Cyberwarfare / Nation-State Attacks,
Fraud Management & Cybercrime
Iranian Cyberespionage Group MuddyWater Goes Dark

As the U.S. and Israeli bombing campaign against Iran continues, the repercussions are felt not only on military fronts but also in the realm of technology and infrastructure. On the fourth day of sustained aerial strikes, connectivity issues have emerged in the Middle East, primarily triggered by physical damage rather than cyber attacks. This highlights the increasing intertwining of military actions and technological vulnerabilities.
Data center behemoth Amazon reported on Tuesday that its regional Amazon Web Services (AWS) facilities were affected by drone attacks. The company urged customers with operations in the Middle East to migrate their workloads to other AWS regions immediately. The situation underscores how reel-time military activities can directly threaten cloud infrastructure, demonstrating the fragility of digital services amid kinetic actions.
American and Israeli forces are currently targeting multiple sites across Iran. In retaliation, Iran has escalated its own military operations, launching an array of drone and missile strikes aimed at U.S. military installations as well as British bases located in Bahrain and Cyprus. Additionally, Iranian forces are targeting both military and civilian sites across several Middle Eastern countries hosting U.S. bases, including Bahrain, Iraq, Jordan, Kuwait, Oman, Qatar, and the United Arab Emirates.
Amazon’s assessments revealed that two of its facilities in the United Arab Emirates were struck directly, while a nearby drone attack in Bahrain caused disruptions to another of its facilities. The damage was significant, impacting infrastructure integrity, disrupting power delivery, and necessitating fire suppression measures which in turn caused additional water-related damage. These events serve to illustrate how physical actions can result in immediate and far-reaching implications for cloud service availability, echoing concerns raised by cyber threat intelligence firm Kela.
The cyber landscape, however, appears to be relatively quiet in terms of Iranian state-aligned cyber activities. Analysts noted that the normally active Iranian cyberespionage group, MuddyWater, has gone dark. Flashpoint, a threat intelligence firm, pointed out that this may stem from individual hackers prioritizing their own safety amid military operations. Kathryn Raines, a senior threat intelligence analyst, noted that the individuals who usually carry out cyber operations are likely seeking shelter from airstrikes, which complicates traditional models of cyberwarfare.
As of now, Iranian hackers—or their proxies—have not launched significant destructive campaigns that would shift the outcome of the ongoing conflict. Alexander Leslie, a senior adviser at Recorded Future, emphasized the seemingly muted cyber retaliation from Iran, indicating a defensive posture rather than an offensive one. He cautioned that the situation remains fluid, and intelligence could evolve rapidly, potentially leading to sudden changes in the cyber landscape.
Interestingly, even though MuddyWater has been largely inactive, there have been reports of extensive attack activity linked to its infrastructure prior to the current military conflict. Researchers from threat intelligence firm Ctrl-Alt-Int3l uncovered evidence indicating that the infrastructure associated with MuddyWater had engaged in mass scanning for vulnerabilities in the weeks leading to escalating tensions. This included targeting various organizations, such as Clearview AI, which specializes in facial recognition software, the Jewish Agency of Israel, and an array of other commercial and governmental entities.
Analysts noted that while the nation-state threat from Iranian cyber actors appears subdued, activity related to pro-Iranian proxies has ramped up. According to Kela, these groups have demonstrated a tendency towards disruptive hacktivism and narrative-driven operations rather than strategic intrusions, including web defacements and denial-of-service attacks.
In a concerning development, a coalition of pro-Iranian hackers claimed responsibility for infiltrating the CCTV systems of a major Israeli health insurance company. Concurrently, hackers identifying as part of an “Iraq’s Resistance Hub” have conducted SQL injection attacks against diverse targets, showcasing a broad range of focus areas that extend well beyond the immediate geopolitical conflict.
The global community remains on high alert as the United States and United Kingdom cybersecurity agencies urge domestic organizations, particularly those with operational technological frameworks, to reinforce their defensive posture. Brett Leatherman, an FBI Cyber Division official, highlighted that Iranian cyber actors—both state-aligned and those aligned with hacktivist motives—tend to exploit straightforward vulnerabilities within critical environments
As this multi-dimensional conflict unfolds, the intersection of traditional military operations and cyber capabilities brings about new challenges, requiring vigilant monitoring and a proactive approach to cybersecurity in an increasingly interconnected world.