat: Iran-linked groups are actively targeting organizations globally using both destructive wipers and stealthy espionage techniques.
  • Detection Gap: Traditional antivirus may miss "Living Off the Land" attacks; behavioral detection (SIGMA/Velociraptor) is crucial.
  • Preparedness: The best defense against destructive attacks is immutable backups and a tested incident response plan.

Related Resources

Security Arsenal Managed SOC Services AlertMonitor Platform Book a SOC Assessment soc-mdr Intel Hub

socmdrmanaged-socdetectionthreat-intelligenceaptsoc-mdrdefense

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.