Skip to main content

Defensive CTI Research on Threats to Israeli Government and Public-Sector Environments

Status: Research synthesis.

Handling: TLP:CLEAR. This report uses public sources and source IDs from data/sources.csv. Temporary citation markers from source research have been converted to repository source IDs.

Executive Summary

FACT: Public reporting from 2024 through 2026 shows sustained Iran-nexus and Hamas- or Palestinian-aligned cyber activity focused on Israeli targets. Reporting emphasizes destructive operations, hack-and-leak activity, credential theft, targeted phishing, fake security updates, brand impersonation, and mobile espionage. Key source anchors include SRC-CP-HANDALA-2026, SRC-MITRE-G1055, SRC-GOOGLE-APT42-PHISHING, SRC-INCD-MUDDYWATER-2024, SRC-INCD-MUDDYWATER-PHISHING, SRC-CP-WEZRAT, SRC-CP-WIRTE-2024, SRC-ESET-ARIDSPY, and SRC-MANDIANT-MTRENDS-2025.

ASSESSMENT: For Israeli government, municipal, critical infrastructure, telecom, defense-adjacent, and supplier environments, the highest-priority defensive concern is an ecosystem rather than a single actor. Iranian state-linked operators and personas blend espionage, access enablement, destructive activity, and information operations. The most operationally relevant clusters are Void Manticore / Handala, MuddyWater, APT42 / Mint Sandstorm, Agrius, CyberAv3ngers, Emennet Pasargad / Cotton Sandstorm, OilRig-adjacent clusters, WIRTE, and Arid Viper.

FACT: Current reporting also supports a second-tier watchlist of actors relevant to Israeli exposure: UNC3890, Lebanese Cedar / Volatile Cedar, TA402 / Molerats, and Cyber Toufan. These actors have either directly targeted Israeli sectors, targeted regional government ecosystems intersecting with Israeli interests, or used tactics directly portable into Israeli government and supplier environments.

ASSESSMENT: The most useful defensive framing is to organize collection and detections around five recurring risk patterns rather than actor names alone:

  • Identity compromise and phishing.
  • Malware-delivering fake installers and fake updates.
  • Edge-system compromise and webshell persistence.
  • Destructive or pseudo-ransomware impact operations.
  • OT/ICS targeting of exposed management surfaces.

These patterns recur across the highest-priority actors and are more stable than public naming conventions.

Actor Priority Table

PriorityActor / PersonaAssessed Sponsor Or AlignmentWhy It MattersConfidenceKey Sources
CriticalVoid Manticore / Handala / Karma / Homeland JusticeMOIS-linked Iranian threat group in public reportingDestructive and hack-and-leak activity against Israeli organizations; strong fit for municipal, public-sector, and supplier disruption risk.HighSRC-MITRE-G1055, SRC-CP-HANDALA-2026, SRC-CP-VOID-2024
CriticalMuddyWater / Seedworm / Mango SandstormMOIS-linked / MOIS subordinate in government and vendor reportingIsrael-specific INCD reporting, phishing waves, critical-infrastructure targeting, and government/telecom/supplier relevance.HighSRC-CISA-AA22-055A, SRC-INCD-MUDDYWATER-2024, SRC-INCD-MUDDYWATER-PHISHING, SRC-ESET-MUDDYWATER-SNAKES
CriticalAPT42 / Mint Sandstorm / TA453 / Charming KittenIRGC-IO / Iran-sponsored in public reportingTop identity and cloud-account risk for Israeli decision-makers, defense-linked users, NGOs, academics, and diplomats.HighSRC-GOOGLE-APT42-PHISHING, SRC-GOOGLE-APT42-UNCHARMED, SRC-MS-MINT-SANDSTORM
HighAgrius / Pink Sandstorm / BlackShadow / Agonizing SerpensIran-linked / MOIS-linked in public reportingDestructive and pseudo-ransomware operations against Israeli sectors, including healthcare, higher education, technology, and suppliers.HighSRC-MITRE-G1030, SRC-S1-AGRIUS-WIPER, SRC-UNIT42-AGRIUS, SRC-MS-IRAN-HAMAS
HighCyberAv3ngers / Cyber AvengersIRGC-affiliated persona/groupOT/ICS exposure threat, Israeli-made Unitronics targeting, and PLC/HMI disruption risk.HighSRC-CISA-AA23-335A, SRC-CISA-AA26-097A, SRC-MANDIANT-OT-HACKTIVISTS
HighEmennet Pasargad / Cotton Sandstorm / Aria Sepehr AyandehsazanIran-linked influence and intrusion actor/companyFake INCD phishing, WezRat, and cyber-enabled influence operations against Israeli organizations.HighSRC-FBI-EMENNET-2024, SRC-CP-WEZRAT, SRC-MS-IRAN-IO
HighOilRig / APT34 / Hazel Sandstorm ecosystemIran-linked espionage ecosystemGovernment targeting, regional supply-chain exposure, webshells, passive backdoors, and potential access handoff activity.Moderate-HighSRC-MITRE-G0049, SRC-ESET-OILRIG-ISRAEL, SRC-CP-EDUCATED-2023
HighUNC1860Iran MOIS-linked in public reportingSpecialized tooling, passive backdoors, persistent access, and probable initial access provider role for high-priority Middle Eastern networks.HighSRC-MALPEDIA-UNC1860, SRC-MANDIANT-UNC1860
HighAPT-C-23 / Arid Viper / Desert FalconHamas-linked or Palestinian-aligned in public reportingMobile espionage risk to field personnel, contractors, reservists, officials, and politically exposed users.Moderate-HighSRC-MITRE-G1028, SRC-ESET-ARIDSPY, SRC-META-ARIDVIPER
HighWIRTE / Gaza Cybergang-linked clusterHamas-affiliated in Check Point reportingFake-update campaigns, compromised trusted senders, and disruptive SameCoin-linked activity against Israeli entities.Moderate-HighSRC-CP-WIRTE-2024
MediumTA402 / Molerats / Gaza CybergangPalestinian-aligned in public reportingTrusted-account phishing and IronWind infection chains against Middle East government entities.ModerateSRC-PROOFPOINT-TA402-IRONWIND
MediumUNC3890Suspected Iran-linkedIsraeli shipping, logistics, healthcare, aviation, energy, and government targeting.ModerateSRC-MANDIANT-UNC3890
WatchLebanese Cedar / Volatile CedarHezbollah-linked in public reportingWebshell-centric regional espionage against government, telecom, and web estates; current Israel-specific urgency is lower.ModerateSRC-CLEARSKY-LEBANESE-CEDAR
WatchCyber ToufanPro-Palestinian / Iran-aligned persona in public reportingDisruptive and psychological-operation persona; claims require corroboration before attribution.Low-ModerateSRC-OPI-CYBER-TOUFAN, SRC-MANDIANT-MTRENDS-2025

Source Register Summary

Use data/sources.csv for the full machine-readable register. This report adds or relies heavily on:

  • SRC-MITRE-G1055: VOID MANTICORE MITRE ATT&CK profile.
  • SRC-INCD-MUDDYWATER-2024: INCD MuddyWater 2024 evolution report.
  • SRC-INCD-MUDDYWATER-PHISHING: INCD recent phishing report.
  • SRC-CISA-AA24-290A: Iranian brute force and credential-access advisory.
  • SRC-CP-WEZRAT: Check Point WezRat deep dive.
  • SRC-FBI-EMENNET-2024: Joint Emennet Pasargad tradecraft advisory.
  • SRC-CP-WIRTE-2024: Check Point WIRTE disruptive activity report.
  • SRC-PROOFPOINT-TA402-IRONWIND: Proofpoint TA402 IronWind report.
  • SRC-MANDIANT-MTRENDS-2025: Mandiant M-Trends 2025.
  • SRC-CP-BUGSLEEP: Check Point BugSleep / MuddyWater report.

Actor Profiles

Void Manticore / Handala

FACT: MITRE and Check Point associate Void Manticore with MOIS-linked destructive activity and public-facing personas such as Handala, Karma, and Homeland Justice.

ASSESSMENT: The actor is a critical disruptive risk for public-sector environments where coercion and influence may matter more than monetization.

Detection ideas:

  • Alert on mass file deletion, encryption-like behavior, or wipe-like activity after public-data exposure.
  • Hunt for webshells and edge compromise preceding destructive actions.
  • Correlate hack-and-leak claims with local telemetry before executive attribution.

MuddyWater

FACT: INCD published Israel-specific MuddyWater reporting covering activity in the Israeli cyber domain and recent phishing campaigns.

ASSESSMENT: MuddyWater should be treated as a critical access, phishing, and persistence threat for government, telecom, NGOs, IT suppliers, academia, and critical infrastructure.

Detection ideas:

  • Hebrew-localized phishing themes.
  • Compromised organizational mailboxes sending high-volume links or attachments.
  • PowerShell, WSF, Golang, and backdoor staging from user-writable paths.
  • RMM, SOCKS, DNS tunneling, and suspicious C2 from systems that do not normally administer networks.

APT42 / Mint Sandstorm / APT35-Adjacent Activity

FACT: Google reported intensified APT42 targeting of Israeli and U.S. high-value users in 2024, including Israeli military-, defense-, diplomatic-, academic-, and NGO-linked accounts.

ASSESSMENT: Israeli defenders should treat this as a VIP identity and cloud-account problem. Actor naming varies by vendor, but the defensive problem remains credential phishing, rapport-building, cloud-hosted lures, and account takeover.

Detection ideas:

  • New OAuth grants after cloud-hosted lure clicks.
  • DocSend, Google Sites, Drive, Dropbox, or fake media/interview lures aimed at VIP users.
  • Risky sign-ins, token reuse, impossible travel, and MFA fatigue.

Emennet Pasargad / Cotton Sandstorm

FACT: The joint FBI / U.S. Treasury / INCD advisory and Check Point WezRat reporting tie Emennet Pasargad / Cotton Sandstorm to fake security-alert phishing and Israeli-themed lures.

ASSESSMENT: Public-sector recipients are likely to trust urgent security notifications. Fake INCD notices and browser update themes should be prioritized in mail and endpoint detection.

Detection ideas:

  • Security-patch or browser-update executables launched from email paths.
  • Sender-domain similarity to INCD, CERT, vendors, and trusted Israeli entities.
  • WezRat-like modular infostealer traffic following fake update execution.

WIRTE / Gaza Cybergang-Linked Cluster

FACT: Check Point reported WIRTE expansion into disruptive activity and SameCoin-linked wiper activity against Israeli organizations.

ASSESSMENT: WIRTE adds a high-priority Palestinian-aligned disruptive track beyond mobile espionage.

Detection ideas:

  • Trusted sender becomes bulk phisher.
  • Signed installer or utility loads unsigned same-directory DLL from archive extraction paths.
  • Fake ESET/Kaspersky/reseller update naming.
  • Exfiltration followed by destructive activity.

TA402 / Molerats

FACT: Proofpoint reported TA402 targeting Middle East government entities with IronWind infection chains using compromised ministry accounts, Dropbox, PPAM/XLL, and archived lures.

ASSESSMENT: Israeli and regional diplomatic ecosystems should monitor partner-account abuse and rare Office add-in execution.

Detection ideas:

  • PPAM, XLL, or RAR execution from email or download paths.
  • Dropbox or file-sharing downloads following war-themed or ministry-themed emails.
  • Request-inspector/check-in style staging infrastructure.

Arid Viper / APT-C-23

FACT: MITRE and ESET describe Arid Viper as a regional espionage actor with mobile spyware capability, including AridSpy campaigns.

ASSESSMENT: This is a personnel and mobile-device risk, not only a perimeter risk.

Detection ideas:

  • Block Android sideloading for managed devices.
  • Alert on messaging, civil-registry, job, or relationship-themed APKs outside official stores.
  • Prioritize users in government, defense, law enforcement, and field liaison roles.

OilRig Ecosystem

FACT: MITRE and ESET describe OilRig / APT34 as a long-running Iran-linked espionage actor, while Check Point and Mandiant reporting on related or adjacent clusters reinforces regional government targeting.

ASSESSMENT: Direct current Israel-specific reporting is less visible than MuddyWater or Agrius, but the ecosystem remains important because government, telecom, regional partners, suppliers, MSPs, and edge infrastructure are recurring targets.

Detection ideas:

  • IIS module and file integrity monitoring.
  • Webshell detection on public web infrastructure.
  • DNS tunneling, email-based C2, and passive backdoor hunts.

UNC1860

FACT: Malpedia describes UNC1860 as a persistent and opportunistic Iranian state-sponsored actor likely affiliated with MOIS, with associated families including CRYPTOSLAY and TEMPLEDOOR.

FACT: Mandiant reporting describes UNC1860 as having specialized tooling and passive backdoors that support persistent access and a probable initial access provider role across high-priority Middle Eastern networks.

ASSESSMENT: UNC1860 should be handled as a high-priority access-enablement and persistence actor for Israeli public-sector, telecom, government-adjacent, and supplier environments.

Detection ideas:

  • Monitor web roots, SharePoint paths, IIS modules, and upload directories for unexpected file changes.
  • Alert when web server worker processes spawn shells, scripting engines, archivers, or remote-access tools.
  • Correlate edge-host anomalies with later RDP, SMB, WMI, or account-creation activity.
  • Hunt low-volume long-lived callbacks from public-facing systems.

ATT&CK Mapping

TechniqueWhy It MattersRepresentative ActorsTelemetry
T1566 PhishingSpearphishing and fake updates recur across the threat set.MuddyWater, APT42, WIRTE, TA402, Emennet PasargadEmail security, proxy, EDR, user reports
T1078 Valid AccountsLegitimate accounts reduce detection friction.MuddyWater, APT42, WIRTE, Cyber ToufanIdP, MFA, mailbox, VPN
T1110 Brute ForcePassword spraying and MFA push abuse remain broad Iranian patterns.Iran-linked actors broadlyIdP, VPN, cloud audit logs
T1190 Exploit Public-Facing ApplicationEdge compromise enables webshells and handoff.Agrius, Void Manticore, Volatile Cedar, OilRig, UNC1860WAF, IIS, Exchange, SharePoint, EDR
T1505.003 Web ShellRepeated in Iranian and regional activity.Agrius, OilRig, Volatile Cedar, UNC1860Webroot file changes, process creation
T1059.001 PowerShellStaging and post-exploitation.MuddyWater, WIRTE, OilRigScriptBlockLogging, AMSI, EDR
T1574.001 DLL Search Order HijackingFake installer and archive-delivered payloads.WIRTE, TA402, UNC2428-style campaignsDLL load telemetry, file creation
T1021.001 Remote Services: RDPCommon after edge compromise or credential access.Agrius, Void Manticore-adjacent intrusionsWindows events, VPN, EDR
T1485 Data DestructionIsraeli entities are recurring wiper targets.Handala, Agrius, WIRTEEDR, file events, backup logs

Malware And Tool Reference

Malware / ToolActorFunctionDetection Pivot
WezRatEmennet PasargadModular infostealer / RATFake INCD security update chain.
BugSleepMuddyWaterBackdoorRecent MuddyWater campaign payload.
BlackBeardMuddyWaterBackdoorINCD-reported phishing follow-on payload.
IronWindTA402Downloader / staged malwarePPAM/XLL/RAR delivery chain.
SameCoinWIRTEWiperFake update and disruptive activity.
AridSpyArid ViperMobile RATSideloaded APK with high-risk permissions.
SUGARUSH / SUGARDUMPUNC3890Info stealerCredential-harvest and shipping-sector investigations.
Explosive RAT / Caterpillar WebShellLebanese CedarRAT / webshellJSP/ASPX file and webroot integrity monitoring.
TEMPLEDOOR / CRYPTOSLAY / PipeSnoopUNC1860Passive backdoor and tooling familiesWebroot integrity, edge-host persistence, and passive callback hunting.

IOC Starter Register

These values are defanged and non-exhaustive. Validate freshness before blocking.

IndicatorTypeAssociationSource
alert@il-cert[.]netEmailFake INCD / WezRat lureSRC-CP-WEZRAT
iqwebservice[.]comDomainAPT34-related Iraq campaignSRC-CP-EDUCATED-2023 / related Check Point reporting
mofaiq[.]comDomainAPT34-related Iraq campaignSRC-CP-EDUCATED-2023 / related Check Point reporting
theconomics[.]netDomainTA402 / IronWindSRC-PROOFPOINT-TA402-IRONWIND
inclusive-economy[.]comDomainTA402 / IronWindSRC-PROOFPOINT-TA402-IRONWIND
rafaelconnect[.]comDomainUNC2428-style Rafael-themed deception reportingSRC-MANDIANT-MTRENDS-2025
RafaelConnect.exeFilenameRafael-themed deception chainSRC-MANDIANT-MTRENDS-2025
MsDef.eseFilenameRafael-themed deception chainSRC-MANDIANT-MTRENDS-2025

Detection Engineering Opportunities

The common denominator is borrowed trust: trusted senders, brands, file-sharing services, admin utilities, web paths, and hardware-management interfaces. Detection should focus on use-context anomalies rather than only hashes.

Priority detections:

  • Signed installer with malicious sibling DLL.
  • Fake security update to infostealer.
  • PowerShell plus drop in C:\ProgramData\ masquerading as IT software.
  • New webshell or IIS module under web application paths.
  • Trusted sender suddenly becomes bulk phisher.
  • Mail-to-click-to-exec correlation.
  • Edge compromise to lateral movement.
  • OT management anomalies.
  • Sideloaded mobile applications with high-risk permissions.

Implemented Detection Files

Additional Sigma rules:

  • signed-installer-sideload-from-user-path.yml
  • fake-security-update-infostealer-execution.yml
  • trusted-sender-bulk-phishing-anomaly.yml

Additional KQL hunts:

  • mail-click-to-exec-correlation.kql
  • trusted-sender-bulk-phishing-anomaly.kql

Intelligence Gaps

  • Actor overlap and handoff remain unresolved. Public reporting suggests relationships among prior-access clusters, destructive personas, and espionage groups, but exact organizational boundaries are uncertain.
  • Persona inflation remains a reporting risk. Handala, CyberAv3ngers, and Cyber Toufan may mix real intrusion activity with psychological amplification.
  • Supplier and MSP visibility is insufficient. Third-party mailboxes, shared hosting, resellers, and municipal IT contractors can act as transitive exposure points.
  1. Build a crosswalk register mapping actor, persona, malware, IOC, ATT&CK technique, affected sector, and verified intrusion versus public claim only.
  2. Build a Hebrew/Arabic/English phishing corpus covering urgent security patch, INCD notices, browser updates, ESET/reseller notifications, Rafael recruitment, procurement, municipal correspondence, and war-themed policy documents.
  3. Inventory internet-exposed IIS, SharePoint, Exchange, VPN, and PLC/HMI surfaces across ministries, municipalities, education, healthcare, telecom, and strategic suppliers.
  4. Run a mobile-risk review for officials, field personnel, defense-adjacent staff, and regional liaison roles.
  5. Retro-hunt published infrastructure and filenames from source appendices, especially fake-INCD, TA402, APT34-adjacent, MuddyWater, and Rafael-themed deception indicators.