Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Iranian MOIS Actors & the Cyber Crime Connection

0
Medium
Published: Tue Mar 10 2026 (03/10/2026, 21:10:43 UTC)
Source: AlienVault OTX General

Description

Iranian intelligence services are increasingly engaging with the cyber crime ecosystem, leveraging criminal tools, services, and operational models to support state objectives. This trend is particularly evident among actors linked to the Ministry of Intelligence and Security (MOIS), such as Void Manticore and MuddyWater. These actors are not merely imitating criminal behavior but actively associating with the cyber criminal ecosystem, using its infrastructure, malware, and affiliate-style relationships. This approach enhances their operational capabilities, complicates attribution, and contributes to confusion around Iranian threat activity. Examples include the use of ransomware branding, commercial infostealers, and overlaps with criminal malware clusters. This shift from imitation to active engagement with cyber crime offers both improved deniability and expanded technical capabilities for Iranian actors.

AI-Powered Analysis

AILast updated: 03/11/2026, 10:29:25 UTC

Technical Analysis

The Iranian Ministry of Intelligence and Security (MOIS) actors, including groups like Void Manticore and MuddyWater, have evolved their cyber operations by actively engaging with the cyber crime ecosystem rather than merely mimicking criminal behavior. This engagement includes utilizing criminal tools, malware, and affiliate-style operational models commonly found in cyber crime, such as ransomware branding and commercial infostealers. By leveraging these criminal infrastructures, MOIS actors enhance their operational capabilities, enabling more sophisticated and flexible campaigns. This approach complicates attribution efforts because the use of common cyber crime tools and services blurs the lines between state-sponsored and criminal activity. The threat actors employ a wide range of malware families and techniques, including those identified by MITRE ATT&CK IDs such as T1583 (Acquire Infrastructure), T1071 (Application Layer Protocol), T1195 (Supply Chain Compromise), T1036 (Masquerading), T1090 (Proxy), T1568 (Dynamic Resolution), and others related to lateral movement, command and control, and credential theft. The use of affiliate-style relationships allows MOIS actors to outsource or share capabilities with criminal groups, increasing their reach and operational tempo. While no specific exploits in the wild have been reported, the integration with cyber crime ecosystems signals a strategic shift that could lead to more disruptive and deniable operations. This evolution reflects a hybrid threat model combining espionage, sabotage, and financially motivated tactics, complicating defense and response strategies for targeted organizations.

Potential Impact

The integration of Iranian MOIS actors with cyber crime ecosystems significantly raises the threat level for organizations globally, especially those in sectors of strategic interest to Iran. This collaboration enhances the attackers’ technical capabilities, enabling more sophisticated malware deployment, evasion techniques, and operational flexibility. The use of ransomware branding and commercial infostealers increases the risk of data theft, financial loss, and operational disruption. Attribution challenges caused by the blending of state and criminal tactics can delay or complicate incident response and remediation efforts. Organizations may face increased exposure to espionage, intellectual property theft, and potential sabotage. The expanded use of affiliate-style models means attacks can scale rapidly and unpredictably. While no widespread exploitation is currently reported, the potential for future campaigns that combine espionage with financially motivated ransomware or extortion is significant. This threat could impact confidentiality, integrity, and availability of critical systems, particularly in government, defense, energy, telecommunications, and financial sectors.

Mitigation Recommendations

Organizations should implement targeted threat hunting and monitoring for indicators associated with MOIS-linked groups and their known malware families. Deploy network segmentation and strict access controls to limit lateral movement opportunities exploited by these actors. Enhance detection capabilities for command and control traffic patterns consistent with MITRE ATT&CK techniques such as T1071 and T1090. Employ advanced endpoint detection and response (EDR) solutions capable of identifying infostealer and ransomware behaviors. Conduct regular threat intelligence updates focusing on Iranian threat actor tactics and infrastructure changes. Establish robust incident response plans that consider attribution complexities and potential hybrid espionage and ransomware scenarios. Collaborate with industry information sharing groups and government agencies to receive timely alerts. Limit exposure to supply chain risks by vetting third-party vendors and monitoring for supply chain compromise indicators. Utilize multi-factor authentication and credential hygiene to reduce the risk of credential theft exploitation. Finally, conduct regular security awareness training to recognize phishing and social engineering attempts linked to these actors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://research.checkpoint.com/2026/iranian-mois-actors-the-cyber-crime-connection/"]
Adversary
MOIS (Ministry of Intelligence and Security)
Pulse Id
69b088d31d4ef8bf35564baa
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash29953b2e46aeaf0157d487c13c4a0643
hash439c0a0a46627bd166e08436f383ad56
hash4860758863fd040a8c809ce53cb7fb37
hash56a4b425aba37ef886bdfbd8343a1bd5
hash591aae15106147bdb5bc7b26049b943f
hash5c057af2f358fc10107d5ccdb39938ad
hash76c59282e44a461105dc5739a6ba7c33
hash7a4119e116ecdefe0a1017110e250e61
hash7f3c8a7fe78d3d05b6022df3ea0c15fb
hash838c8fd4ae7e3c4972adc8800db44929
hashe2bcc41ddea5cf9d759380701d14f258
hashe6fafcb72f2f315692218182ba84e0ef
hasheb5e96e05129e5691f9677be4e396c88
hashf02463bb05b85da1ed7d0f166174ef9c
hash0902d7915a19975817ec1ccb0f2f6714aed19638
hash0ba2306ec15f7124fafc7615e81f34c7986ba9a5
hash2087bb914327e937ea6e77fe6c832576338c2af8
hash21a435ecaa7b86efbec7f6fb61fcda3da686125c
hash2b781b3a352db44db67ad56e8477e6a1016b2597
hash389b12da259a23fa4559eb1d97198120f2a722fe
hash3ab3fee4daac90bb7bee470b5b2de8ee0d6bec8b
hash429efcf0370b53cc3c455b634dc066b1d08b568d
hash551bdf646df8e9abe04483882650a8ffae43cb55
hash579a4584a6eef0a2453841453221d0fb25c08c89
hash7a8963d123918ca86727649492cd1ff4e020cb72
hash9c5cc25e80df75f91873bf31a6269e7bdab7c6d2
hash9dcb994ea2b8e6169b76a524fae7b2d2dcd1807d
hasha42b4914b0c8dc47a3a5f8114d0fcbef02d84e0a
hashb674578d4bdb24cd58bf2dc884eaa658b7aa250c
hashbe3c8f93e9d7f42ec1133ab36f555b104b23fe1b
hashc16099c29ccdb34764e4d15b1dab2d141d159950
hashc2825f992911c8596411575e77b56c69722b7f4c
hashcecf87d582b4df4323eaef04c9a648d43325043a
hashd920ae0f8ea8b5bd42de49e01c6bbd4c2c6d0847
hashe2e8516b4f275e8c636620b7377ee3b9f9f47bb0
hashf8444dfc740b94227ab9b2e757b8f8f1fa49362a
hashfa49d1fd5a938b3de0840759db62867e6382cea1
hash077ab28d66abdafad9f5411e18d26e87fe43da1410ee8fe846bd721ab0cb52de
hash24857fe82f454719cd18bcbe19b0cfa5387bee1022008b7f5f3a8be9f05e4d14
hash2a09bbb3d1ddb729ea7591f197b5955453aa3769c6fb98a5ef60c6e4b7df23a5
hash2b7d8a519f44d3105e9fde2770c75efb933994c658855dca7d48c8b4897f81e6
hash4aef998e3b3f6ca21c78ed71732c9d2bdcc8a4e0284f51d7462c79d446fbc7be
hash64263640a6fdeb2388bca2e9094a17065308cf8dcb0032454c0a71d9b78327eb
hash64cf334716f15da1db7981fad6c81a640d94aa1d65391ef879f4b7b6edf6e7f1
hash74db1f653da6de134bdc526412a517a30b6856de9c3e5d0c742cb5fe9959ad0d
hash94f05495eb1b2ebe592481e01d3900615040aa02bd1807b705a50e45d7c53444
hasha4bd1371fe644d7e6898045cc8e7b5e1562bdfd0e4871d46034e29a22dec6377
hasha8c380b57cb7c381ca6ba845bd7af7333f52ee4dc4e935e98b48bb81facad72b
hasha92d28f1d32e3a9ab7c3691f8bfca8f7586bb0666adbba47eab3e1a8faf7ecc0
hashaae017e7a36e016655c91bd01b4f3c46309bbe540733f82cce29392e72e9bd1f
hashddceade244c636435f2444cd4c4d3dc161981f3af1f622c03442747ecef50888

Threat ID: 69b140632f860ef9439004ac

Added to database: 3/11/2026, 10:13:55 AM

Last enriched: 3/11/2026, 10:29:25 AM

Last updated: 3/14/2026, 2:24:45 AM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses