Iranian MOIS Actors & the Cyber Crime Connection
Iranian intelligence services are increasingly engaging with the cyber crime ecosystem, leveraging criminal tools, services, and operational models to support state objectives. This trend is particularly evident among actors linked to the Ministry of Intelligence and Security (MOIS), such as Void Manticore and MuddyWater. These actors are not merely imitating criminal behavior but actively associating with the cyber criminal ecosystem, using its infrastructure, malware, and affiliate-style relationships. This approach enhances their operational capabilities, complicates attribution, and contributes to confusion around Iranian threat activity. Examples include the use of ransomware branding, commercial infostealers, and overlaps with criminal malware clusters. This shift from imitation to active engagement with cyber crime offers both improved deniability and expanded technical capabilities for Iranian actors.
AI Analysis
Technical Summary
The Iranian Ministry of Intelligence and Security (MOIS) actors, including groups like Void Manticore and MuddyWater, have evolved their cyber operations by actively engaging with the cyber crime ecosystem rather than merely mimicking criminal behavior. This engagement includes utilizing criminal tools, malware, and affiliate-style operational models commonly found in cyber crime, such as ransomware branding and commercial infostealers. By leveraging these criminal infrastructures, MOIS actors enhance their operational capabilities, enabling more sophisticated and flexible campaigns. This approach complicates attribution efforts because the use of common cyber crime tools and services blurs the lines between state-sponsored and criminal activity. The threat actors employ a wide range of malware families and techniques, including those identified by MITRE ATT&CK IDs such as T1583 (Acquire Infrastructure), T1071 (Application Layer Protocol), T1195 (Supply Chain Compromise), T1036 (Masquerading), T1090 (Proxy), T1568 (Dynamic Resolution), and others related to lateral movement, command and control, and credential theft. The use of affiliate-style relationships allows MOIS actors to outsource or share capabilities with criminal groups, increasing their reach and operational tempo. While no specific exploits in the wild have been reported, the integration with cyber crime ecosystems signals a strategic shift that could lead to more disruptive and deniable operations. This evolution reflects a hybrid threat model combining espionage, sabotage, and financially motivated tactics, complicating defense and response strategies for targeted organizations.
Potential Impact
The integration of Iranian MOIS actors with cyber crime ecosystems significantly raises the threat level for organizations globally, especially those in sectors of strategic interest to Iran. This collaboration enhances the attackers’ technical capabilities, enabling more sophisticated malware deployment, evasion techniques, and operational flexibility. The use of ransomware branding and commercial infostealers increases the risk of data theft, financial loss, and operational disruption. Attribution challenges caused by the blending of state and criminal tactics can delay or complicate incident response and remediation efforts. Organizations may face increased exposure to espionage, intellectual property theft, and potential sabotage. The expanded use of affiliate-style models means attacks can scale rapidly and unpredictably. While no widespread exploitation is currently reported, the potential for future campaigns that combine espionage with financially motivated ransomware or extortion is significant. This threat could impact confidentiality, integrity, and availability of critical systems, particularly in government, defense, energy, telecommunications, and financial sectors.
Mitigation Recommendations
Organizations should implement targeted threat hunting and monitoring for indicators associated with MOIS-linked groups and their known malware families. Deploy network segmentation and strict access controls to limit lateral movement opportunities exploited by these actors. Enhance detection capabilities for command and control traffic patterns consistent with MITRE ATT&CK techniques such as T1071 and T1090. Employ advanced endpoint detection and response (EDR) solutions capable of identifying infostealer and ransomware behaviors. Conduct regular threat intelligence updates focusing on Iranian threat actor tactics and infrastructure changes. Establish robust incident response plans that consider attribution complexities and potential hybrid espionage and ransomware scenarios. Collaborate with industry information sharing groups and government agencies to receive timely alerts. Limit exposure to supply chain risks by vetting third-party vendors and monitoring for supply chain compromise indicators. Utilize multi-factor authentication and credential hygiene to reduce the risk of credential theft exploitation. Finally, conduct regular security awareness training to recognize phishing and social engineering attempts linked to these actors.
Affected Countries
United States, United Kingdom, Israel, Saudi Arabia, United Arab Emirates, Germany, France, Canada, Australia, Turkey
Indicators of Compromise
- hash: 29953b2e46aeaf0157d487c13c4a0643
- hash: 439c0a0a46627bd166e08436f383ad56
- hash: 4860758863fd040a8c809ce53cb7fb37
- hash: 56a4b425aba37ef886bdfbd8343a1bd5
- hash: 591aae15106147bdb5bc7b26049b943f
- hash: 5c057af2f358fc10107d5ccdb39938ad
- hash: 76c59282e44a461105dc5739a6ba7c33
- hash: 7a4119e116ecdefe0a1017110e250e61
- hash: 7f3c8a7fe78d3d05b6022df3ea0c15fb
- hash: 838c8fd4ae7e3c4972adc8800db44929
- hash: e2bcc41ddea5cf9d759380701d14f258
- hash: e6fafcb72f2f315692218182ba84e0ef
- hash: eb5e96e05129e5691f9677be4e396c88
- hash: f02463bb05b85da1ed7d0f166174ef9c
- hash: 0902d7915a19975817ec1ccb0f2f6714aed19638
- hash: 0ba2306ec15f7124fafc7615e81f34c7986ba9a5
- hash: 2087bb914327e937ea6e77fe6c832576338c2af8
- hash: 21a435ecaa7b86efbec7f6fb61fcda3da686125c
- hash: 2b781b3a352db44db67ad56e8477e6a1016b2597
- hash: 389b12da259a23fa4559eb1d97198120f2a722fe
- hash: 3ab3fee4daac90bb7bee470b5b2de8ee0d6bec8b
- hash: 429efcf0370b53cc3c455b634dc066b1d08b568d
- hash: 551bdf646df8e9abe04483882650a8ffae43cb55
- hash: 579a4584a6eef0a2453841453221d0fb25c08c89
- hash: 7a8963d123918ca86727649492cd1ff4e020cb72
- hash: 9c5cc25e80df75f91873bf31a6269e7bdab7c6d2
- hash: 9dcb994ea2b8e6169b76a524fae7b2d2dcd1807d
- hash: a42b4914b0c8dc47a3a5f8114d0fcbef02d84e0a
- hash: b674578d4bdb24cd58bf2dc884eaa658b7aa250c
- hash: be3c8f93e9d7f42ec1133ab36f555b104b23fe1b
- hash: c16099c29ccdb34764e4d15b1dab2d141d159950
- hash: c2825f992911c8596411575e77b56c69722b7f4c
- hash: cecf87d582b4df4323eaef04c9a648d43325043a
- hash: d920ae0f8ea8b5bd42de49e01c6bbd4c2c6d0847
- hash: e2e8516b4f275e8c636620b7377ee3b9f9f47bb0
- hash: f8444dfc740b94227ab9b2e757b8f8f1fa49362a
- hash: fa49d1fd5a938b3de0840759db62867e6382cea1
- hash: 077ab28d66abdafad9f5411e18d26e87fe43da1410ee8fe846bd721ab0cb52de
- hash: 24857fe82f454719cd18bcbe19b0cfa5387bee1022008b7f5f3a8be9f05e4d14
- hash: 2a09bbb3d1ddb729ea7591f197b5955453aa3769c6fb98a5ef60c6e4b7df23a5
- hash: 2b7d8a519f44d3105e9fde2770c75efb933994c658855dca7d48c8b4897f81e6
- hash: 4aef998e3b3f6ca21c78ed71732c9d2bdcc8a4e0284f51d7462c79d446fbc7be
- hash: 64263640a6fdeb2388bca2e9094a17065308cf8dcb0032454c0a71d9b78327eb
- hash: 64cf334716f15da1db7981fad6c81a640d94aa1d65391ef879f4b7b6edf6e7f1
- hash: 74db1f653da6de134bdc526412a517a30b6856de9c3e5d0c742cb5fe9959ad0d
- hash: 94f05495eb1b2ebe592481e01d3900615040aa02bd1807b705a50e45d7c53444
- hash: a4bd1371fe644d7e6898045cc8e7b5e1562bdfd0e4871d46034e29a22dec6377
- hash: a8c380b57cb7c381ca6ba845bd7af7333f52ee4dc4e935e98b48bb81facad72b
- hash: a92d28f1d32e3a9ab7c3691f8bfca8f7586bb0666adbba47eab3e1a8faf7ecc0
- hash: aae017e7a36e016655c91bd01b4f3c46309bbe540733f82cce29392e72e9bd1f
- hash: ddceade244c636435f2444cd4c4d3dc161981f3af1f622c03442747ecef50888
Iranian MOIS Actors & the Cyber Crime Connection
Description
Iranian intelligence services are increasingly engaging with the cyber crime ecosystem, leveraging criminal tools, services, and operational models to support state objectives. This trend is particularly evident among actors linked to the Ministry of Intelligence and Security (MOIS), such as Void Manticore and MuddyWater. These actors are not merely imitating criminal behavior but actively associating with the cyber criminal ecosystem, using its infrastructure, malware, and affiliate-style relationships. This approach enhances their operational capabilities, complicates attribution, and contributes to confusion around Iranian threat activity. Examples include the use of ransomware branding, commercial infostealers, and overlaps with criminal malware clusters. This shift from imitation to active engagement with cyber crime offers both improved deniability and expanded technical capabilities for Iranian actors.
AI-Powered Analysis
Technical Analysis
The Iranian Ministry of Intelligence and Security (MOIS) actors, including groups like Void Manticore and MuddyWater, have evolved their cyber operations by actively engaging with the cyber crime ecosystem rather than merely mimicking criminal behavior. This engagement includes utilizing criminal tools, malware, and affiliate-style operational models commonly found in cyber crime, such as ransomware branding and commercial infostealers. By leveraging these criminal infrastructures, MOIS actors enhance their operational capabilities, enabling more sophisticated and flexible campaigns. This approach complicates attribution efforts because the use of common cyber crime tools and services blurs the lines between state-sponsored and criminal activity. The threat actors employ a wide range of malware families and techniques, including those identified by MITRE ATT&CK IDs such as T1583 (Acquire Infrastructure), T1071 (Application Layer Protocol), T1195 (Supply Chain Compromise), T1036 (Masquerading), T1090 (Proxy), T1568 (Dynamic Resolution), and others related to lateral movement, command and control, and credential theft. The use of affiliate-style relationships allows MOIS actors to outsource or share capabilities with criminal groups, increasing their reach and operational tempo. While no specific exploits in the wild have been reported, the integration with cyber crime ecosystems signals a strategic shift that could lead to more disruptive and deniable operations. This evolution reflects a hybrid threat model combining espionage, sabotage, and financially motivated tactics, complicating defense and response strategies for targeted organizations.
Potential Impact
The integration of Iranian MOIS actors with cyber crime ecosystems significantly raises the threat level for organizations globally, especially those in sectors of strategic interest to Iran. This collaboration enhances the attackers’ technical capabilities, enabling more sophisticated malware deployment, evasion techniques, and operational flexibility. The use of ransomware branding and commercial infostealers increases the risk of data theft, financial loss, and operational disruption. Attribution challenges caused by the blending of state and criminal tactics can delay or complicate incident response and remediation efforts. Organizations may face increased exposure to espionage, intellectual property theft, and potential sabotage. The expanded use of affiliate-style models means attacks can scale rapidly and unpredictably. While no widespread exploitation is currently reported, the potential for future campaigns that combine espionage with financially motivated ransomware or extortion is significant. This threat could impact confidentiality, integrity, and availability of critical systems, particularly in government, defense, energy, telecommunications, and financial sectors.
Mitigation Recommendations
Organizations should implement targeted threat hunting and monitoring for indicators associated with MOIS-linked groups and their known malware families. Deploy network segmentation and strict access controls to limit lateral movement opportunities exploited by these actors. Enhance detection capabilities for command and control traffic patterns consistent with MITRE ATT&CK techniques such as T1071 and T1090. Employ advanced endpoint detection and response (EDR) solutions capable of identifying infostealer and ransomware behaviors. Conduct regular threat intelligence updates focusing on Iranian threat actor tactics and infrastructure changes. Establish robust incident response plans that consider attribution complexities and potential hybrid espionage and ransomware scenarios. Collaborate with industry information sharing groups and government agencies to receive timely alerts. Limit exposure to supply chain risks by vetting third-party vendors and monitoring for supply chain compromise indicators. Utilize multi-factor authentication and credential hygiene to reduce the risk of credential theft exploitation. Finally, conduct regular security awareness training to recognize phishing and social engineering attempts linked to these actors.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://research.checkpoint.com/2026/iranian-mois-actors-the-cyber-crime-connection/"]
- Adversary
- MOIS (Ministry of Intelligence and Security)
- Pulse Id
- 69b088d31d4ef8bf35564baa
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash29953b2e46aeaf0157d487c13c4a0643 | — | |
hash439c0a0a46627bd166e08436f383ad56 | — | |
hash4860758863fd040a8c809ce53cb7fb37 | — | |
hash56a4b425aba37ef886bdfbd8343a1bd5 | — | |
hash591aae15106147bdb5bc7b26049b943f | — | |
hash5c057af2f358fc10107d5ccdb39938ad | — | |
hash76c59282e44a461105dc5739a6ba7c33 | — | |
hash7a4119e116ecdefe0a1017110e250e61 | — | |
hash7f3c8a7fe78d3d05b6022df3ea0c15fb | — | |
hash838c8fd4ae7e3c4972adc8800db44929 | — | |
hashe2bcc41ddea5cf9d759380701d14f258 | — | |
hashe6fafcb72f2f315692218182ba84e0ef | — | |
hasheb5e96e05129e5691f9677be4e396c88 | — | |
hashf02463bb05b85da1ed7d0f166174ef9c | — | |
hash0902d7915a19975817ec1ccb0f2f6714aed19638 | — | |
hash0ba2306ec15f7124fafc7615e81f34c7986ba9a5 | — | |
hash2087bb914327e937ea6e77fe6c832576338c2af8 | — | |
hash21a435ecaa7b86efbec7f6fb61fcda3da686125c | — | |
hash2b781b3a352db44db67ad56e8477e6a1016b2597 | — | |
hash389b12da259a23fa4559eb1d97198120f2a722fe | — | |
hash3ab3fee4daac90bb7bee470b5b2de8ee0d6bec8b | — | |
hash429efcf0370b53cc3c455b634dc066b1d08b568d | — | |
hash551bdf646df8e9abe04483882650a8ffae43cb55 | — | |
hash579a4584a6eef0a2453841453221d0fb25c08c89 | — | |
hash7a8963d123918ca86727649492cd1ff4e020cb72 | — | |
hash9c5cc25e80df75f91873bf31a6269e7bdab7c6d2 | — | |
hash9dcb994ea2b8e6169b76a524fae7b2d2dcd1807d | — | |
hasha42b4914b0c8dc47a3a5f8114d0fcbef02d84e0a | — | |
hashb674578d4bdb24cd58bf2dc884eaa658b7aa250c | — | |
hashbe3c8f93e9d7f42ec1133ab36f555b104b23fe1b | — | |
hashc16099c29ccdb34764e4d15b1dab2d141d159950 | — | |
hashc2825f992911c8596411575e77b56c69722b7f4c | — | |
hashcecf87d582b4df4323eaef04c9a648d43325043a | — | |
hashd920ae0f8ea8b5bd42de49e01c6bbd4c2c6d0847 | — | |
hashe2e8516b4f275e8c636620b7377ee3b9f9f47bb0 | — | |
hashf8444dfc740b94227ab9b2e757b8f8f1fa49362a | — | |
hashfa49d1fd5a938b3de0840759db62867e6382cea1 | — | |
hash077ab28d66abdafad9f5411e18d26e87fe43da1410ee8fe846bd721ab0cb52de | — | |
hash24857fe82f454719cd18bcbe19b0cfa5387bee1022008b7f5f3a8be9f05e4d14 | — | |
hash2a09bbb3d1ddb729ea7591f197b5955453aa3769c6fb98a5ef60c6e4b7df23a5 | — | |
hash2b7d8a519f44d3105e9fde2770c75efb933994c658855dca7d48c8b4897f81e6 | — | |
hash4aef998e3b3f6ca21c78ed71732c9d2bdcc8a4e0284f51d7462c79d446fbc7be | — | |
hash64263640a6fdeb2388bca2e9094a17065308cf8dcb0032454c0a71d9b78327eb | — | |
hash64cf334716f15da1db7981fad6c81a640d94aa1d65391ef879f4b7b6edf6e7f1 | — | |
hash74db1f653da6de134bdc526412a517a30b6856de9c3e5d0c742cb5fe9959ad0d | — | |
hash94f05495eb1b2ebe592481e01d3900615040aa02bd1807b705a50e45d7c53444 | — | |
hasha4bd1371fe644d7e6898045cc8e7b5e1562bdfd0e4871d46034e29a22dec6377 | — | |
hasha8c380b57cb7c381ca6ba845bd7af7333f52ee4dc4e935e98b48bb81facad72b | — | |
hasha92d28f1d32e3a9ab7c3691f8bfca8f7586bb0666adbba47eab3e1a8faf7ecc0 | — | |
hashaae017e7a36e016655c91bd01b4f3c46309bbe540733f82cce29392e72e9bd1f | — | |
hashddceade244c636435f2444cd4c4d3dc161981f3af1f622c03442747ecef50888 | — |
Threat ID: 69b140632f860ef9439004ac
Added to database: 3/11/2026, 10:13:55 AM
Last enriched: 3/11/2026, 10:29:25 AM
Last updated: 3/14/2026, 2:24:45 AM
Views: 131
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.