Israel Claims it ‘Struck’ Iran’s Cyber Warfare Headquarters

Israel Claims it ‘Struck’ Iran’s Cyber Warfare Headquarters

Israel says it struck a Tehran compound hosting Iran’s cyber warfare headquarters, the IRGC and the Intelligence Directorate, but officials have provided few details and the strike’s effect on Tehran’s cyber capabilities remains unclear. Researchers warn pre-positioned APT footholds (MuddyWater, APT42, Prince of Persia, CRESCENTHARVEST), a RedAlert-themed Android phishing campaign and a surge in pro‑Iranian/pro‑Russian hacktivists mean cyber threats persist despite Iran’s degraded connectivity. #IRGC #MuddyWater #APT42 #RedAlert

Keypoints

  • IDF reported bombing a Tehran-area compound housing multiple intelligence and military units including the IRGC and cyber directorates.
  • The actual impact of the strike on Iran’s offensive cyber capability remains unclear and may take weeks or months to assess.
  • A coordinated cyber‑kinetic operation caused an internet blackout (1–4% connectivity), which likely hampered domestically based command-and-control.
  • Pre‑positioned APT footholds (MuddyWater, APT42, Prince of Persia, CRESCENTHARVEST) and a weaponized RedAlert Android campaign indicate persistent latent offensive capabilities.
  • Hacktivist activity surged with groups like NoName057(16) and Cardinal joining pro‑Iranian campaigns, creating sustained indirect risks even if state operations are temporarily degraded.

Read More: https://thecyberexpress.com/israel-hit-iran-cyber-warfare-headquarters/