Skip to main content

Defensive Cyber Threat Intelligence Report: Israeli Critical Infrastructure and Geopolitical Escalation (2024-2026)

Status: Research intake and defensive synthesis.

Handling: TLP:CLEAR. Do not use this report for attribution, blocking, or executive claims without claim-level source review.

Executive Summary

The cyber threat landscape targeting Israeli government ministries, municipal authorities, telecommunications, critical infrastructure, and defense-adjacent suppliers has escalated between 2024 and 2026. Public reporting around Operation Epic Fury and related regional escalation describes increased activity from Iranian state-linked actors, Iran-aligned personas, Hamas-linked espionage groups, and proxy hacktivist clusters.

The dominant defensive trend is a shift from purely malware-centric destructive operations toward identity-plane and management-plane abuse. Instead of relying only on custom MBR wipers or ransomware-like payloads, actors increasingly seek privileged cloud identities, endpoint-management consoles, RMM tools, and legitimate administrative paths that can create destructive impact while producing fewer traditional malware artifacts.

Primary defensive implications:

  • Identity and MDM platforms MUST be treated as Tier-0 systems.
  • Standing Global Administrator and Intune Administrator privileges SHOULD be eliminated in favor of PIM/JIT access and phishing-resistant MFA.
  • OT/ICS systems MUST NOT expose PLC/HMI management interfaces to the public internet.
  • RMM, file synchronization, and cloud storage tools MUST be baselined and monitored.
  • Public hacktivist claims MUST be separated from verified technical compromise.

Actor Priority Table

Primary NameAliasesAssessed SponsorTarget SectorsPriority
Void ManticoreHandala, Storm-0842, Banished Kitten, DuneIran MOIS-linked in public reportingHealthcare, defense suppliers, critical IT, Israeli entitiesCritical
CyberAv3ngersCyberAveng3rs, Storm-0784Iran IRGC-affiliated personaOT/ICS, water, energy, manufacturingCritical
MuddyWaterBoggy Serpens, Seedworm, Static Kitten, Mango SandstormIran MOIS-linkedGovernment, telecom, NGOs, IT supply chainHigh
Cyber ToufanCyber Toufan OperationsPro-Palestinian / Iran-aligned personaGovernment, defense, finance, IT providersHigh
Cotton SandstormEmennet Pasargad, Altoufan TeamIran IRGC-linkedCritical infrastructure, media, Gulf statesHigh
OilRigAPT34, Evasive Serpens, Hazel SandstormIran state-linkedEnergy, government, finance, ITHigh
Arid ViperAPT-C-23, Desert FalconHamas-linked in public reportingIDF-related targets, government officials, mobile usersHigh
UNC3890UNC3890Suspected Iran-linkedShipping, logistics, healthcare, aviationElevated
AgriusPink Sandstorm, Agonizing SerpensIran MOIS-linked in public reportingHigher education, technology, governmentElevated
Lebanese CedarVolatile CedarHezbollah-linked in public reportingGovernment, defense contractors, IT, telecomElevated
APT35 / APT42Mint Sandstorm, Magic Hound, Charming KittenIran IRGC-linked in public reportingJournalists, academics, diaspora, NGOsModerate

Source Register

Source IDSourceScoreUse
SRC-PUSH-STRYKER-HANDALAPush Security Stryker/Handala reportAIdentity weaponization and Intune destructive-action model.
SRC-ARCTIC-EPIC-FURYArctic Wolf escalation bulletinAGeopolitical cyber-risk context and defensive guidance.
SRC-CISA-AA26-097AJoint CISA/FBI/NSA/EPA/DOE/USCYBERCOM PLC advisoryARockwell/Allen-Bradley PLC exploitation and OT mitigations.
SRC-CP-HANDALA-2026Check Point Handala modus operandiAHandala / Void Manticore source anchor.
SRC-CP-MOIS-CRIMECheck Point MOIS cyber-crime connectionAMOIS actor/criminal ecosystem analysis.
SRC-OPI-CYBER-TOUFANOP Innovate Cyber Toufan playbookACyber Toufan external-exposure and leak-operation playbook.
SRC-ESET-ARIDSPYESET AridSpy reportAArid Viper mobile espionage details.
SRC-MANDIANT-UNC3890Google/Mandiant UNC3890 reportAIsraeli shipping/logistics targeting and Punycode watering hole evidence.
SRC-CISA-IRAN-THREAT-2025Joint CISA/FBI/NSA/DC3 Iranian cyber threat fact sheetAHeightened Iranian cyber-threat context and critical-infrastructure guidance.
SRC-THREAT-HUNTER-V3ThreatHunter.ai Detection Pack v3BDetection ideas and IOC hypotheses requiring corroboration.
SRC-CLOUDSEK-EPIC-FURYCloudSEK Middle East escalation reportBSupporting regional hacktivist and escalation context.
SRC-CLEARSKY-LEBANESE-CEDARClearSky Lebanese Cedar reportBLebanese Cedar / Explosive RAT / Caterpillar WebShell source.

Actor Profiles

Void Manticore / Handala

FACT: Public reporting by Check Point and Push Security associates Handala / Void Manticore with Iran-linked destructive or disruptive activity.

FACT: Push Security reports a March 2026 Stryker incident in which attackers abused Microsoft Intune remote wipe functionality through compromised Global Administrator access rather than deploying traditional malware.

ASSESSMENT: This identity weaponization model is strategically important because it bypasses many endpoint malware detections. Defenders should prioritize Intune audit logging, PIM authentication-context enforcement, multi-admin approval, and break-glass account monitoring.

LOW CONFIDENCE: Social-media-only claims about municipal access or broad victim lists require corroboration through victim statements, reputable reporting, or local telemetry.

MuddyWater / Boggy Serpens

FACT: CISA and MITRE identify MuddyWater as an Iranian government-sponsored actor associated with MOIS-linked operations.

FACT: Public reporting describes frequent use of phishing, legitimate RMM tools, PowerShell, and living-off-the-land approaches.

ASSESSMENT: MuddyWater activity should be modeled as a long-dwell access and persistence threat that may enable later destructive operations by another persona or team.

CyberAv3ngers

FACT: CISA AA23-335A documented CyberAv3ngers targeting internet-exposed Unitronics PLCs.

FACT: The 2026 joint advisory SRC-CISA-AA26-097A reports exploitation of internet-facing Rockwell Automation / Allen-Bradley PLCs across critical infrastructure.

ASSESSMENT: OT exposure management remains the highest-value mitigation. PLCs, HMIs, engineering workstations, and remote access paths must be isolated from the public internet and segmented from IT networks.

Cyber Toufan

FACT: OP Innovate describes Cyber Toufan tradecraft focused on exposed VPN/firewall infrastructure, weak credential hygiene, lateral movement, and data-leak operations.

ASSESSMENT: This actor model rewards basic security failure. MFA gaps, unpatched edge devices, flat SMB networks, and poor logging create the highest practical risk.

Arid Viper / APT-C-23

FACT: ESET reports Arid Viper use of AridSpy Android malware distributed through trojanized apps.

ASSESSMENT: Mobile security controls are central: prohibit sideloading, enforce MDM posture, monitor suspicious Android packages, and train high-risk users on persona-based lures.

OilRig / APT34

FACT: ESET and MITRE describe OilRig as a long-running espionage actor with targeting in Israel and the broader Middle East.

ASSESSMENT: Prioritize public web, Exchange/IIS, credential access, webshell persistence, and cloud service abuse detections.

Agrius / Pink Sandstorm

FACT: MITRE, SentinelOne, and Unit 42 associate Agrius / Agonizing Serpens with destructive or ransomware-style operations affecting Israeli sectors.

ASSESSMENT: This actor should drive wiper-preparation, backup-deletion, endpoint-tampering, and supply-chain-compromise hunts.

Cotton Sandstorm / Emennet Pasargad

FACT: Microsoft and U.S. government reporting describe cyber-enabled influence, disruptive activity, and heightened network-access risk from Iran-linked actors including Cotton Sandstorm / Emennet Pasargad.

ASSESSMENT: Treat Cotton Sandstorm as a cyber-influence risk that may combine technical compromise, defacement, leaks, DDoS, and narrative amplification.

UNC3890

FACT: Google/Mandiant reports UNC3890 targeting Israeli shipping, logistics, healthcare, aviation, and government-related sectors.

ASSESSMENT: Punycode monitoring, shipping-sector credential phishing detection, and webmail-based exfiltration hunts are appropriate.

APT35 / APT42 / Mint Sandstorm

FACT: MITRE, Microsoft, Google, and Mandiant associate these clusters with Iran-linked espionage, credential phishing, social engineering, and targeting of high-value individuals.

ASSESSMENT: Protect individual officials and policy-adjacent users with phishing-resistant MFA, mailbox auditing, OAuth consent controls, and VIP account monitoring.

Lebanese Cedar / Volatile Cedar

FACT: ClearSky reports Lebanese Cedar use of unpatched public-facing web servers, Explosive RAT, and Caterpillar WebShell.

ASSESSMENT: This threat is best handled through public-facing server patching, webshell hunting, legacy Oracle/Atlassian exposure reduction, and hosting-provider visibility.

ATT&CK Mapping

TacticTechnique IDTechniqueActorContext
ReconnaissanceT1595Active ScanningCyber ToufanExternal VPN/firewall/admin surface discovery.
Initial AccessT1078.004Valid Accounts: Cloud AccountsVoid Manticore / HandalaCompromised cloud administrator credentials.
Initial AccessT1189Drive-by CompromiseUNC3890Watering-hole and Punycode lure infrastructure.
Initial AccessT1190Exploit Public-Facing ApplicationLebanese CedarLegacy Oracle/Atlassian exploitation.
ExecutionT1059.001PowerShellCyber Toufan / MuddyWaterNative execution and staging.
ExecutionT1204.002User Execution: Malicious FileArid ViperTrojanized APK sideloading.
PersistenceT1505.003Web ShellLebanese Cedar / OilRigWebshell persistence on public-facing servers.
Lateral MovementT1021.002SMB/Windows Admin SharesCyber ToufanNative lateral movement through flat networks.
ExfiltrationT1567.002Exfiltration to Cloud StorageMuddyWaterRclone to cloud storage sinks.
ImpactT1485Data DestructionHandala / AgriusWiper or management-plane destructive actions.
ImpactT1490Inhibit System RecoveryHandala / AgriusBackup and recovery tampering.

Malware And Tool Reference

Tool / MalwareActorTypeDefensive Relevance
AridSpyArid ViperMobile RATMDM controls, sideloading prevention, mobile telemetry.
Explosive RATLebanese CedarRATLegacy web server compromise and espionage.
Caterpillar WebShellLebanese CedarWeb shellJSP/webshell hunting.
DindoorMuddyWaterBackdoorDeno runtime monitoring.
FakesetMuddyWaterBackdoorPython implant hunt hypothesis.
SUGARUSH / SUGARDUMPUNC3890Info stealerShipping/logistics intrusion investigations.
RcloneMuddyWater and othersLegitimate sync toolCloud exfiltration detection.
Apostle / FantasyAgriusWiper / ransomware-style payloadDestructive-preparation hunts.
BiBi / Cl Wiper lineageHandala / Void ManticoreWiper lineageHistorical destructive detection and response.
FactoryTalkCyberAv3ngers-style OT activityLegitimate ICS softwareSuspicious ICS interaction from non-engineering assets.

IOC Reference Table

Static indicators age quickly. These entries are hunt leads, not attribution by themselves.

IndicatorTypeContextSource
xn-- Punycode domainsDomain patternWatering-hole and impersonation detection.SRC-MANDIANT-UNC3890
dnshook.siteDomainMOIS-linked detection-pack hypothesis.SRC-THREAT-HUNTER-V3
uppdatefile.comDomainMuddyWater C2 hypothesis.SRC-THREAT-HUNTER-V3
serialmenot.comDomainMuddyWater C2 hypothesis.SRC-THREAT-HUNTER-V3
moonzonet.comDomainMuddyWater C2 hypothesis.SRC-THREAT-HUNTER-V3
wasabisys.comDomainLegitimate cloud sink abused for exfiltration in reporting.SRC-THREAT-HUNTER-V3
backblazeb2.comDomainLegitimate cloud sink abused for exfiltration in reporting.SRC-THREAT-HUNTER-V3
157.20.182.49IPMOIS infrastructure claim in detection-pack reporting.SRC-THREAT-HUNTER-V3
ListOpenedFileDrv_32.sysFile nameBYOVD / wiper-preparation hunt lead.SRC-THREAT-HUNTER-V3

Defensive Detection Opportunities

Identity Weaponization And MDM

  • Monitor bulk WipeDevice, RetireDevice, and DeleteDevice actions.
  • Require phishing-resistant MFA through PIM authentication context, not only a prior MFA claim.
  • Enable Intune multi-admin approval for destructive device actions.
  • Monitor Global Administrator, Intune Administrator, Cloud Device Administrator, and Privileged Role Administrator sessions.

OT And SCADA

  • Remove public exposure of PLC/HMI interfaces.
  • Monitor EtherNet/IP 44818, EtherNet/IP implicit messaging 2222, S7 102, and Modbus 502.
  • Alert on IT-segment or VPS-origin traffic to OT assets.
  • Maintain offline PLC project backups and incident-safe engineering images.

Living-Off-The-Land And RMM Abuse

  • Hunt for unauthorized Atera, AnyDesk, ScreenConnect, TeamViewer, NetBird, Tactical RMM, and RemoteUtilities.
  • Hunt for rclone.exe execution to unapproved cloud destinations.
  • Monitor PowerShell, Deno, Python, certutil, mshta, rundll32, and bitsadmin from user-controlled paths.

Remote Access And Mobile Security

  • Enforce MFA on all VPN/firewall/admin interfaces.
  • Hunt for rapid failures followed by success.
  • Monitor SMB access to C$ and ADMIN$ from VPN or workstation sources.
  • Disable Android sideloading for managed devices.

Sigma Rule Ideas Implemented

This report is accompanied by Sigma examples in detections/sigma/:

  • intune-bulk-device-wipe-anomaly.yml
  • rclone-exfil-to-suspicious-cloud-sinks.yml
  • pim-activation-stale-mfa-claim.yml
  • deno-runtime-suspicious-child-process.yml
  • byovd-listopenedfiledrv-driver-load.yml

SIEM Query Ideas Implemented

This report is accompanied by KQL examples in detections/kql/:

  • intune-bulk-device-wipe-anomaly.kql
  • rclone-exfil-to-suspicious-cloud-sinks.kql
  • smb-admin-share-lateral-movement-anomaly.kql
  • punycode-domain-resolution-hunt.kql

Intelligence Gaps

  • State versus hacktivist demarcation remains unclear for some personas.
  • Arid Viper's current 2025/2026 lure tradecraft against high-value Israeli users requires continued collection.
  • OilRig and other Iran-linked groups' zero-day access pipeline remains a blind spot.
  • Lebanese Cedar current operational tempo after 2021 reporting requires updated telemetry.
  • Identity-plane destructive tradecraft needs more cross-vendor incident confirmation.
  1. Monitor access broker and leak marketplaces for Israeli government, telecom, and defense-supplier access offers without collecting leaked private data.
  2. Pivot from source-backed MOIS/IRGC infrastructure through passive DNS, TLS certificates, hosting providers, and registration patterns.
  3. Deploy controlled OT deception assets that simulate Unitronics and Rockwell exposure without creating live critical-infrastructure risk.
  4. Aggregate identity logs across Entra ID, AWS, Google Workspace, VPN, and MDM into SIEM and baseline privileged-account behavior.
  5. Build release-quality Sigma/KQL detections for every high-priority actor scenario and test them against benign replay data.