You're offline - Playing from downloaded podcasts
Back to All Episodes
Podcast Episode

Iran-Linked Hackers Team Up With Russian Cybercriminals in Major Escalation

April 11, 2026

0:00
4:40
Podcast Thumbnail

Iranian state-backed hacking group MuddyWater has begun using a Russian malware-as-a-service platform in a campaign dubbed ChainShell, marking a significant escalation in capability. Meanwhile, cyberattacks on Gulf states have tripled to six hundred thousand per day, and Iranian hackers have been found inside US banks, airports, and defence networks.

A New Era of State-Sponsored Cyber Warfare

Iran's cyber operations have undergone a dramatic transformation since the US-Israeli military strikes of late February twenty twenty six, evolving from disruptive but relatively unsophisticated hacktivist campaigns into complex, multi-vector threats targeting financial institutions, aviation, energy, and water systems across the Gulf, the United States, and Europe.

The Russian Connection

In a development that cybersecurity researchers are calling a generational shift, the Iranian advanced persistent threat group known as MuddyWater has been linked to a Russian-operated malware-as-a-service platform run by a group called TAG-one fifty. The campaign, dubbed ChainShell, deploys blockchain-enabled command-and-control infrastructure using Ethereum smart contracts and steganographic payloads, combining state-level targeting precision with commercially developed offensive tools.

Researchers at JUMPSEC discovered Farsi-language code comments alongside Israeli IP range lists on exposed servers, providing clear evidence of Iranian operators using the Russian criminal infrastructure to target Israeli and Western systems.

Scale of the Threat

The numbers are staggering. Mohammed Al Kuwaiti, the UAE's head of cybersecurity, revealed that daily cyberattacks on the country's digital infrastructure have tripled since the conflict began, rising from roughly two hundred thousand to approximately six hundred thousand per day, with some days reaching as high as seven hundred thousand.

Already Inside Western Networks

Perhaps most concerning is the discovery by Symantec researchers that MuddyWater has been operating inside the networks of a US bank, an airport, and the Israeli division of a US defence software company since early February. The group deployed new backdoors called Dindoor and Fakeset, whilst approximately sixty threat groups now operate in coordination with Iranian-aligned cyber operations.

The Long-Term Risk

Security analysts warn that Iranian actors have pre-positioned malware on US energy and other critical infrastructure, access that experts say may never be fully rooted out. As Tehran loses conventional military options, cyber operations are increasingly becoming its primary instrument of retaliation.

Published April 11, 2026 at 7:12pm

More Recent Episodes