LmCast :: Stay tuned in

Inside Iran's Cyber Objectives: What Do They Want?

Recorded: Nov. 21, 2025, 6:02 a.m.

Original Summarized

Iran's Cyber Objectives: What Do They Want? TechTarget and Informa Tech’s Digital Business Combine.TechTarget and InformaTechTarget and Informa Tech’s Digital Business Combine.Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.Dark Reading Resource LibraryBlack Hat NewsOmdia CybersecurityAdvertiseNewsletter Sign-UpNewsletter Sign-UpCybersecurity TopicsRelated TopicsApplication SecurityCybersecurity CareersCloud SecurityCyber RiskCyberattacks & Data BreachesCybersecurity AnalyticsCybersecurity OperationsData PrivacyEndpoint SecurityICS/OT SecurityIdentity & Access Mgmt SecurityInsider ThreatsIoTMobile SecurityPerimeterPhysical SecurityRemote WorkforceThreat IntelligenceVulnerabilities & ThreatsRecent in Cybersecurity TopicsEndpoint SecurityChinese APT Infects Routers to Hijack Software UpdatesChinese APT Infects Routers to Hijack Software UpdatesbyNate Nelson, Contributing WriterNov 20, 20253 Min ReadThreat Intelligence'Matrix Push' C2 Tool Hijacks Browser Notifications'Matrix Push' C2 Tool Hijacks Browser NotificationsbyNate Nelson, Contributing WriterNov 20, 20254 Min ReadWorld Related TopicsDR GlobalMiddle East & AfricaAsia PacificRecent in World See AllEndpoint SecurityChinese APT Infects Routers to Hijack Software UpdatesChinese APT Infects Routers to Hijack Software UpdatesbyNate Nelson, Contributing WriterNov 20, 20253 Min ReadCyberattacks & Data BreachesCoyote, Maverick Banking Trojans Run Rampant in BrazilCoyote, Maverick Banking Trojans Run Rampant in BrazilbyAlexander CulafiNov 13, 20254 Min ReadThe EdgeDR TechnologyEventsRelated TopicsUpcoming EventsPodcastsWebinarsSEE ALLResourcesRelated TopicsResource LibraryNewslettersPodcastsReportsVideosWebinarsWhite Papers Partner PerspectivesDark Reading Resource LibraryCybersecurity OperationsVulnerabilities & ThreatsEndpoint SecurityThreat IntelligenceNewsBreaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa and the Asia PacificInside Iran's Cyber Objectives: What Do They Want?The regime's cyber-espionage strategy employs dual-use targeting, collecting info that can support both military needs and broader political objectives.Alexander Culafi, Senior News Writer, Dark ReadingNovember 21, 20253 Min ReadSource: Zoonar GmbH via Alamy Stock PhotoExperts say that, as a nation-state, Iran aims to take advantage of targets that can further its military and political goals simultaneously. What that looks like in practice, however, changes over time.Iran has had a busy 2025, as far as its offensive cyber activities are concerned. Just this week, Google Cloud's Mandiant reported that the Iran-nexus group UNC1549 was targeting aerospace and defense organizations for espionage-related purposes. But in addition to typical nation-state fare, Iran was particularly focused on its conflict with Israel in June, as well as the war in Gaza. And due to the US getting involved in the former conflict (President Donald Trump targeted three Iranian nuclear facilities in "Operation Midnight Hammer") and Iran's vow to respond, the US Department of Homeland Security (DHS) warned in June the US adversary could target domestic networks. On top of that, Iran is known for everything from election interference to ransomware, other malware, and various forms of hacktivism. As for what Iran wants now, experts cite a variety of motivations, from intelligence to bolstering its military to gaining initial access. What Does Iran Want?In the case of espionage actor UNC1549, Google first observed them targeting Israel a year and a half ago before expanding that to more activity in countries like the US, Spain, United Arab Emirates, Israel, Saudi Arabia, and Qatar. The group historically uses spear phishing and social engineering to gain entry, pulling intelligence related to political and military objectives, and positioning itself for follow-on attacks against other strategic targets in industries such as aerospace and defense. Related:Do National Data Laws Carry Cyber-Risks for Large Orgs?But rather than the destructive cyberattacks one might see Russia using against Ukraine's critical infrastructure, UNC1549 appears most interested in grabbing all the data it can while avoiding the consequences associated with kinetic military action. Adam Meyers, head of CrowdStrike's counter adversary operations, says the threat actor's behavior (which CrowdStrike tracks as "Imperial Kitten") is "classic Iranian tradecraft.""As geopolitical tensions rise, for example concerns around snap-back sanctions potentially being activated by European power, Iran-nexus actors like Imperial Kitten will remain highly active — using cyber operations to project influence well beyond their borders," he says.As for the country's cyber strategy as a whole, Jeremy Makowski, senior security researcher at Rapid7, says Iran's aims are largely shaped by "its need to counter more vigorous, technologically advanced opponents while preserving plausible deniability."Related:Kenya Kicks Off 'Code Nation' With a Nod to Cybersecurity"Iran remains focused on positioning itself for future leverage, so the goal is to quietly maintain long-term access to networks and steal data over time," he tells Dark Reading. "A hallmark of its doctrine is dual use targeting, which involves collecting information that can support both military needs and the broader political objectives of the regime."But beyond espionage, that can include stealing proprietary military intellectual property, as shown with UNC1549, which experts say aligns with the goals of the Iranian Revolutionary Guard Corps (IRGC). Iran targets aerospace organizations, Makowski says, in part because "it can significantly speed up progress in areas where Tehran struggles to legally obtain advanced technology." But beyond military use, spying on aerospace companies also enables Iran to identify restricted components and gain intel, enabling it to establish a covert supply chain and circumvent sanctions. Iran Remains Focused on Israel, USEarlier this month, ESET published a report tracking APTs tied to four major US cyber adversaries: China, Russia, North Korea, and Iran. The report showed that beyond the aforementioned nations, Iran similarly targeted a slate of other countries including Greece, Egypt, Nigeria, Armenia, Azerbaijan, and Cyprus. Related:China Imposes One-Hour Reporting Rule for Major Cyber IncidentsIran also targets a wide range of sectors such as manufacturing, government, education, financial services, and more. But despite Iran long asserting itself as a kind of global cyber power, ESET Research tells Dark Reading in an email that Israel remains Iran's number one priority. "The Israeli and then US air strikes this summer have significantly weakened the regime, both militarily and politically, and it is likely that Iranian authorities are now more nervous than they have been in a long time," the team says. "In this context, Iranian cyber actors are probably redoubling their efforts against internal opposition, foreign infiltration, and subversion, while also trying to gain visibility into what their adversaries are planning next."Read more about:DR Global Middle East & AfricaAbout the AuthorAlexander CulafiSenior News Writer, Dark ReadingAlex is an award-winning writer, journalist, and podcast host based in Boston. After cutting his teeth writing for independent gaming publications as a teenager, he graduated from Emerson College in 2016 with a Bachelor of Science in journalism. He has previously been published on VentureFizz, Search Security, Nintendo World Report, and elsewhere. In his spare time, Alex hosts the weekly Nintendo podcast Talk Nintendo Podcast and works on personal writing projects, including two previously self-published science fiction novels.See more from Alexander CulafiMore InsightsIndustry Reports2025 State of Threat Intelligence: What it means for your cybersecurity strategyState of AI and Automation in Threat IntelligenceGartner Innovation Insight: AI SOC AgentsGuide to Network Analysis Visibility SolutionsOrganizations Require a New Approach to Handle Investigation and Response in the CloudAccess More ResearchWebinarsIdentity Security in the Agentic AI EraHow AI & Autonomous Patching Eliminate Exposure RisksSecuring the Hybrid Workforce: Challenges and SolutionsCybersecurity Outlook 2026Threat Hunting Tools & Techniques for Staying Ahead of Cyber AdversariesMore WebinarsYou May Also LikeEditor's ChoiceCybersecurity OperationsDo National Data Laws Carry Cyber-Risks for Large Orgs?Do National Data Laws Carry Cyber-Risks for Large Orgs?byNate Nelson, Contributing WriterNov 19, 20254 Min ReadKeep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.SubscribeWebinarsIdentity Security in the Agentic AI EraTues, Dec 9, 2025 at 1pm ESTHow AI & Autonomous Patching Eliminate Exposure RisksOn-DemandSecuring the Hybrid Workforce: Challenges and SolutionsTues, Nov 4, 2025 at 1pm ESTCybersecurity Outlook 2026Virtual Event | December 3rd, 2025 | 11:00am - 5:20pm ET | Doors Open at 10:30am ETThreat Hunting Tools & Techniques for Staying Ahead of Cyber AdversariesTuesday, Oct 21, 2025 at 1pm ESTMore WebinarsWhite PapersMissing 88% of Exploits: Rethinking KEV in the AI EraThe Straightforward Buyer's Guide to EDRThe True Cost of a Cyberattack - 2025 EditionHow to be a Better Threat HunterFrom the C-Suite to the SOC: Consolidating the Network Security SolutionsExplore More White PapersDiscover MoreBlack HatOmdiaWorking With UsAbout UsAdvertiseReprintsJoin UsNewsletter Sign-UpFollow UsCopyright © 2025 TechTarget, Inc. d/b/a Informa TechTarget. This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466.Home|Cookie Policy|Privacy|Terms of Use

Iran’s cyber objectives are multifaceted, driven by a dual-use strategy designed to simultaneously bolster military capabilities and advance broader political ambitions. As outlined by sources including Adam Meyers of CrowdStrike and Jeremy Makowski of Rapid7, the regime’s approach is fundamentally shaped by a need to counter technologically superior adversaries while maintaining plausible deniability. This manifests in a highly active cyber espionage program targeting countries across the Middle East, Africa, and Europe, with Israel being a primary strategic focus.

The regime’s operational tactics, exemplified by the UNC1549 actor, prioritize intelligence gathering through activities like spear phishing and social engineering, targeting aerospace and defense organizations. This collection of information serves dual purposes: directly supporting military projects, such as accelerating the acquisition of restricted technology, and providing insights crucial for political objectives. Notably, the IRGC, Iran’s military intelligence arm, is heavily involved in these operations. The motivations are not simply destructive; Iran seeks to passively maintain long-term access to networks and steal data incrementally, a strategy aimed at preserving operational advantage over time.

Recent activity, particularly following the June 2025 US response to Iranian attacks, underscores a heightened state of alert. The targeting of Greece, Egypt, Nigeria, Armenia, Azerbaijan, and Cyprus reflects a broader expansion of Iranian cyber operations, partly fueled by a perceived increase in vulnerability following US military actions against Iranian facilities. The heightened focus on Israel highlights a strategic urgency, driven by the acknowledged weakening of the Iranian regime following the summer air strikes. This urgency appears to be manifested in intensified efforts to gather intelligence on Israeli military planning and capabilities.

Furthermore, Iran’s cyber strategy isn’t solely reliant on direct espionage. The pursuit of aerospace technology, for instance, allows Iran to circumvent sanctions by establishing covert supply chains. The regime’s emphasis on obtaining initial access to networks and stealing data represents a core tenet of its operational doctrine. The targeting of critical infrastructure is not always aimed at causing disruption but rather at gaining access to valuable data or technical specifications. The observed shift toward expanding its scope of operations, encompassing sectors like manufacturing, government, education, and financial services, indicates a concerted effort to broaden its intelligence collection and operational footprint. The actions of actors like UNC1549 demonstrate their ability to adapt and exploit vulnerabilities across diverse targets.