Iranian APT Activity During Geopolitical Escalation: Recommendations for Customers and Critical Infrastructure Owners

    Date: 03/05/2026

    Severity: Critical

    Summary

    A dramatic and dangerous phase in Middle Eastern geopolitics has begun with open conflict between Iran, Israel, and the United States. Last week, U.S. and Israeli forces launched Operation Lion’s Roar, targeting Iranian military and nuclear facilities. Iran responded with retaliation, escalating the conflict across the region. Missile and drone attacks have spread through the Gulf, involving Iranian-backed militias and damaging civilian infrastructure. Several regional capitals have faced direct attacks, disrupting energy systems, air travel, and diplomatic stability. Alongside the military clashes, cyber warfare has intensified as Iranian state-linked hackers target foreign networks and critical infrastructure.

    Indicators of Compromise (IOC) List

    IP Address : 

    37.1.213.152

    184.75.210.206

    162.0.230.185

    Indicators of Compromise (IOC) List

    Detection Query 1 :

    dstipaddress IN ("162.0.230.185","37.1.213.152","184.75.210.206") or srcipaddress IN ("162.0.230.185","37.1.213.152","184.75.210.206")

    Reference:

    https://www.nozominetworks.com/blog/iranian-apt-activity-during-geopolitical-escalation-recommendations-for-nozomi-customers-and-critical-infrastructure-owners


    Tags

    MalwareThreat ActorIranAPTCritical InfrastructureThe Middle EastUnited StatesIsraelNuclear ReactorsDefense Industrial Base

    « Previous ArticleNext Article »

    Comments

    No records to display

    Looking for Something?
    Threat Research Categories:
    Tags