<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Iran — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/iran/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 23 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/iran/feed.xml" rel="self" type="application/rss+xml"/><item><title>TeamPCP's CanisterWorm Kubernetes Wiper Targeting Iran</title><link>https://feed.craftedsignal.io/briefs/2026-03-canisterworm-kubernetes-wiper/</link><pubDate>Mon, 23 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-canisterworm-kubernetes-wiper/</guid><description>TeamPCP's CanisterWorm is a newly identified Kubernetes wiper targeting Iranian infrastructure, indicating a politically motivated destructive attack.</description><content:encoded><![CDATA[<p>TeamPCP has deployed a Kubernetes wiper named CanisterWorm, specifically targeting Iranian infrastructure. This destructive malware is designed to obliterate data within Kubernetes environments. The wiper&rsquo;s emergence in March 2026 signals a heightened level of cyber aggression, particularly given the geopolitical context. Defenders need to be aware of the potential for significant operational disruption and data loss. The targeting of Kubernetes environments reflects a sophisticated understanding of modern infrastructure and the increasing reliance on containerization technologies. This campaign requires immediate attention and proactive security measures to mitigate the risk of successful attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a node within the Kubernetes cluster, possibly via exploiting a known vulnerability or through compromised credentials.</li>
<li>CanisterWorm gains elevated privileges within the compromised node, potentially using techniques such as privilege escalation exploits.</li>
<li>Discovery of other nodes and resources within the Kubernetes cluster through reconnaissance activities, leveraging the Kubernetes API.</li>
<li>Lateral movement to other nodes using stolen credentials or by exploiting trust relationships between nodes.</li>
<li>Execution of CanisterWorm on each targeted node, initiating the data wiping process.</li>
<li>Overwriting critical system files and data volumes within the containers and pods.</li>
<li>Corruption of Kubernetes configuration files, leading to instability and potential cluster failure.</li>
<li>Final stage involves the complete destruction of data within the Kubernetes environment, rendering the affected systems unusable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful deployment of CanisterWorm results in widespread data loss and service disruption within the targeted Kubernetes environments. This can lead to significant financial losses, reputational damage, and operational downtime. Given the targeting of Iranian infrastructure, this attack has the potential to impact critical services and government operations. The complete destruction of data necessitates extensive recovery efforts and may result in permanent data loss if backups are not available or are also compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Kubernetes API server logs for suspicious activity, particularly attempts to list or access sensitive resources to detect reconnaissance (reference: Attack Chain step 3).</li>
<li>Implement network segmentation and strict access controls within the Kubernetes cluster to limit lateral movement (reference: Attack Chain step 4).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Kubernetes Pod Deletion</code> to identify potential wipe attempts.</li>
<li>Review and harden Kubernetes security configurations, including RBAC (Role-Based Access Control) policies, to prevent unauthorized access (reference: Attack Chain step 2).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>kubernetes</category><category>wiper</category><category>iran</category><category>canisterworm</category><category>teampcp</category><category>destructive-attack</category></item><item><title>Iranian Botnet Operation Exposed via Open Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-iranian-botnet/</link><pubDate>Tue, 17 Mar 2026 19:15:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-iranian-botnet/</guid><description>An Iranian botnet operation utilizing a 15-node relay network and active C2 infrastructure was exposed through an open directory.</description><content:encoded><![CDATA[<p>A blog post on hunt.io details an Iranian botnet operation discovered through an open directory. The operation involves a 15-node relay network, suggesting a focus on obfuscation and resilience. The existence of an active Command and Control (C2) infrastructure indicates ongoing malicious activity. The exposure of these details allows defenders to gain insights into the botnet&rsquo;s architecture and potentially disrupt its operations. While the specific targeting and malware used remain unclear from this report, the network structure points to a potentially sophisticated actor capable of conducting sustained campaigns. Understanding the C2 communication patterns and relay node infrastructure is crucial for effective defense.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Compromise: Systems are compromised through an unknown initial access vector.</li>
<li>Bot Installation: A bot payload is installed on the compromised systems.</li>
<li>C2 Communication: The bots establish communication with the C2 server to receive commands.</li>
<li>Relay Network Activation: Bots connect to one another creating the 15-node relay network.</li>
<li>Command Execution: The C2 server issues commands to the bots through the relay network.</li>
<li>Malicious Activity: Bots execute malicious commands, the specific actions are currently unknown.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of this botnet is currently unknown due to limited information, but botnets are commonly used for DDoS attacks, spam campaigns, or credential stuffing. If the botnet successfully conducts its objectives it could lead to service disruptions, data breaches, or further compromise of systems within targeted networks. The Iranian origin suggests potential geopolitical motivations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to the domain <code>hunt.io</code> as it is related to the botnet operation ([IOC: hunt.io]).</li>
<li>Implement a network connection rule to detect unusual network connections that could indicate the C2 activity or relay network behavior.</li>
<li>Investigate any systems that show signs of unusual network activity or communication with external domains.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>botnet</category><category>iran</category><category>C2</category></item></channel></rss>