Visualização de leitura

Israel Claims it ‘Struck’ Iran’s Cyber Warfare Headquarters

Cyber Warfare Headquarters, Iran, Iran Cyber Warfare Headquarters, Cyber Warfare, IRGC

Israel has claimed a successful strike on a Tehran-based compound that housed Iran’s "cyber warfare headquarters" and the "Intelligence Directorate," among others. The impact of this, however, on Iran’s cyber capabilities remains unclear.

The Israel Defense Forces in a Wednesday update said it had bombed the Eastern front of Iran where several critical military and intelligence units were allegedly housed. IDF listed seven primary agencies, including the headquarters of the Iranian Islamic Revolutionary Guards Corps (IRGC), the cyber and electronic and the Intelligence Directorate headquarters.

Israel nor the United States, who is coordinating the offense against Tehran shared further comments or details of this particular operation. The IDF, however, released a digital illustration of the alleged compound that was attacked.

The IRGC-linked cyber operatives have previously targeted the 2024 U.S. elections, for which Washington has even named and placed bounties for any info on them.
Read: US Offers $10M for Iranian Cyber Operatives Behind Election Interference and Critical Infrastructure Attacks

Cyber Warfare Continues Despite Infrastructure Strikes

Israel's claims of striking Iran's cyber warfare headquarters comes on the back of threat intelligence monitoring indicating Iranian-aligned cyber operations growing in number. According to cybersecurity firm Cyble's threat monitoring reports covering the conflict period, the relationship between physical infrastructure destruction and operational cyber capability remains ambiguous.

Iran's internet connectivity collapsed to approximately 1-4% of normal levels following the February 28 joint US-Israeli strikes—a near-total nationwide blackout that has persisted for over 120 hours. However, this disruption stems primarily from the coordinated cyber-kinetic operation that targeted Iran's communications infrastructure simultaneously with kinetic strikes, rather than from the physical destruction of the compound housing cyber warfare headquarters.

Security researchers note that the degraded internet connectivity likely hampers domestically-based Iranian state actors more than the physical headquarters damage. The blackout limits command-and-control infrastructure for Advanced Persistent Threat groups typically operating from within Iran's borders, but pre-positioned capabilities and externally-operated assets continue functioning.

Pre-Positioned Threats Remain Active

Critically, multiple Iranian state-sponsored hacking groups had established operational infrastructure before the kinetic strikes commenced. Cybersecurity firm Anomali reported to Reuters that Iranian state-backed groups conducted wiper attacks designed to erase data on Israeli targets prior to the February 28 offensive, indicating pre-positioned destructive capability that may still be active on compromised networks awaiting external trigger signals.

Advanced Persistent Threat groups including MuddyWater, APT42, Prince of Persia and CRESCENTHARVEST were all documented as actively targeting Israeli and regional organizations in January and February 2026—before hostilities escalated. These pre-existing footholds represent latent capability that could activate without requiring new command-and-control infrastructure within Iran's degraded internet environment.

The most significant confirmed technical operation during the conflict period came from Unit 42 researchers at Palo Alto Networks, who identified an active phishing campaign distributing weaponized replicas of Israel's RedAlert missile warning application. The sophisticated Android malware collects contacts, call logs, SMS messages, account information and device identifiers before encrypting and exfiltrating the data. The campaign demonstrates state-level tradecraft.

Hacktivist Activity Surges While State Actors Remain Silent

The cyber threat landscape following the strikes has been dominated by hacktivist operations rather than sophisticated state-sponsored campaigns. Over 70 individual hacktivist groups were active as of March 3, with an "Electronic Operations Room" established by Iraqi-aligned actors to coordinate pro-Iranian campaigns across multiple collectives.

However, threat intelligence analysts note a significant gap between the volume of hacktivist claims—primarily consisting of DDoS attacks, website defacements and unverified industrial control system access assertions—and the known destructive capabilities of Iran's state-sponsored cyber units.

The vast majority of observed operations consist of DDoS claims, website defacements, unverified ICS access assertions, and recycled propaganda," the Cyble threat report states. What warrants the highest concern going forward is the convergence of pre-positioned APT capability on Israeli and regional networks, the progressive restoration of Iranian internet connectivity which will re-enable coordination of state-level operations, and the growing cross-ideological alliance between pro-Iranian and pro-Russian hacktivist ecosystems.

Multiple pro-Russian hacktivist groups including NoName057(16) and Cardinal have pivoted from Ukraine-focused operations to join anti-Israel campaigns in support of Iran, confirming cross-ideological convergence patterns that provide sustained operational tempo independent of Tehran's connectivity status.

Assessment: Capability vs. Infrastructure

Cybersecurity experts from Cyble believe that striking physical headquarters does not necessarily eliminate cyber operational capability. Modern state-sponsored hacking operations rely on distributed infrastructure, encrypted communications channels, and operatives who may work remotely or from locations outside Iran's borders.

"The present phase saw cyber activity that was largely anticipatory rather than destructive," according to threat intelligence analysis. "What warrants continued monitoring is the assessed gap between current activity levels and the capability sets known to be held by state-sponsored actors on both sides."

The UK's National Cyber Security Centre issued an advisory on March 2 assessing "likely no current significant change in the direct cyber threat from Iran to the UK," while warning of an "almost certainly heightened risk of indirect cyber threat" for organizations with Middle East presence or supply chain exposure.

Organizations in affected sectors face continued risk from pre-positioned malware, externally-operated command infrastructure and hacktivist campaigns that operate independently of physical headquarters. When Iranian internet connectivity restores, threat intelligence analysts anticipate a potential spike in state-directed cyber operations.

The full impact of Israel's strike on Iran's cyber warfare headquarters may not become apparent for weeks or months, as security researchers monitor whether sophisticated Iranian APT campaigns resume at previous operational tempo or whether the disruption produces lasting degradation of Tehran's offensive cyber capabilities.

Educated Manticore no Irã Tem Como Alvo os Principais Acadêmicos de Tecnologia

A escalada de tensões entre Irã e Israel ganha um novo e perigoso capítulo no ciberespaço. Um relatório divulgado pela Check Point Research revela que o grupo de ciberespionagem iraniano conhecido como Educated Manticore, com ligações diretas ao Corpo da Guarda Revolucionária Islâmica (IRGC-IO), intensificou campanhas direcionadas contra acadêmicos, jornalistas e especialistas de tecnologia israelenses.

Alvos: Especialistas e Acadêmicos de Prestígio

De acordo com a investigação, o Educated Manticore concentrou esforços em atacar profissionais de alto nível, incluindo professores de ciência da computação de universidades renomadas de Israel, pesquisadores de cibersegurança e jornalistas. As ações, sofisticadas e cuidadosamente planejadas, fazem parte de uma ofensiva de espionagem digital que visa obter acesso indevido a contas de e-mail e outros serviços críticos.

Os invasores se passam por pesquisadores, executivos ou analistas de empresas de cibersegurança fictícias, estabelecendo contato inicial por e-mail ou até mesmo por mensagens no WhatsApp. Com uma comunicação polida, bem estruturada e aparentemente legítima — muitas vezes auxiliada por inteligência artificial —, os criminosos buscam conquistar a confiança das vítimas e direcioná-las para links maliciosos.

Phishing Personalizado e Engenharia Social Avançada

Uma vez estabelecido o contato, os alvos são conduzidos para falsas páginas de login do Gmail, Outlook ou Yahoo, desenvolvidas com tecnologia moderna baseada em Single Page Applications (SPA) usando React. Essas páginas simulam com precisão o fluxo de autenticação de grandes provedores de e-mail, incluindo etapas de autenticação multifator (2FA), captura de senhas e códigos de verificação.

Além disso, o kit de phishing desenvolvido pelo grupo conta com keyloggers ocultos, capazes de registrar todas as teclas digitadas, mesmo que o usuário não finalize o processo. As informações são transmitidas em tempo real para os servidores dos atacantes, potencializando o roubo de credenciais e comprometendo ainda mais as contas das vítimas.

Um aspecto que chamou atenção dos analistas foi o uso de convites falsos do Google Meet, hospedados no próprio serviço Google Sites, o que dá uma aparência ainda mais legítima às páginas maliciosas. Ao clicarem nas imagens desses convites, as vítimas são redirecionadas a sites sob o controle dos atacantes.

Infraestrutura Robusta e Expansão da Campanha

A infraestrutura da Educated Manticore é ampla e bem estruturada. Desde janeiro de 2025, o grupo registrou mais de 130 domínios diferentes — muitos relacionados a temas como tecnologia, comunicação e educação —, utilizados para hospedar as páginas de phishing e gerenciar as operações clandestinas. A maioria desses domínios foi registrada através do provedor NameCheap.

Os especialistas também identificaram uma sobreposição significativa com outra célula de operações, conhecida como GreenCharlie, o que sugere uma possível ramificação ou subgrupo da Educated Manticore atuando de forma coordenada.

Entre os domínios maliciosos monitorados estão sendly-ink[.]shop, idea-home[.]online, live-meet[.]info, bestshopu[.]online, entre muitos outros. Além disso, diversos endereços IP associados à operação foram mapeados, fortalecendo as evidências de uma infraestrutura técnica bem organizada.

Ameaça Persistente e Alerta Global

Apesar da crescente exposição e dos esforços da comunidade de segurança cibernética, o Educated Manticore segue atuando com rapidez e agressividade, demonstrando grande capacidade de adaptação e evasão. A campanha atual, ao explorar o contexto geopolítico e acadêmico, representa uma ameaça grave à integridade das instituições israelenses e ao ecossistema global de cibersegurança.

“Esses ataques evidenciam como o ciberespaço se tornou um dos principais campos de batalha no atual conflito Irã-Israel”, alertam os pesquisadores da Check Point. A expectativa é de que o grupo continue investindo em táticas de roubo de identidade e coleta de informações, principalmente de indivíduos envolvidos em ambientes acadêmicos, científicos e tecnológicos estratégicos.

Indicadores de Comprometimento (IOCs)

A Check Point Research divulgou uma lista de domínios e endereços IP associados à infraestrutura maliciosa do Educated Manticore. Profissionais e empresas de tecnologia são fortemente aconselhados a implementar medidas de monitoramento e bloqueio desses indicadores em suas redes.

Entre os principais IOCs identificados estão:

Endereços IP:

  • 185.130.226[.]71

  • 45.12.2[.]158

  • 45.143.166[.]230

  • 91.222.173[.]141

  • 194.11.226[.]9

Domínios Notórios:

  • sendly-ink[.]shop

  • idea-home[.]online

  • live-meet[.]info

  • bestshopu[.]online

  • live-message[.]online

A lista completa de domínios e IPs está disponível no relatório técnico da Check Point.

Conclusão

O caso do Educated Manticore reforça o papel crítico da cibersegurança no cenário geopolítico atual. A sofisticação técnica, combinada a uma estratégia agressiva de engenharia social, demonstra que grupos apoiados por Estados seguem explorando vulnerabilidades humanas e tecnológicas para alcançar seus objetivos de espionagem.

Especialistas recomendam vigilância redobrada, treinamentos contínuos de conscientização e o uso de autenticação forte e verificada, especialmente entre profissionais que atuam em áreas sensíveis de tecnologia e pesquisa.

❌