Investigating Iranian Intrusion into Strategic Middle East Critical Infrastructure
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
This report details a prolonged Iranian state-sponsored intrusion into critical national infrastructure in the Middle East from May 2023 to February 2025. The threat actors employed various tactics including web shells, custom malware, and legitimate tools to maintain persistent access across multiple network segments. Key findings include the use of novel malware families like HanifNet and NeoExpressRAT, as well as extensive credential harvesting and lateral movement techniques. The intrusion demonstrated sophisticated evasion capabilities and targeted attempts to access operational technology networks. Forensic analysis revealed potential links to previously reported Iranian APT campaigns. The report provides detailed technical indicators and recommends enhanced logging, EDR deployment, and multi-factor authentication to defend against similar threats.
OPENCTI LABELS :
apt,lateral movement,critical infrastructure,systembc,credential harvesting,havoc,custom malware,web shells,credinterceptor,cve-2023-38950,remoteinjector,hxlibrary,cve-2023-38951,hanifnet,cve-2023-38952,proxy chaining,neoexpressrat
Open in NetmanageIT OpenCTI Public Instance with below link!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
Investigating Iranian Intrusion into Strategic Middle East Critical Infrastructure