12 min read

Triskele Labs SOC Heightens Monitoring as Iranian Cyber Activity Surges

Prepared by: Matt Veall, SOC Lead Victoria | Latest updates: 17 March 2026

Triskele Labs’ SOC responds to a surge in Iranian-aligned cyber activity following the February 2026 Middle East strikes.

Triskele Labs’ Security Operations Centre (SOC) has moved to an elevated monitoring posture following a surge in Iranian-aligned cyber operations linked to the recent escalation in the Middle East. Since the US and Israeli military strikes on Iran on 28 February 2026, threat actors associated with Iranian state interests and hacktivist coalitions have intensified cyber activity against organisations across allied nations, including Australia. Our SOC is actively tracking the campaign, analysing emerging intelligence, and strengthening detection coverage to protect client environments.

A Rapidly Escalating Cyber Campaign

Open-source intelligence indicates a sharp increase in cyber operations following the strikes, widely referred to as Operation Epic Fury (US) and Operation Roaring Lion (Israel). Iranian state-aligned groups and affiliated hacktivists have launched retaliatory cyber campaigns targeting organisations in the United States, Israel, Gulf states, and Western allies such as Australia, the United Kingdom, and Canada.

Government agencies across multiple countries have issued warnings urging organisations to adopt a heightened defensive posture.

The US Cybersecurity and Infrastructure Security Agency (CISA), the Canadian Centre for Cyber Security, and the UK’s National Cyber Security Centre have all published advisories highlighting increased risk. CISA has confirmed enhanced coordination with federal partners, including the Department of War and the FBI, to identify emerging threats and reduce exposure for critical infrastructure and private sector organisations.

Security researchers estimate that around 60 threat groups are currently active within this campaign. Several pro-Russian hacktivist collectives have reportedly aligned with Iranian actors, forming a loose coalition targeting Israeli and Western organisations.

How Our SOC Is Responding

Heightened media attention surrounding geopolitical events increases the likelihood of opportunistic targeting, particularly phishing, credential theft attempts, website disruption, and ransomware-style intrusion activity. Our existing 24/7 MDR monitoring posture is designed to detect and alert on this type of activity as standard.

In response to the current escalation, our SOC has implemented several proactive measures aligned to the tactics, techniques, and procedures associated with Iranian-aligned threat groups.

Enhanced Authentication Monitoring

Increased detection sensitivity for MFA fatigue attempts, impossible travel events, and password spray campaigns within Microsoft Entra environments. These are the primary initial access techniques observed in Iranian-aligned operations.

Phishing and Credential Harvesting Detection

Additional monitoring for phishing-driven intrusion attempts, including detection of suspicious email forwarding rules and newly created mailbox rules, which are commonly used by threat actors to maintain persistence in a compromised mailbox.

Privileged Account Behaviour Analysis

Increased scrutiny of privileged account behaviour and administrative actions, including anomalous role escalation, bulk device operations, and access to sensitive systems outside established baselines.

Endpoint Threat Detection

Enhanced detection for endpoint activity consistent with lateral movement, data staging, or preparation for destructive payload deployment across managed environments.

External Attack Surface Monitoring

Increased monitoring for scanning and exploit attempts against externally facing services, particularly VPN appliances and remote access portals, which Iranian state-sponsored actors have historically targeted for initial access.

Current status: At this stage, we have not identified any specific confirmed indicators of compromise affecting our managed client environments. However, we agree with the broader intelligence community assessment that this should be treated as a heightened risk period and that organisations should maintain an elevated defensive posture.

Recommended Proactive Actions for Your Organisation

While our SOC continues to monitor your environment, we recommend the following preventative steps be prioritised over the coming days to strengthen your defensive posture.

1. Confirm MFA Enforcement

Ensure multi-factor authentication is enforced for all users, with particular attention to privileged accounts.

Confirm that no legacy authentication methods remain enabled, as these bypass MFA entirely. Check Point Research has observed hundreds of brute-force and credential stuffing attempts against organisational VPN infrastructure linked to Handala-associated infrastructure.

2. Review Privileged Access Accounts

Audit all Global Admin, Domain Admin, and equivalent privileged accounts.

Confirm the principle of least privilege is applied and that no unnecessary standing access exists. According to public reporting, the Stryker attack succeeded when a threat actor leveraged a highly privileged account to remotely wipe over 200,000 devices globally via Microsoft Intune.

3. Patch and Harden External-Facing Services

Ensure all external-facing services are patched and hardened, particularly:

  • VPN appliances
  • Remote access portals
  • Public web infrastructure 

CISA specifically recommends disabling Remote Desktop Protocol and administrative remote access unless explicitly required.

Remove default or unused accounts, disable unused ports and protocols, and segment critical systems such as ICS/OT environments from general business networks.

4. Remind Staff to Remain Vigilant

Issue a reminder to all staff to remain vigilant for phishing, especially emails relating to:

  • Donations

  • Media requests

  • Urgent payment activity

  • Account security alerts

During periods of geopolitical tension, threat actors frequently craft phishing lures tied to current events.

5. Confirm Backup and Recovery Readiness

Verify backup and recovery capability, including testing restore procedures and ensuring backups are not directly accessible from production networks.

In a destructive wiper scenario like the Stryker attack, offline and immutable backups are the difference between recovery and rebuilding from scratch.

6. Review Logging Coverage

Ensure authentication logs and endpoint logs are being retained and monitored appropriately.

Iranian-aligned actors frequently use living-off-the-land techniques and legitimate administrative tools, making comprehensive logging critical for detection.

7. Review and Uplift Conditional Access Policies

Review your Microsoft Entra Conditional Access policies.

At minimum we recommend:

  • Enforcing MFA consistently
  • Blocking legacy authentication
  • Applying stricter controls for privileged accounts
  • Requiring compliant or managed devices

Where licensing permits, risk-based Conditional Access controls (sign-in risk and user risk) should also be enabled.

Why This Matters for Organisations

Most organisations will not be directly targeted by Iranian state actors. However, geopolitical crises routinely trigger a rise in opportunistic cyber activity.

Threat actors exploit heightened media attention and global uncertainty to conduct phishing campaigns, credential harvesting, and disruptive hacktivist operations. Organisations can become collateral targets through supply-chain relationships, managed service providers, or widely used enterprise platforms.

CISA has historically observed Iranian government-sponsored activity targeting the following sectors: 

  • Government services and public infrastructure
  • Water and wastewater systems
  • Defence industrial base
  • Energy
  • Transportation systems, including aviation
  • Financial services
  • Communications
  • Healthcare 

The agency has also warned that Iranian threat actors may collaborate with criminal groups to deploy ransomware or steal sensitive data. In some campaigns, attackers exaggerate the value or scale of stolen information in order to amplify reputational damage during follow-on leak operations.

Recent Activity Signals Escalation

A series of cyber incidents since the end of February highlights the breadth of activity associated with the campaign. As with many hacktivist operations, some claims remain unverified. However, the scale and volume of reported incidents indicate a clear escalation.

March 2026 – Stryker Corporation (United States)

Attackers reportedly abused Microsoft Intune administrative access to trigger a large-scale device wipe affecting more than 200,000 endpoints across 61 countries. Healthcare supply chains were disrupted and over 5,000 workers in Ireland were sent home.

March 2026 – Israeli energy exploration company

Threat actors claimed a compromise and data exfiltration operation targeting energy sector systems.

March 2026 – Jordan fuel infrastructure

Hacktivists claimed disruption of national fuel station systems. Jordan’s National Cybersecurity Center separately confirmed it prevented an attempted attack on wheat silo management systems.

March 2026 – Gulf state infrastructure

Distributed denial-of-service (DDoS) attacks targeted airports in Bahrain and the UAE, Riyadh Bank in Saudi Arabia, and the Bank of Jordan.

March 2026 – Israeli ICS and OT environments

Threat actors claimed access to drone defence systems and payment infrastructure. Screenshots of water pump human-machine interface (HMI) systems were also published online, allegedly showing operational access.

March 2026 – Pro-Russian coalition activity

Pro-Russian hacktivist groups formally joined the pro-Iranian campaign under the banner #OpIsrael, launching large-scale DDoS attacks against Israeli defence contractors and municipal governments.

January 2026 – Human rights organisations

A phishing campaign targeted NGOs using malicious Microsoft Office documents disguised as protest casualty reports. Command-and-control infrastructure reportedly leveraged GitHub, Google Drive, and Telegram.

Intelligence Sources We Are Tracking

The situation continues to evolve rapidly. Our SOC is actively monitoring intelligence from several government and industry sources, including: 

  • CISA (United States) – Advisories and alerts on Iranian cyber activity and risk-reduction guidance for organisations.
  • ACSC / ASD (Australia) – Threat advisories relevant to Australian organisations, including sector-specific guidance.
  • NCSC (United Kingdom) – Defensive guidance for organisations during periods of heightened cyber threat.
  • Canadian Centre for Cyber Security – Threat bulletins relating to Iranian cyber operations following the February 2026 strikes.
  • Palo Alto Networks Unit 42 – Threat intelligence tracking approximately 60 active groups involved in the campaign.
  • Check Point Research – Analysis of Iranian cyber capabilities and threat actor profiles, including groups such as Void Manticore and Handala.

Intelligence from these sources is continuously ingested into our SOC detection pipelines, enabling rapid identification of activity associated with emerging campaigns.

Ongoing Monitoring

The cyber threat environment is likely to remain elevated while geopolitical tensions continue.

Our SOC is actively monitoring developments and analysing alerts through an enhanced threat-awareness lens. If suspicious activity associated with this campaign is detected in client environments, affected organisations will be notified immediately.

If you have concerns about your environment or would like to discuss defensive measures in more detail, please contact your Triskele Labs account manager or reach out directly to our SOC team.

Further updates will be provided as the situation evolves.

 


Sources and Further Reading

Cybersecurity and Infrastructure Security Agency (CISA).
Urges Continued Vigilance Amid Conflict with Iran – advisory on heightened cyber threat activity and defensive guidance for organisations.
https://www.cisa.gov

KrebsOnSecurity.
Coverage of the Stryker cyber incident involving the reported large-scale Microsoft Intune device wipe.
https://krebsonsecurity.com

Palo Alto Networks Unit 42.
Threat intelligence brief on Iranian cyber operations and the estimated 60 active threat groups involved in the campaign.
https://unit42.paloaltonetworks.com

Check Point Research.
Analysis of Iranian cyber capabilities and threat actor profiles including Void Manticore and Handala.
https://research.checkpoint.com

Canadian Centre for Cyber Security.
Government threat bulletin addressing Iranian cyber activity following the February 2026 strikes.
https://cyber.gc.ca

Australian Cyber Security Centre (ACSC) / Australian Signals Directorate (ASD).
Cyber security advisories and defensive guidance for Australian organisations.
https://www.cyber.gov.au

National Cyber Security Centre (NCSC), United Kingdom.
Guidance for organisations strengthening cyber defences during periods of heightened geopolitical threat.
https://www.ncsc.gov.uk