Skip to main content

UNC1860

Repository Navigation

UNC1860

Aliases: None confirmed by any vendor. "Temple of Oats" is the title of the Mandiant September 2024 report ("UNC1860 and the Temple of Oats"), not an actor alias — do not record it as one. TEMPLEDOOR, TEMPLEPLAY, and TEMPLEDROP are malware/tool family names associated with this cluster, not actor designations.

Assessed sponsor: Iran state-sponsored, likely MOIS-affiliated in Malpedia and Mandiant-linked reporting.

Relevance

UNC1860 is high priority for Israeli government and public-sector defenders because Malpedia describes it as a persistent and opportunistic Iranian state-sponsored actor likely affiliated with MOIS. The profile highlights specialized tooling and passive backdoors that support persistent access to high-priority Middle Eastern networks, including government and telecommunications.

Mandiant reporting frames UNC1860 as a probable initial access provider with tooling that can enable persistent footholds and handoff-style operations. For Israeli and regional defenders, this means UNC1860 should be treated as an access-enablement and persistence risk even when another persona later conducts espionage, leakage, or destructive activity.

Defensive Focus

  • Public-facing edge systems.
  • IIS, SharePoint, Exchange, and externally reachable web applications.
  • Passive backdoors and webshell-like persistence.
  • Government and telecommunications networks.
  • Long-lived access that may be handed off to destructive or influence-operation teams.

Associated Families And Tools

Use the generated UNC1860 tool matrix and individual tool pages for behavior, hash/IOC status, sources, and defensive hunting notes:

Detection Ideas

  • New or modified files under web roots, SharePoint paths, IIS modules, and application upload directories.
  • Web server worker processes spawning shells, scripting engines, or archive tools.
  • Long-lived low-volume callbacks from edge servers.
  • New local or domain accounts created after public-facing application anomalies.
  • RDP, SMB, or WMI activity originating from web servers or DMZ hosts.
  • File integrity deviations on internet-facing systems outside approved deployment windows.

Analytic Caution

UNC1860 should not be used as a default attribution label for every Iran-linked webshell. Analysts SHOULD require multiple evidence lines: victimology, specialized tooling, infrastructure, passive backdoor behavior, and source-backed malware-family linkage.

Sources: SRC-MALPEDIA-UNC1860, SRC-MANDIANT-UNC1860.