Cumulative Threat Intelligence Report

Overview of Cyber Threat Activity
Associated with Iran

Client: IR | Period: Oct 1, 2025 — Mar 24, 2026 | Duration: 6 Months | Generated: March 25, 2026 TLP:AMBER CONFIDENTIAL
For executive distribution only
Executive Overview
Key performance indicators across the full 6-month observation window.
16,564
Total Alerts
6-month cumulative
📈
7,483
Peak Monthly Volume
November 2025
🕵
314
Peak Unique Attackers
February 2026
🌐
12+
Attacker Countries
Origin geolocations
📊 Cumulative Alert Types
Alert Category Count Share
Baithive URL — never seen before4,946
Baithive Payload — never seen before4,178
Aggressive Attack Against Trap2,938
Baithive payload — never seen before2,720
Attacker IP unknown to 3rd-party TI1,583
Fuzzing attack101
Country-specific targeted attack74
Hidden Client IP Detected16
Injected OOB Callback Domain6
Other2
🌐 Top Attack Origins (Cumulative)
Country Alerts Share
🇩🇪 Germany8,101
🇰🇪 Kenya3,302
🇸🇷 Serbia1,235
🇨🇳 China282
🇺🇸 United States197
🇿🇦 South Africa123
🇨🇿 Czech Republic84
🇬🇧 United Kingdom63
🇯🇵 Japan37
Other (5 countries)78

Campaign Narrative
Chronological analysis of threat actor behavior across the observation period.
Oct – Nov 2025  ·  Phase I
Initial Escalation
Beginning in October 2025, a distributed Iran-nexus threat activity cluster initiated a coordinated campaign targeting enterprise VPN and gateway infrastructure. The dominant vector was high-volume credential stuffing against Cisco ASA SSL-VPN endpoints, executed by six IPs within the Farahoosh Dena /24 subnet (176.46.158.x) using a shared static CSRF token (516cfbe7ebdc7b1aeb85c07863b5fc34e9ec7672) as a unifying operational signature. Credential complexity escalated systematically from trivial sequences through policy-compliant variants, reflecting a structured multi-pass spraying methodology. Late October saw a sustained surge from 50 to 544 daily alerts, signaling deliberate campaign intensification. By November, the same Farahoosh Dena infrastructure generated approximately 4,696 combined alerts, while a parallel FortiGate credential-stuffing campaign emerged from Romanian-attributed FEO PREST SRL infrastructure (62.60.135.x), deploying harvested South African corporate credentials—indicating active breach-data marketization and multi-vendor VPN targeting.
Credential Stuffing Cisco ASA SSL-VPN FortiGate Farahoosh Dena /24 FEO PREST SRL
December 2025  ·  Phase II
Operational Bifurcation & Tactical Maturation
December 2025 marked a strategic inflection point as the campaign transitioned from concentrated, single-vector credential stuffing to a bifurcated operational model. The FEO PREST SRL precision layer (62.60.135.x) evolved to deploy credentials referencing named individuals at specific organizations—SQM mining conglomerate, Altus-branded entities, GPS-coded employer accounts—signalling a shift from opportunistic dictionary attacks to precision targeting using harvested breach data. Simultaneously, a distributed Iranian domestic scanning tier expanded across six state-linked ISPs, introducing CDN-laundering techniques via the Noyan Abr Arvan Iranian cloud provider to conceal true origin IPs traced to MTN Irancell. Novel capabilities included cloud/DevOps secrets harvesting (.env, AWS credentials, Laravel logs), HP LaserJet MFP management interface targeting, and country-specific fuzzing of Chinese infrastructure.
Named-individual credentials CDN laundering Secrets harvesting Noyan Abr Arvan IoT targeting
January 2026  ·  Phase III
Tactical Consolidation & Reduced Tempo
January 2026 showed a notable reduction in overall alert volume (160 alerts versus prior baselines) while maintaining the bifurcated infrastructure model. FEO PREST (62.60.131.73) pivoted to exclusive Kenya-focused targeting, while the Iranian domestic cluster sustained broad geographic opportunism across Serbia, China, Japan, and the Middle East. Episodic burst activity—peaks on January 4–5, 16, and 25–28—separated by multi-day dormancy indicated coordinated campaign phases rather than continuous scanning. A novel baithive request containing structured JSON-like fragments from CGI GLOBAL LIMITED (94.183.188.135) suggested active experimentation with new payload vectors. The 42.5% prevalence of unknown-to-threat-intel IPs confirmed sustained infrastructure rotation discipline, consistent with a deliberate operational pause or reconfiguration period.
Reduced tempo Kenya-exclusive targeting Novel JSON payload vector IP rotation
February 2026  ·  Phase IV  ⚡ PEAK ESCALATION
Major Escalation & Active Exploitation Confirmed
February 2026 represented the most significant escalation of the campaign period, with alert volume nearly quadrupling to 605 alerts. China emerged as the dominant external target geography (104 alerts). The deployment of out-of-band (OOB) callback exploitation using the shared domain produce.seetong.com across two FEO PREST nodes confirmed active exploitation maturity beyond reconnaissance, validating server-side RCE and SSRF chains. A shared PHPUnit CVE-2017-9841 exploit framework was distributed across 12+ distinct ISPs with near-identical URL sequences, demonstrating coordinated playbook distribution within an affiliate network. A compromised academic resource—Tehran University of Medical Science (194.225.213.122)—appeared as an attack source. Peak activity concentrated on February 21–22 (205 combined alerts within 48 hours)—the highest two-day intensity across the entire observation period.
OOB RCE exploitation PHPUnit CVE-2017-9841 produce.seetong.com C2 China primary target Compromised institution
Mar 2026 (through 24th)  ·  Phase V
Residual Activity & Attribution Complexity
March 2026 recorded minimal activity—only two alerts—from a single IP (213.176.18.65, E-Large HongKong) exclusively targeting Chinese infrastructure via PHPUnit CVE-2017-9841 path enumeration. While operationally distinct from the Iran-nexus cluster in infrastructure and volume, the China-exclusive geographic focus and shared PHPUnit exploit framework echo techniques observed across multiple prior months. The sharp contrast with February's intensity may indicate a deliberate operational pause, detection-driven withdrawal, or transition to a new infrastructure generation cycle consistent with the rotation discipline documented throughout the campaign.
Minimal activity PHPUnit persistence Potential infrastructure rotation


Geographic Attack Origin
Cumulative alert volume mapped by attributed source country across the 6-month period.
🌐 Cumulative Attack Origin Map
Note: geolocation reflects routing infrastructure, not necessarily operator location

Persistent Threat Actors
Infrastructure nodes observed across multiple months with sustained or escalating activity patterns.
IP / Infrastructure Active Period Est. Alerts Primary Vector Classification
176.46.158.x /24 (6 IPs)
Farahoosh Dena
Oct – Nov 2025 ~6,000+ Cisco ASA SSL-VPN credential stuffing with shared static CSRF token; structured multi-IP load-balancing High-Volume Credential Ops
62.60.135.x /24 (FEO PREST SRL) Nov 2025 – Feb 2026 ~5,500+ FortiGate SSL-VPN credential stuffing with harvested breach data; OOB RCE callbacks; secrets harvesting Precision Credential Ops
62.60.131.73 (FEO PREST) Jan – Feb 2026 ~106 Country-specific fuzzing (Kenya, China); .env/AWS harvesting; OOB exploitation via produce.seetong.com Active Exploitation
62.60.131.x /24 (FEO PREST SRL) Dec 2025 – Feb 2026 ~1,500+ Volumetric aggressive trap engagement; parallel layer to precision credential nodes Volumetric Probe Layer
185.164.254.28
Atrin ICT
Feb 2026 ~90 Sustained automated trap hammering; high-frequency brute-force persistence Persistent Trap Actor
185.129.202.216
Pishgaman
Jan – Feb 2026 ~42 Aggressive trap attacks; sustained honeypot engagement across two months Recurring Scanner
80.191.240.34 / 80.191.92.193
Telecom Infrastructure Co.
Oct 2025 – Feb 2026 ~65+ Aggressive probing across honeypot infrastructure; state-linked ISP sourcing State-Linked Probe Node
37.255.224.137 (TCE) Oct – Nov 2025 ~35+ Aggressive trap engagement; highest single-IP trap volume in October dataset Scanning Node
194.225.213.122
Tehran Univ. of Medical Science
Feb 2026 ~5 Compromised academic institutional pivot point used as attack source Compromised Institution
213.176.18.65
E-Large HongKong
Mar 2026 ~2 PHPUnit CVE-2017-9841 path enumeration exclusively targeting Chinese infrastructure Low-Profile Probe

Threat Vector Evolution
Analysis of attack methodologies and capability progression throughout the campaign.
Enterprise VPN Credential Stuffing
The dominant and most sustained vector (Oct 2025 – Feb 2026) targeting Cisco ASA (/+webvpn+/index.html, /+CSCOE+/logon.html) and Fortinet FortiGate (POST /logincheck). Credential complexity escalated month-over-month: generic defaults in October → leet-substitution variants in November → named-individual harvested credentials referencing specific organizations (SQM, Altus, GPS-coded accounts) by December → timestamped variants (fortigate2025, ranj@2026, sqm2025!) confirming real-time corpus maintenance by February. The shared static CSRF token (516cfbe7...e7672) served as a stable operational fingerprint across all IP rotations.
Web Application Exploitation — PHPUnit CVE-2017-9841
A shared PHPUnit remote code execution exploit framework emerged as a cross-ISP distributed capability by February 2026, deployed across 12+ distinct IPs spanning Sefroyek Pardaz Engineering, Varesh Cloud, Respina Networks, and others. Near-identical five-path URL sequences (/vendor/phpunit/, /lib/phpunit/, /phpunit/, /zend/vendor/) across all nodes confirm shared playbook distribution within a coordinated affiliate network. Persisted into March 2026 via E-Large HongKong infrastructure. Enables unauthenticated RCE on production PHP environments shipping PHPUnit as a dev dependency.
Cloud & DevOps Secrets Harvesting
Systematic enumeration of cloud credential exposure vectors (Nov 2025 – Feb 2026). Targeted paths: .env variants (including path-traversal encoded /%2e%2e%2f.env), /.aws/credentials, /storage/laravel.log, /helm/.env, /s3.js, /s3_config.json, /settings.py, /application.properties. Kubernetes/Helm path targeting demonstrates familiarity with containerized infrastructure attack surfaces and supply chain exposure points. Mission set consistent with initial access brokering or cloud account takeover.
Out-of-Band (OOB) Callback Exploitation
Active exploitation capability confirmed in February 2026 through OOB callback injection using the shared domain produce.seetong.com across two FEO PREST nodes (62.60.131.73 and 62.60.131.43). This technique validates server-side code execution for SSRF, RCE, and injection chain exploitation, representing a qualitative escalation from credential harvesting to confirmed active exploitation with exfiltration confirmation infrastructure. Shared OOB domain across two distinct IPs confirms operator-level infrastructure centralization.
CDN-Based IP Laundering & Attribution Obfuscation
Emerged December 2025 via Noyan Abr Arvan Iranian cloud/CDN provider. Three IPs (94.101.182.11, 37.32.19.4, 94.101.182.13) routed attack traffic concealing true origin addresses behind X-Forwarded-For manipulation and Akamai egress nodes. True origin IP 5.122.196.21 traced to MTN Irancell. Absent from October–November activity—represents deliberate evasion capability uplift, indicating the actor monitors IP reputation systems and deploys countermeasures in response.
IoT & Embedded Device Targeting
Tertiary capability active across multiple months. October 2025: IP 178.173.218.62 (Shiraz Hamyar Co.) exploited Netgear router RCE (setup.cgi?todo=syscmd) to deploy Mozi botnet malware. November–December: systematic HP LaserJet MFP management interface targeting (/set_config_netIdentification.html, /cgi-bin/netset.cgi), with DNS hijacking payload (hardcoded 95.x.x.x DNS server) submitted against printer administration endpoints. HP LaserJet M426D model-specific awareness indicates dedicated IoT exploitation module use.

Recommendations
Prioritized defensive actions derived from threat intelligence observations across the 6-month period.
■ Critical
Deploy behavioral MFA enforcement and adaptive lockout on all SSL-VPN endpoints, with rate-limiting per /24 subnet
Six-IP Farahoosh Dena subnet and four-IP FEO PREST subnet each coordinated credential stuffing across subnet-adjacent nodes specifically to circumvent per-IP rate limiting. Static CSRF token reuse confirms single-tool coordination across distributed egress.
■ Critical
Immediately audit and remediate all internet-facing PHP applications for exposed PHPUnit installations (CVE-2017-9841)
PHPUnit exploit framework distributed across 12+ distinct ISP-sourced IPs in February 2026 with identical URL sequences, persisting into March 2026. Enables unauthenticated RCE. Enforce composer --no-dev build pipelines and deploy WAF rules blocking eval-stdin.php path variants.
■ Critical
Conduct immediate credential breach assessment using observed organizational identifiers (SQM, Altus, GPS-coded, compass*kzn/jhb)
December 2025 FEO PREST campaign deployed credentials referencing named individuals at specific organizations with timestamped variants, confirming use of real-time maintained breach data. Implement breach-password screening (e.g., HaveIBeenPwned API) in authentication workflows.
■ High
Enumerate and protect all cloud credential and secrets exposure vectors across web roots and CI/CD pipelines
Systematic secrets harvesting across .env, /.aws/credentials, /helm/.env, /storage/laravel.log paths conducted by FEO PREST and CGI GLOBAL LIMITED nodes from November 2025 through February 2026.
■ High
Block OOB callback infrastructure: sinkhole produce.seetong.com and deploy SSRF protection on all server-side HTTP request handlers
OOB callback domain confirmed active in February 2026 across two FEO PREST nodes for RCE/SSRF chain validation, representing confirmed active exploitation with centralized C2 infrastructure.
■ High
Audit and harden all internet-exposed printer and IoT device management interfaces; segment IoT infrastructure
Mozi botnet deployment via Netgear RCE in October 2025, followed by HP LaserJet MFP targeting with DNS hijacking payloads across November–December 2025, indicating persistent IoT exploitation capability with network pivot potential.
■ High
Implement X-Forwarded-For validation and CDN origin IP verification to counter Iranian cloud/CDN laundering techniques
December 2025 Noyan Abr Arvan CDN laundering concealed MTN Irancell true origin IPs, rendering IP-based blocking ineffective without header chain analysis.
■ Medium
Deploy subnet-level and ASN-level blocking for confirmed persistent attack infrastructure (FEO PREST, Farahoosh Dena, Atrin ICT)
FEO PREST /24 subnets active across four consecutive months. Farahoosh Dena /24 sustained across two months. Supplement with behavioral detection (static CSRF token reuse, credential corpus fingerprinting) to persist through IP rotation.
■ Medium
Treat all traffic from Iranian academic and institutional IP ranges as potentially compromised pivot nodes requiring enhanced scrutiny
Tehran University of Medical Science IP appeared as attack source in February 2026—a documented Iranian APT tradecraft pattern for extending operational reach through trusted-appearing sources.
■ Low
Establish continuous TI ingestion monitoring FEO PREST SRL (ASN-level), Farahoosh Dena, and Iranian state ISP address blocks
100% of attacking infrastructure across all six months had zero prior third-party threat intelligence footprint. Proactive ASN-level monitoring and honeypot telemetry integration provides the only reliable early-warning mechanism against this evasion pattern.
01 / Detection Architecture
Transition from IP-based to behavioral detection
The consistent zero-footprint TI status of all attacking IPs across six months confirms that signature-based IP blocklisting is structurally ineffective. Invest in behavioral analytics capable of detecting CSRF token reuse, credential corpus patterns, and PHPUnit exploit path sequences independent of source IP identity.
02 / Identity Security
VPN and remote access hardening as organizational priority
The sustained, multi-month focus on Cisco ASA and Fortinet FortiGate endpoints—with escalating credential sophistication from wordlists to breach data—indicates these represent the adversary's primary initial access objective. Enforce certificate-based or FIDO2 authentication, eliminating password-only authentication entirely.
03 / Breach Intelligence
Establish breach credential monitoring and response capability
The December 2025 observation of credentials referencing named individuals with timestamped variants confirms adversary access to current breach data markets. Implement continuous monitoring against breach repositories and automated forced resets on compromised credential detection.
04 / Cloud Security
Develop CSPM program targeting secrets exposure
Systematic harvesting of .env, AWS credential, and Kubernetes/Helm configuration files across three consecutive months indicates a persistent adversary reconnaissance capability. Mandate secrets scanning in all CI/CD pipelines and enforce IaC policy controls preventing secrets in application web roots.
05 / Geopolitical Context
Integrate geopolitical threat context into SOC workflows
Consistent China-exclusive targeting and Kenya/Serbia targeting patterns indicate geopolitically-tasked operations rather than purely financial motivation. Integrate geopolitical threat intelligence to contextualize attack patterns and anticipate campaign pivots aligned with Iranian foreign policy interests.
06 / Supply Chain
Implement supply chain security controls for PHP environments
The shared PHPUnit CVE-2017-9841 framework distributed across 12+ ISPs with identical URL sequences targets organizations shipping development dependencies in production builds. Enforce composer --no-dev requirements and automated SAST/DAST scanning for exposed development tools.
07 / IoT Hardening
Harden IoT and printer infrastructure against lateral movement
IoT botnet propagation (Mozi), HP LaserJet MFP DNS hijacking, and printer admin interface targeting across four months indicate persistent adversary interest in embedded devices as pivot points. Segment IoT/print into isolated VLANs with no lateral internet access and deploy firmware integrity monitoring.
08 / IR Readiness
Conduct IR readiness assessment focused on Iran-nexus TTPs
OOB callback infrastructure, active exploitation confirmation, and compromised institutional pivot use indicate the adversary has escalated beyond reconnaissance into active exploitation. Validate IR playbooks against documented Iranian APT TTPs and conduct tabletop exercises simulating credential-based VPN compromise with lateral movement.
TLP:AMBER  ·  This report is confidential and intended for executive distribution only.  ·  Period: Oct 1, 2025 – Mar 24, 2026  ·  Generated: March 25, 2026
Client: IR  ·  16,564 alerts  ·  6 months