Fractional CISO working on laptop
Threat Intelligence

Iranian Cyber Operations: An Update for CISOs

3 April 20268 min read

Three weeks after the outbreak of the US-Israel-Iran conflict, the cyber dimension continues to evolve. New reporting has clarified the mechanics of the Stryker breach, revealed additional targets, and confirmed what security professionals have long known: state-sponsored actors adapt their tooling, but they rarely abandon their underlying playbook.

For CISOs, the developments of late March and early April are not a signal to panic. They are a reminder to look closely at mechanisms that may have drifted down the priority list.

What Has Changed

The Stryker Attack: No Malware Required

When Handala - the Iranian-linked group widely assessed as a persona for Void Manticore - claimed the Stryker breach in mid-March, the initial analysis focused on wiper malware. The scale was striking: over 200,000 devices disrupted across 79 countries.

Subsequent reporting from Palo Alto Networks' Unit 42 and others has established a more precise technical picture. The attackers did not deploy compiled wiper malware. Instead, they compromised Global Admin credentials in Stryker's Microsoft environment and used Intune and Entra ID to remotely wipe enrolled devices at scale. No malware signature. No endpoint execution. Just legitimate administrative tools used maliciously.

This is a tactical evolution, not a revolution. Iranian actors have always followed the path of least resistance. If that path now runs through cloud identity platforms rather than endpoint payloads, the defensive imperative shifts accordingly.

PSK Wind and Defence Supply Chains

On 2 April, Handala claimed a breach of PSK Wind Technologies, an Israeli engineering firm that develops command and control systems for air defence infrastructure. The group alleges it exfiltrated sensitive technical documents and passed them to "Axis of Resistance" missile units.

Whether the operational claim is fully accurate matters less than the targeting pattern. Iranian groups are probing the defence industrial base and its adjacent suppliers with increasing aggression. Organisations that sell into, buy from, or partner with defence contractors should assume their risk profile has risen.

Gulf Infrastructure Under Pressure

Beyond cyber-physical breaches, the conflict has spilled into cloud and regional infrastructure. Iranian drone strikes reportedly damaged AWS data centres in the UAE and Bahrain in early March, with further disruption to the Bahrain facility in late March and early April. Airport systems in Kuwait, Bahrain, Saudi Arabia and the UAE have faced disruptive attacks from pro-Iran groups including DieNet and the Islamic Cyber Resistance (313 Team).

For organisations with operations or cloud footprints in the Gulf, these incidents underscore a point that applies to physical security as much as cyber: proximity to conflict zones elevates risk.

What Has Not Changed

The fundamentals of effective security remain the same.

Identity is the perimeter. It always has been. The Stryker breach did not exploit a zero-day vulnerability or a novel protocol flaw. It exploited privileged credentials and the absence of sufficient behavioural controls around administrative tools.

Supply chain risk is your risk. Stryker's 2019 acquisition of Israeli medical technology firm OrthoSpace appears to have contributed to its targeting calculus. PSK Wind sits in the defence supply chain. When threat actors map their target sets, they rarely stop at the prime contractor.

Detection must cover behaviour, not just binaries. A wiper malware file is easy to detect. A legitimate Intune wipe command issued from a compromised Global Admin account is not. This has always been true for living-off-the-land techniques. The current conflict simply provides a high-profile reminder.

What CISOs Should Revisit Now

Privileged Identity Governance

The Stryker incident demonstrates that a single compromised Global Admin or Intune Administrator credential can produce organisation-wide destruction. Review your privileged access management with specific attention to:

  • Cloud admin roles: How many Global Admins, Intune Admins, and Entra ID Privileged Role Administrators do you have? Can you reduce that number?
  • Break-glass accounts: Are your emergency access accounts properly isolated, monitored, and protected by hardware-backed MFA?
  • Conditional access: Are admin sessions constrained by trusted locations, compliant devices, and real-time risk signals?
  • Behavioural monitoring: Do you have visibility into anomalous administrative actions - bulk device retirements, unusual policy changes, or off-hours access to identity portals?
  • This is not a new requirement. It is a well-established control that the Stryker breach brings back into sharp focus.

    EDR Limitations and Identity Detection

    If your detection strategy relies primarily on endpoint telemetry and malware signatures, you have a gap. Native administrative tool abuse generates no malware execution alerts. Conventional EDR will not catch an Intune wipe command.

    Consider this a prompt to evaluate:

  • Identity threat detection: Tools that monitor Entra ID, Okta, or equivalent platforms for anomalous login patterns, impossible travel, and privilege escalation
  • Cloud app security: Visibility into actions taken within Microsoft 365, Google Workspace, and other SaaS administrative consoles
  • Log correlation: Whether your SIEM properly ingests and correlates identity, endpoint, and network telemetry
  • These investments protect against far more than Iranian actors. They close the same gaps that ransomware groups and business email compromise operators exploit every day.

    Supply Chain Diligence

    Review your third-party risk programme with two questions in mind:

  • Do any of your critical suppliers have elevated defence or Israeli business relationships?
  • Would you know if one of your suppliers were compromised and used as a downstream access vector?
  • If the answer to either question is uncertain, tighten your contractual security requirements, accelerate your supplier security reviews, and monitor for indicators of compromise shared by threat intelligence feeds.

    Geographic Risk Assessment

    Organisations with infrastructure, personnel, or data centres in the Gulf should treat the current environment as elevated risk. This does not necessarily mean evacuating cloud regions or halting operations. It does mean confirming that your incident response plans, backup strategies, and communication protocols account for regional disruption.

    The Bigger Picture

    It is tempting to treat every tactical shift by Handala or Void Manticore as a new threat paradigm. It is not. State-sponsored actors have used compromised credentials and native administrative tools for decades. The Stryker breach is a large-scale, well-publicised example of a familiar pattern.

    What changes is the urgency of attending to these controls. Conflict creates noise, resource pressure, and distraction. CISOs should use this moment to remind their boards and executive teams that the most consequential security investments are often the least glamorous: identity governance, logging, segmentation, and backup verification.

    Iranian cyber actors will continue adapting their tools. Your job is to ensure that your fundamentals are solid enough that the specific mechanism does not matter.

    References

  • Palo Alto Networks Unit 42. Iranian Cyberattacks 2026: Threat Brief (March 2026)
  • SISA. Week 5 Threat Advisory on Iran-Israel-US Conflict (April 2, 2026)
  • SecurityAffairs. Pro-Iran Handala group breached Israeli defence contractor PSK Wind Technologies (April 3, 2026)
  • Data Center Dynamics. Fire at AWS data center in Bahrain after Iranian attack - report (April 3, 2026)
  • Cisco Talos. Talos on the developing situation in the Middle East (March 2026)
  • Fortune. Iranian drone attacks on Amazon's Gulf data centers a harbinger of new tactics in future conflicts (March 9, 2026)
  • Share this article

    Seeking Security Insights for Your Business?

    Our fractional CISOs can help you implement the strategies discussed in this article. Book a call to discuss your security needs.

    Book a Call