Iran's Cyber Warfare Paradox: Under Siege While Threatening Critical Infrastructure

Iran's Cyber Warfare Paradox: Under Siege While Threatening Critical Infrastructure
Photo by Mehrshad Rajabi / Unsplash

As anti-government protests engulf Iran with death tolls potentially reaching 20,000, the Islamic Republic finds itself fighting a two-front cyber war—defending against unprecedented attacks on its own infrastructure while maintaining offensive operations against Western targets. This escalating cyber conflict, intertwined with the U.S. military operation in Venezuela earlier this month, reveals the evolving nature of modern warfare where kinetic and digital operations merge into a single theater.

The New Year's Day Cyber Assault

On January 1, 2026, Iran's telecommunications infrastructure faced what authorities describe as one of the largest distributed denial-of-service attacks in recent history. The assault peaked at 720 million packets per second, launched from over 125,000 distributed sources worldwide, according to Iran's Minister of Information and Communications Technology Sattar Hashemi.

The attack specifically targeted Iran's telecommunications service providers using a coordinated global botnet. Iranian officials claim their defenses successfully mitigated 502 million packets per second domestically, with the remainder countered through international partnerships. The timing coincided suspiciously with the beginning of mass protests over economic collapse, as Iran's currency plummeted to 1 million rials per U.S. dollar.

"This attack, in terms of its scope and severity, is among the most significant cyberattacks in recent times and could have created major challenges for the country," Hashemi stated, though he emphasized that preventive measures neutralized the threat.

The sophistication and scale suggest state-level resources, though attribution remains officially unconfirmed. However, the context cannot be ignored: just hours earlier, U.S. Cyber Command executed a devastating cyberattack on Venezuela's infrastructure as part of Operation Absolute Resolve.

The Venezuela Precedent: Cyber-Enabled Regime Change

The January 1 capture of Venezuelan President Nicolás Maduro by U.S. special forces marked a watershed moment in cyber warfare doctrine. U.S. Cyber Command disabled Caracas's power grid, scrambled air defense radars, and disrupted military communications in a coordinated operation that General Dan Caine described as "layering different effects to create a pathway" for kinetic forces.

The operation exposed critical vulnerabilities in Russian, Chinese, and Iranian-supplied defense systems that Venezuela had accumulated over years. Iranian Mohajer-6 combat drones stationed at El Libertador Air Base—assembled in Venezuela using Iranian technology and technical personnel—proved ineffective against the integrated U.S. cyber and kinetic assault. (For a comprehensive analysis of the Venezuela operation, see our detailed examination of Operation Absolute Resolve.)

President Trump's public acknowledgment of cyber operations represents a significant shift from historical covert approaches. "The military is looking at it, and we're looking at some very strong options," Trump told reporters, signaling willingness to deploy cyber weapons openly as instruments of statecraft.

This transparency serves multiple purposes: demonstrating capability to adversaries like Iran, establishing new norms for cyber warfare, and potentially deterring future conflicts. But it also reveals to Tehran exactly what they might face if tensions escalate further.

Faced with domestic unrest amplified by social media, Iranian authorities imposed a comprehensive internet shutdown now exceeding nine days—longer than the notorious 2019 blackout. NetBlocks reports that "though news is limited due to the information vacuum, reports indicate thousands have been killed in the subsequent crackdown."

However, this digital siege strategy faces a new challenge: Elon Musk's Starlink. Thousands of terminals smuggled into Iran since 2022 now provide protesters with uncensored satellite connectivity, circumventing traditional infrastructure controls. Iran has responded with GPS spoofing and satellite jamming techniques, but these prove only partially effective against the distributed satellite constellation.

The U.S. has also authorized free Starlink service for Iran through February, mirroring similar support provided to Venezuela after Maduro's capture. Cybersecurity specialists warn that Iranian jamming efforts could enable user tracking, exposing protesters to both cyber crime and state action.

Mahmood Amiry-Moghaddam, director of Iran Human Rights, confirmed that Starlink access has been "pivotal in sharing information about the protests," though the blackout's geographic scope and duration surpass all previous Iranian censorship efforts.

Iran's Offensive Cyber Ecosystem: IRGC Command and Hacktivist Proxies

Despite domestic pressures, Iran maintains sophisticated offensive cyber capabilities through a coordinated network of Islamic Revolutionary Guard Corps (IRGC) units and hacktivist proxies. This ecosystem represents a deliberate strategy to conduct state operations while maintaining plausible deniability. (For our analysis of Iran's hacktivist proxy network, see The Cyber Proxy War: How Israel and Iran Are Fighting Through Hacktivist Coalitions.)

Key Iranian APT Groups:

IRGC-Affiliated Actors:

  • APT33: Targets energy and aviation sectors, linked to destructive campaigns
  • APT34 (OilRig): Focuses on Middle Eastern government and financial institutions
  • APT35 (Charming Kitten): Conducts long-term espionage through sophisticated social engineering
  • APT42: Specializes in credential harvesting and cloud environment compromise. This group has conducted high-profile operations including compromising John Bolton's email containing classified information, demonstrating sophisticated targeting of senior U.S. officials.
  • CyberAv3ngers: Targets critical infrastructure, particularly Israeli-made PLCs in U.S. water systems

These groups share tactics, techniques, and procedures (TTPs), with evidence of operational coordination that blurs the line between state-sponsored APTs and "independent" hacktivists. As our mapping of the global cybercrime empire revealed, Iran—alongside Russia, China, and North Korea—controls 77% of all state-sponsored cyber operations, representing a coordinated threat ecosystem rather than isolated actors.

Recent Attack Patterns:

Critical Infrastructure Targeting: Between November 2023 and January 2024, CyberAv3ngers compromised at least 75 Unitronics PLC devices across multiple U.S. critical infrastructure sectors, including 34 in water and wastewater systems. The attacks exploited devices with default or no passwords, displaying the message: "You have been hacked, down with Israel. Every equipment 'made in Israel' is CyberAv3ngers legal target." Our in-depth analysis of Iranian actors targeting critical infrastructure documented how these groups use brute force attacks and MFA exploitation to maintain persistent access across healthcare, IT, and government sectors.

Cyber-Enabled Kinetic Targeting: Amazon Web Services researchers identified a concerning evolution in Iranian tactics: using cyberattacks for reconnaissance before and after kinetic strikes. Imperial Kitten, an IRGC-linked group, compromised Automatic Identification Systems on maritime vessels and CCTV cameras in Israel to scope targets and assess damage from missile attacks. Our investigation into Lemon Sandstorm's prolonged Middle East campaign revealed similar patterns of persistent access and pre-positioning for future attacks.

Albania Campaign: In July 2022, IRGC-sponsored APT42 conducted destructive attacks against the Albanian government using ROADSWEEP ransomware, targeting the country for hosting Iranian opposition group MEK. The attacks disrupted government websites and TIMS/MEMEX systems, with hackers periodically publishing stolen database information. Iran's maritime cyber operations have shown similar sophistication, with our reporting on the digital siege against Iran's maritime empire demonstrating how attackers compromised satellite communication systems across Iranian shipping fleets.

Evidence of Diminished Iranian Offensive Capacity

Interestingly, defense analysts have observed a notable decline in certain Iranian cyber operations during the current crisis. Clive Higgins, CEO of Leonardo UK, reported that "online bot activity promoting the independence of Scotland from the UK reduced as Iranian authorities violently suppressed civil protest this month."

This suggests Iran's cyber resources are being redirected toward domestic surveillance and censorship efforts rather than external influence operations. A British parliamentary intelligence committee report from July 2025 had identified the UK as a priority target for Iranian cyber attacks, ranking just behind the U.S. and Saudi Arabia.

"Iran has a high appetite for risk when conducting offensive activity and its intelligence services are ferociously well-resourced," stated committee chairman Kevan Jones, noting Iran's use of "proxy groups—including criminal networks, militant and terrorist organizations, and private cyber actors—to provide it with a deniable means of attacking its adversaries."

The Escalation Calculus: Trump's "Holy Hell" and Iranian Red Lines

Senator Lindsey Graham's recent call for President Trump to unleash "holy hell" on Iran—including "a massive wave of military, cyber and psychological attacks"—reflects growing momentum for U.S. intervention. Graham specifically urged attacks to "destroy the infrastructure that allows the massacre and slaughter of the Iranian people, and take down the leaders responsible for the killing."

Trump has announced a 25% tariff on countries conducting business with Iran and canceled all meetings with Iranian officials "until the senseless killing of protesters STOPS." His January 2 warning that the U.S. would "come to their rescue" if protesters were killed has evolved into concrete considerations of cyber and kinetic operations.

The administration is reportedly evaluating options ranging from:

  • Offensive cyber attacks targeting Iranian military and civilian infrastructure
  • Psychological operations amplifying anti-regime messaging
  • Covert actions supporting protest movements
  • Targeted military strikes against nuclear facilities or IRGC assets

Iranian Parliament Speaker Mohammad Baqer Qalibaf responded with threats that "all American military centers, bases and ships in the region will be our legitimate targets" if the U.S. attacks.

The Cyber Warfare Paradigm Shift

The convergence of the Venezuela operation and Iran's domestic crisis illuminates several critical trends:

1. Cyber-Kinetic Integration Has Arrived The Venezuela operation demonstrated seamless integration of cyber effects with special operations forces. This isn't theoretical capability—it's operational doctrine being executed in real-time.

2. Transparency as Deterrence By publicly acknowledging cyber operations, the U.S. is reshaping norms. This transparency aims to deter adversaries but risks escalation as nations feel pressure to demonstrate their own capabilities.

3. Satellite Internet Changes Censorship Calculus Starlink fundamentally alters authoritarian regimes' ability to control information. Iran's inability to fully counter satellite-based connectivity represents a significant shift in the information warfare landscape.

4. Dual-Use Hacktivist Ecosystems Iran's model of maintaining hacktivist proxies for plausible deniability is being exposed through Treasury sanctions and intelligence disclosures. The CyberAv3ngers revelation—initially presented as independent activists but later sanctioned as IRGC officers—demonstrates this strategy's limits.

5. Critical Infrastructure Remains Vulnerable Despite years of warnings, Iranian actors continue successfully exploiting U.S. water systems, power grids, and industrial control systems through basic attacks like default passwords. The sophistication gap between defenders and attackers persists. As we documented in our analysis of Iran's cyber warfare and the Trump campaign hack, APT42's credential harvesting operations against high-profile targets demonstrate both Iran's offensive capabilities and the vulnerabilities in defensive postures—on both sides.

Iran’s Cyber Warfare: The Hack on the Trump Campaign and the Blowback on Iran’s Infrastructure
In the shadowy world of cyber warfare, where nation-states wield keyboards instead of swords, the recent confrontation between Iran and the United States highlights the growing complexity and danger of digital conflicts. The most recent chapter in this ongoing saga involved Iran’s hacking of the Trump campaign, followed by

Implications for CISOs and Security Leaders

This evolving situation demands immediate attention to several risk factors:

Assess Iranian APT Exposure: Organizations with ties to Israeli vendors, defense contractors, or Middle Eastern operations face heightened risk. Review network segmentation, OT/IT isolation, and access controls for internet-facing industrial systems.

Prepare for DDoS Campaigns: Iranian-affiliated hacktivist groups conduct coordinated DDoS attacks during geopolitical tensions. Implement cloud-based DDoS protection, traffic filtering, rate limiting, and load balancing capabilities.

Monitor for Spear-Phishing Escalation: APT35 and APT42 excel at sophisticated social engineering, often impersonating journalists, academics, or event organizers. Enhance user training on recognizing typosquatted domains and suspicious invitations.

Secure Industrial Control Systems: The CyberAv3ngers attacks exploited Unitronics PLCs with default credentials. Audit all internet-connected OT devices, change default passwords, implement network segmentation, and consider removing PLC internet connectivity entirely.

Anticipate False-Flag Operations: Russia previously hijacked Iranian cyber infrastructure to piggyback into already-compromised networks. Attribution during heightened tensions may be unreliable; focus on indicators of compromise rather than threat actor identity.

Develop Incident Response Plans for Geopolitical Events: The rapid escalation from protest to cyber warfare to potential military intervention illustrates how quickly threat landscapes shift. Tabletop exercises should include scenarios where multiple state actors conduct concurrent campaigns.

The Road Ahead

As this analysis goes to publication on January 20, 2026—the day of Trump's second inauguration—Iran faces an unprecedented cyber siege. Simultaneously defending against potential U.S. offensive operations while maintaining its own cyber campaigns, all during a domestic crisis that has killed thousands, reveals the limits of even sophisticated cyber powers.

Former Trump National Security Adviser John Bolton Indicted: Iran Hacked Email Account Containing Top Secret Information
Federal grand jury charges Bolton with 18 counts of mishandling classified documents as Iranian cyber actors accessed his personal email—part of Tehran’s expanding cyber warfare campaign Former National Security Adviser John Bolton was indicted Thursday by a federal grand jury in Maryland on 18 criminal counts related to the

The next phase of this conflict will likely determine whether cyber warfare becomes normalized as an instrument of statecraft or whether new international norms emerge to constrain these capabilities. For security professionals, the lesson is clear: the cyber domain is no longer separate from kinetic warfare—it's the opening act, the main event, and the aftermath all in one.

Organizations must prepare not just for Iranian attacks, but for the broader reality that nation-state cyber operations are accelerating, becoming more destructive, and increasingly integrated with traditional military operations. The question is no longer whether cyber war will come—it's whether defenders can keep pace with the new doctrine being written in real-time across Venezuela, Iran, and beyond.


Related Reading from CISO Marketplace:

Iran Cyber Operations & APT Groups:

Iranian Maritime & Geopolitical Cyber Operations:

U.S. Cyber Operations & Broader Context:


Key Takeaways for Security Teams:

  1. Iranian APTs remain active despite domestic crisis, focus on U.S. critical infrastructure
  2. Satellite internet fundamentally changes information warfare dynamics
  3. Cyber operations now seamlessly integrate with kinetic military actions
  4. Basic security hygiene (password management, network segmentation) defeats many sophisticated APT attacks
  5. Attribution during geopolitical tensions may be unreliable; focus on defense-in-depth
  6. Prepare for coordinated DDoS campaigns and spear-phishing escalation
  7. Industrial control systems face heightened risk; remove unnecessary internet connectivity

Sources and Further Reading:

  • CISA Iran Threat Overview: https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/iran
  • CSIS Analysis - Beyond Hacktivism: https://www.csis.org/blogs/strategic-technologies-blog/beyond-hacktivism-irans-coordinated-cyber-threat-landscape
  • Treasury Sanctions on IRGC-CEC Actors: https://home.treasury.gov/news/press-releases/jy2292
  • Unit 42 Iranian Threat Landscape: https://unit42.paloaltonetworks.com/iranian-cyberattacks-2025/

Read more

Operation Leak: FBI and Global Partners Dismantle LeakBase, One of the World's Largest Cybercriminal Data Forums

Operation Leak: FBI and Global Partners Dismantle LeakBase, One of the World's Largest Cybercriminal Data Forums

March 4, 2025 — In one of the most sweeping international cybercrime enforcement actions of the year, the Federal Bureau of Investigation, Europol, and law enforcement agencies spanning 14 countries have dismantled LeakBase — a massive open-web forum where cybercriminals bought, sold, and traded stolen data from breaches targeting American corporations, individuals,

By Breached Company