Iranian Seedworm APT Targets Critical Infrastructure in 2026

Iranian Seedworm APT Targets Critical Infrastructure in 2026

The rapid sophistication of state-sponsored cyber operations has reached a critical juncture as the Iranian Advanced Persistent Threat group known as Seedworm expands its offensive footprint across the Western hemisphere. Known within the cybersecurity community by various aliases such as MuddyWater or Static Kitten, this unit operates as a direct subordinate to the Iranian Ministry of Intelligence and Security, maintaining a focus that has recently shifted from regional interests toward the vital networks of the United States, Canada, and Israel. The current campaign, which has accelerated throughout the first half of 2026, represents a matured tactical approach where the objective is no longer merely the collection of diplomatic secrets, but the systematic infiltration of systems that underpin national security and public safety. This transition suggests that the group has refined its methodologies to target the very foundations of modern society, moving beyond traditional espionage into a realm where digital access serves as a significant lever in broader geopolitical confrontations.

The intensity of these operations is inextricably linked to the volatile geopolitical landscape characterizing the early months of this year. Following a series of high-stakes military engagements in the Middle East, including targeted airstrikes against key Iranian leadership figures in March 2026, Seedworm pivoted from a state of passive intelligence gathering to one of active and aggressive retaliation. Analysts have observed that the group’s presence in Western networks was not a sudden development but rather the result of long-term pre-positioning efforts. By establishing dormant access points within critical infrastructure, the group ensured it possessed a “digital trigger” that could be activated during periods of kinetic warfare. This strategy reflects a sophisticated understanding of modern conflict, where the ability to disrupt a financial system or an aviation network provides a non-kinetic means of project power and causing widespread domestic instability far from the actual front lines of a physical battlefield.

Targeting Global Critical Infrastructure

Financial and Transportation Vulnerabilities

The 2026 offensive began with a highly targeted strike against a major American financial institution, demonstrating a high degree of technical proficiency and operational patience. This breach was not a simple attempt at theft, but rather a deep-seated infiltration that allowed the attackers to gain high-level administrative access to core banking systems. Such access provides a dual-purpose advantage: it enables the exfiltration of sensitive economic data while simultaneously serving as a foundation for potential future sabotage that could paralyze domestic markets. By maintaining a quiet but pervasive presence within the financial sector, Seedworm demonstrates its intent to hold Western economic stability at risk. The complexity of the intrusion suggests that the group spent months conducting reconnaissance, identifying specific vulnerabilities in the institution’s hybrid cloud environment and exploiting them with a precision that bypassed standard anomaly detection protocols.

Simultaneously, the compromise of an American airport’s network in early 2026 underscored the immediate physical risks associated with these digital incursions. While the breach did not lead to an immediate disruption of flight operations, the level of access obtained by Seedworm raised significant alarms among federal aviation authorities. The group managed to penetrate internal logistics and communication networks, potentially gaining the ability to manipulate scheduling data, passenger information, or maintenance logs. This type of infrastructure targeting is particularly concerning because it strikes at the heart of public confidence in the safety and integrity of national transportation systems. The logistical nightmare that could result from a coordinated disruption of aviation services represents a potent tool for psychological warfare, proving that the group’s objectives extend far beyond the digital realm and into the lived experience of the general population.

Defense Supply Chain and NGO Infiltration

A secondary but equally critical prong of the 2026 campaign involves the systematic targeting of the defense and aerospace supply chain, particularly through its international links. Seedworm successfully infiltrated the Israeli operations of a prominent United States-based software provider that serves as a key vendor for defense contractors. This “sideways” approach is a classic example of a supply chain attack, where the adversary targets a slightly less secure third-party partner to gain ultimate access to more hardened government and military targets. By exfiltrating proprietary technical data from this software firm, the group likely sought to gain insights into Western defense capabilities or identify zero-day vulnerabilities in the software that manages sensitive military logistics. This maneuver highlights the reality that in a globalized economy, a breach in an overseas branch can have direct and devastating consequences for the national security of the home country.

The campaign has also extended its reach to North American non-governmental organizations operating in the United States and Canada. These NGOs, often involved in diplomatic advocacy or humanitarian aid in conflict zones, represent a goldmine of human intelligence for the Iranian state. By breaching these organizations, Seedworm enables the Ministry of Intelligence and Security to monitor the movements of diplomats, activists, and policy researchers who might be working on initiatives that conflict with Iranian strategic interests. This facet of the operation confirms that the group has matured into a versatile tool for total information warfare, capable of operating across multiple sectors to achieve a comprehensive intelligence picture. The focus on NGOs demonstrates a nuanced understanding of the soft-power structures that influence international policy, allowing the MOIS to anticipate and counter diplomatic maneuvers before they are even officially proposed on the global stage.

Technological Advancements in Malware Development

Innovations in Runtime and Script-Based Backdoors

One of the most notable technical developments in the 2026 campaign is the deployment of the “Dindoor” backdoor, which leverages the Deno runtime for its execution. Deno is a modern, secure runtime for JavaScript and TypeScript, and its use in a state-sponsored attack marks a significant departure from more traditional environments like Node.js. By utilizing a newer and less frequently monitored runtime, Seedworm effectively bypasses many legacy signature-based detection systems that are specifically tuned to monitor common execution paths. This tactical choice illustrates a proactive investment in research and development, as the group seeks out “blind spots” in modern corporate defense stacks. The Dindoor malware is designed to be lightweight and highly modular, allowing the attackers to push new updates and capabilities to the infected machine without the need for a full re-infection, thus maintaining a persistent and stealthy presence.

Complementing the Dindoor backdoor is the “Fakeset” malware, a Python-based tool that has been widely deployed throughout 2026 for its cross-platform flexibility. The use of Python allows the attackers to quickly adapt their code to various operating systems, making it a highly efficient tool for targeting diverse corporate environments. Technical analysis of Fakeset samples has revealed the use of digital certificates issued to names like “Amy Cherne” and “Donald Gay,” which serves as a definitive link to historical Seedworm activity. These certificates are used to sign the malicious code, tricking operating systems into treating the malware as legitimate software. The ability to rapidly modify these script-based tools means that security researchers are often chasing moving targets, as the group can change its file hashes and internal logic within hours of a new detection being published by the cybersecurity community.

Multi-Stage Infection Chains

The 2026 campaign has also seen the widespread implementation of a multi-stage infection process involving the “Stagecomp” and “Darkcomp” malware families. Stagecomp typically serves as the initial downloader, often delivered via sophisticated spear-phishing emails or through exploited web vulnerabilities. Its primary role is to conduct a basic survey of the target environment to ensure it is not running in a sandbox or a virtual machine used by security researchers. Once the environment is deemed “safe,” Stagecomp pulls down the more robust Darkcomp backdoor, which is designed for long-term persistence and command execution. This tiered approach minimizes the exposure of the group’s most advanced tools; if the initial downloader is caught, the more valuable backdoor remains hidden, allowing the attackers to try a different entry point later without burning their primary assets.

The integration of these different malware families into a single, cohesive operation confirms the existence of a centrally managed development pipeline within the Ministry of Intelligence and Security. Analysts have noted that the codebases for Dindoor, Fakeset, and Darkcomp share several internal structural similarities, suggesting that they were developed by the same team or under a unified set of technical standards. This level of organizational discipline is a hallmark of an Advanced Persistent Threat, as it allows for the efficient scaling of operations across multiple geographic regions and industrial sectors. The shared use of specific signing certificates and command-and-control protocols further solidifies the attribution to Seedworm, demonstrating that despite their technological evolution, the group maintains a consistent operational signature that can be tracked by diligent network defenders.

Exploitation of Cloud Infrastructure

Stealthy Exfiltration and C2 Tactics

In a move that has complicated detection efforts throughout 2026, Seedworm has pioneered a “living off the cloud” strategy that effectively hides its malicious activity within the noise of legitimate business traffic. Instead of relying on dedicated command-and-control servers—which are easily identified and blocked by modern firewalls—the group has moved its infrastructure to reputable cloud storage platforms like Backblaze and Wasabi. By hosting their malware and staging stolen data within legitimate cloud “buckets” labeled with innocuous names like “gitempire” or “elvenforest,” the group ensures that their network connections appear benign to most automated security tools. This tactic exploits the inherent trust that organizations place in major cloud service providers, making it extremely difficult for incident responders to distinguish between an authorized administrative backup and a state-sponsored data exfiltration event.

The use of these cloud platforms is not just about stealth; it also provides the attackers with high-speed, reliable infrastructure that is difficult for law enforcement to take down. When a traditional C2 server is identified, it can often be seized or neutralized, but taking down a bucket on a major cloud provider requires a much more complex legal and technical process. Furthermore, by using these services, Seedworm can scale its data exfiltration efforts rapidly, moving gigabytes of sensitive information without triggering the bandwidth alerts that would normally accompany a massive transfer to an unknown overseas IP address. This strategic shift represents a sophisticated adaptation to the modern IT landscape, where the cloud is the default environment for business operations, providing a perfect cloak for the activities of a patient and methodical adversary.

Persistence and Digital Footprint Minimization

Data exfiltration during the 2026 campaign has been further streamlined through the use of Rclone, an open-source command-line program originally designed for managing files on various cloud storage services. During the breach of the aerospace-aligned software company, Seedworm was observed using Rclone to direct sensitive backup archives toward Wasabi cloud storage. The specific commands used by the attackers indicated a highly calculated effort to target backup files, which are often the most valuable assets in an organization because they contain consolidated databases and comprehensive system configurations. By using a legitimate tool like Rclone, the group avoids the need to upload custom, potentially detectable exfiltration scripts, further minimizing their digital footprint and making their actions look like those of a legitimate system administrator performing routine tasks.

This focus on minimizing the digital footprint extends to the group’s persistence mechanisms within the cloud environment. By embedding their operations within the very infrastructure that modern businesses use for collaboration and storage, Seedworm ensures that their presence is woven into the fabric of the target’s daily operations. This level of integration makes it incredibly difficult for security teams to fully “clean” an environment once it has been compromised; even if the initial malware is removed, the attackers may still have access to legitimate cloud service accounts or API keys that allow them to re-enter the network at will. This strategy emphasizes that modern cyber defense is not just about blocking “bad” files, but about maintaining rigorous visibility into how legitimate tools and services are being used across the enterprise.

The Diverse Iranian Cyber Ecosystem

Role of Hacktivist Fronts and Reconnaissance Arms

The Iranian cyber strategy is characterized by a high degree of coordination between state actors like Seedworm and various specialized groups that fill different roles in the broader ecosystem. One of the most active of these is the “Handala” hacktivist front, which masquerades as a pro-Palestinian collective but is widely believed to be an Iranian-aligned entity. Handala specializes in “hack-and-leak” operations designed to embarrass foreign governments and create social friction within adversary nations. Recently, the group claimed to have breached the private communications of high-ranking Israeli officials, releasing a trove of personal data and photos to the public. These psychological operations are a key component of the 2026 campaign, intended to project a sense of omnipotence and create a feeling of vulnerability among both the political leadership and the general citizenry of Iran’s opponents.

While groups like Handala handle the public-facing psychological warfare, others like “Marshtreader” focus on technical reconnaissance that has direct military applications. In the months leading up to the current surge, Marshtreader was observed scanning for vulnerable IP cameras across Israel using known vulnerabilities. This activity is widely interpreted by intelligence analysts as a form of Bombing Damage Assessment, where the cyber group provides Iranian military planners with real-time visual confirmation of the impact of missile or drone strikes. This capability bridges the gap between cyber and kinetic warfare, proving that digital operations are an integral part of the Iranian military’s physical battle plan. By leveraging vulnerable IoT devices, the group turns ordinary infrastructure into a network of overseas surveillance cameras, providing the state with a low-cost, high-impact intelligence asset.

Disruptive Distractions and DDoS Operations

Adding a “noisy” layer to these sophisticated operations is “DieNet,” a group that has specialized in high-volume Distributed Denial of Service attacks since its emergence in 2025. DieNet utilizes “DDoS-as-a-service” infrastructure to launch massive waves of traffic against U.S. energy and financial systems, often coinciding with more stealthy intrusions by Seedworm. These attacks serve a dual purpose: they cause immediate, visible disruption that demands the attention of security teams, and they act as a “smokescreen” for the more dangerous espionage activity occurring in the background. While a bank’s IT department is scrambling to mitigate a massive DDoS attack on its customer-facing portal, Seedworm may be quietly moving laterally through the internal network to compromise sensitive financial databases.

The use of groups like DieNet demonstrates the layered nature of Iranian cyber doctrine, where different units are deployed to achieve a range of effects from the subtle to the catastrophic. By coordinating these efforts, the Ministry of Intelligence and Security can overwhelm the defensive capabilities of its targets, forcing them to prioritize immediate service availability over long-term network integrity. The persistence of these DDoS attacks, which often target critical infrastructure sectors like energy and transit, also serves as a constant reminder of the adversary’s reach, maintaining a high level of background stress for national security organizations. This multi-vectored approach ensures that even if one operation is discovered and blocked, others are likely to succeed, making the overall Iranian cyber threat one of the most resilient and difficult to manage in the modern era.

Historical Evolution and Escalation

From Stuxnet to Modern Retaliation

The current trajectory of Iranian cyber operations can be traced back nearly twenty years, rooted in a cycle of digital conflict that began with the infamous 2010 Stuxnet attack on the Natanz nuclear facility. That operation, widely attributed to Western and Israeli intelligence, served as a catalyst for Iran’s rapid development of its own offensive cyber capabilities. In the years following Stuxnet, Iran transformed from a secondary cyber actor into a major global threat, moving through phases of trial and error to its current state of maturity. The 2026 campaign is viewed as a direct evolution of this historical struggle, with Iran now using its sophisticated toolset to strike back at the industrial and nuclear-adjacent sectors of the West. This long-term perspective is essential for understanding why critical infrastructure has remained the primary target for groups like Seedworm; it is a form of digital “tit-for-tat” in a conflict that spans decades.

The escalation observed this year is also a response to more recent kinetic events, particularly the ongoing tensions surrounding Iranian domestic and foreign policy. The 2026 breaches suggest that the Iranian state has fully integrated cyber operations into its broader national security strategy, treating the digital domain with the same importance as its conventional military and proxy forces. This integration allows for a more flexible response to international pressure, where cyberattacks can be dialed up or down depending on the current diplomatic climate. The historical legacy of being a target of high-end cyberwarfare has clearly informed Iran’s own defensive and offensive posture, leading to an environment where they are now among the most aggressive and innovative practitioners of state-sponsored hacking in the world.

Social Engineering and Policy Influence

In the year leading up to the 2026 campaign, Seedworm significantly refined its social engineering tactics, moving away from generic phishing emails toward highly personalized and convincing lures. One notable operation involved the group impersonating prominent Middle East policy experts from prestigious think tanks to target researchers and government officials. By engaging their targets in legitimate-sounding academic discussions via email and messaging apps, the attackers were able to build a rapport before eventually sending a malicious link or document. This “long-con” approach to social engineering is particularly effective because it bypasses the skepticism that many professionals have toward unsolicited messages. The success of these campaigns proves that human psychology remains one of the most vulnerable points in even the most secure corporate networks.

Furthermore, the group has demonstrated a willingness to use cyber tools for direct policy influence, as seen in the historical operations of the “Druidfly” sub-group against targets in Albania. By crippling government services in response to the hosting of Iranian dissidents, the group sent a clear signal that any nation providing support to Iran’s adversaries would face tangible consequences. This precedent has set the stage for the aggressive maneuvers seen in 2026 against the United States and its allies. The Iranian state clearly views cyberattacks as a legitimate tool of statecraft, using them to punish foreign governments for their policy decisions and to shape the international discourse in their favor. As these operations become more frequent and effective, the line between traditional diplomacy and digital coercion continues to blur, creating a complex new challenge for global security and international relations.

Strategic Outlook and Future Threats

Anticipating High-Visibility Disruption

As military and diplomatic tensions show no signs of abating, cybersecurity professionals are bracing for a shift toward even more visible and disruptive operations. This upcoming “noisy” phase of the Iranian campaign is expected to include a surge in high-profile website defacements and public-facing DDoS attacks. Unlike the quiet espionage of previous months, these operations are designed to project power and incite panic among the general population by making it appear as though the government has lost control of its digital infrastructure. Targets for these high-visibility attacks are likely to be municipal services, regional transportation hubs, and healthcare portals—sectors where even a temporary service interruption is immediately felt by the public and can generate significant media coverage.

This shift toward disruption also serves as a form of “strategic noise,” intended to mask more dangerous operations that may be occurring simultaneously. While the public and the press are focused on a defaced government website, the true threat may be a quiet infiltration of a regional power grid or a water treatment facility. The psychological impact of these disruptions cannot be overstated; they are designed to erode public trust in the security of the nation’s digital foundations and to create a sense of impending chaos. Defenders must therefore be prepared for a dual-track threat environment, where they must manage the public relations crisis of a visible attack while simultaneously hunting for the stealthy adversaries who are using the distraction to deepen their reach into critical systems.

Destructive Wipers and Strategic Leverage

There is also a growing and significant risk that the 2026 campaign could transition into the use of destructive “wiper” malware. Historically, Iranian-aligned groups have not hesitated to use such tools, as seen in the Shamoon attacks against the oil and gas sector and the more recent deployment of the BibiWiper in regional conflicts. If geopolitical escalations reach a critical point, there is a high probability that groups like Druidfly or Seedworm will deploy malware designed to overwrite master boot records and permanently destroy data within Western energy, utility, or financial sectors. Such attacks are not intended for intelligence gathering; their sole purpose is to cause tangible, large-scale economic damage and to signal that Iran is capable of inflicting severe costs on its adversaries without resorting to a full-scale kinetic war.

Beyond immediate destruction, state-aligned groups are also likely to continue their aggressive efforts to maintain “strategic leverage” within critical supply chains. By quietly harvesting credentials and exploiting VPN vulnerabilities, Seedworm seeks to ensure it has pre-verified access to the heart of Western defense and energy networks. These footholds are maintained with extreme care, often remaining dormant for long periods until they are needed for a specific tactical objective. This long-term strategy of “holding the target at risk” means that the threat is never truly gone, even during periods of relative calm. Cybersecurity for these high-risk sectors must therefore move toward a model of continuous hunting and verification, operating under the assumption that an adversary as persistent as Seedworm is always seeking a way back into the network to re-establish their leverage.

Defensive Strategies for High-Risk Sectors

Hardening Access and Identity Management

Countering the persistent threat from an actor like Seedworm requires a fundamental shift in how organizations manage identity and access. A cornerstone of modern defense is the implementation of advanced multi-factor authentication methods that go beyond simple SMS codes or push notifications. Organizations should adopt “number matching” MFA to prevent the phenomenon of “MFA fatigue,” where employees inadvertently approve a flurry of malicious login attempts out of frustration or habit. Furthermore, the systematic deactivation of legacy authentication protocols that do not support MFA is an essential step in closing off the most common entry points used by state-sponsored actors. By hardening the identity layer, organizations can significantly increase the cost for an attacker, forcing them to use more detectable and expensive techniques to gain a foothold.

In addition to robust authentication, administrative access must be governed by strict conditional access policies that limit the potential blast radius of a compromised account. For organizations in the defense or financial sectors, restricting administrative logins to specific, known geographic regions and verified, compliant devices is a critical defensive measure. These policies ensure that even if an attacker manages to steal a high-level credential, they will still face significant hurdles when attempting to use it from an unauthorized location or an unmanaged device. This level of granular control is vital for identifying identity-based anomalies in real-time, allowing security teams to intervene before an attacker can move laterally or begin the process of data exfiltration.

Enhancing Network Monitoring and Data Integrity

To effectively counter the “living off the cloud” strategy employed by Seedworm, organizations must implement rigorous egress filtering and network monitoring. For many businesses, there is no legitimate operational reason to communicate with niche cloud storage providers like Wasabi or Backblaze. By blocking these domains at the firewall level or alerting on any connection to them, organizations can cut off the primary exfiltration routes used by the group. Furthermore, monitoring for the use of tools like Rclone or other unauthorized file management software can serve as a vital early warning sign. Security teams should prioritize the auditing of large outbound data transfers, particularly those occurring during non-business hours or originating from systems that do not typically handle large-scale backups.

Finally, in an environment where destructive wiper attacks are a realistic possibility, the focus must shift toward ensuring data integrity and rapid recovery. Implementing immutable backups—storage that is logically or physically protected from deletion or modification—is the only way to ensure business continuity in the wake of a total system wipe. Organizations should also maintain “air-gapped” or offline copies of their most critical configuration data, ensuring that even if the entire primary and secondary network is compromised, a clean recovery point remains available. These defensive measures were not just theoretical considerations in 2026; they were the essential requirements for any organization operating within the crosshairs of a state-sponsored campaign. The ability to restore operations from a trusted state, rather than just preventing an attack, has become the true measure of organizational resilience in a world of persistent and destructive cyber threats.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later