Key Takeaways
Iranian-linked threat actors have launched cyberattacks including, DDoS, ransomware, and espionage campaigns, in the wake of U.S. and Israeli military strikes against Iran.
While current activity is concentrated in the Middle East, security researchers warn that attacks against U.S. organizations are a matter of “when, not if.”
Organizations with ties to the U.S. military, defense contractors, Israeli partnerships, or critical infrastructure face the highest risk.
Disinformation is a core part of Iran’s cyber playbook. Be skeptical of dramatic attack claims circulating on social media.
Now is the time to patch systems, reinforce security awareness training, and review your supply chain security.
The geopolitical landscape shifted dramatically over a week in early March when the United States and Israel launched military strikes against Iran. Within hours, Iranian-linked cyber operations were already underway, and the ripple effects are heading toward U.S. shores.
For business leaders, this is more than a foreign policy story. It’s a cybersecurity wake-up call.
What’s Happening Right Now
Iranian hackers have launched spying expeditions, digital probes, and distributed denial of service (DDoS) attacks in the wake of the U.S. and Israel launching missile strikes, and security researchers urge organizations to expect more cyber intrusions as the war continues. (Source)
Much of the initial activity has targeted Israel and Persian Gulf nations, but the threat is rapidly expanding. Binary Defense Director of Threat Intelligence JP Castellanos noted that threat posture “strongly suggests US-linked organizations should be treating this as a when, not an if.”
Cybersecurity researchers also observed that Iran appeared to be staging malware against targets in Israel and the Middle East even before the military strikes began. As one analyst noted, this kind of pre-positioning is standard practice. Threat actors set up their tools well in advance of pulling the trigger.
Who Is Most at Risk
Not every organization faces equal exposure, but the threat landscape is broader than many business leaders may assume.
According to Castellanos, the organizations at highest risk are those with direct connections to the U.S. military (i.e., defense contractors and government suppliers), as well as organizations with ties to Israel through partnerships, subsidiaries, or shared infrastructure.
But the risk extends further. Companies using Israeli-made operational technology or industrial equipment could become indirect targets. Iran has previously used equipment origin as a factor in targeting decisions, such as the 2023 campaign against Unitronics programmable logic controllers.
Critical infrastructure operators deserve particular attention. Iran has a documented history of targeting water systems, fuel management, and industrial control systems. In 2023 and again in 2024, Iranian-linked groups gained remote access to U.S. water and fuel management systems, in some cases exploiting nothing more than default passwords on internet-accessible equipment.
Don’t Get Fooled by the Noise
Here’s something that often gets lost in the urgency of these moments: not everything you read online is real.
Castellanos advised organizations to “be especially cautious about claims of attacks circulating on social media, as a significant portion of what you’ll see is disinformation designed to amplify fear and uncertainty. which is itself part of Iran’s playbook.”
Iran has a long history of exaggerating the scope and impact of its cyber operations. As Google Threat Intelligence Group chief analyst John Hultquist noted, Iran has “historically had mixed results with disruptive cyberattacks” and frequently fabricates or overstates the effects of its intrusions to maximize psychological impact.
That doesn’t mean the threat isn’t real; it very much is. But sound decision-making requires distinguishing verified incidents from influence operations designed to create panic.
What You Should Do Right Now
The good news: the steps that protect you from state-sponsored threats are the same fundamentals that protect you from any sophisticated attacker. Now is the time to act on them with urgency.
Protect accounts. Use strong passwords and different passwords everywhere. Apply multi-factor authentication everywhere you can.
Patch everything. Outdated systems remain one of the most common entry points for attackers. Prioritize internet-facing systems and any operational technology connected to your network.
Reinforce security awareness training. Phishing and spearphishing is often the easiest delivery mechanism of choice. Your people are your first line of defense. Make sure they know what a suspicious email looks like, especially one disguising itself as an urgent software update.
Review your supply chain. If your organization uses technology or equipment from Israeli-based vendors, or works with partners who do, conduct a review of those connections and the security controls around them.
Audit remote access. Verify remote access capabilities are appropriate and that strong authentication controls with multi-factor authentication are in place. Never use default or weak passwords.
Test your incident response plan. If an incident happened tonight, would your team know what to do? Now is the time to find out — not during the crisis itself.
The Bottom Line
As the conflict continues, organizations should “expect elevated activity for the foreseeable future.” The cyber dimension of this conflict will not resolve quickly, and U.S. businesses, regardless of industry, need to treat this as an active threat environment, not a distant geopolitical event.
At Rea Information Services, our advisors are available to help you assess your current security posture, identify gaps, and put the right controls in place. This is exactly the moment where proactive preparation makes all the difference.
About the Author
Travis Strong, CISA is an advisor with Rea Information Services, where he is responsible for overseeing IT risk management for the firm and supporting clients in doing the same for their businesses. Travis holds the Certified Information Systems Auditor (CISA) designation through ISACA.
To connect with Travis or learn more about Rea Information Services, visit reamanaged.com.
This article was prepared for informational purposes and reflects threat intelligence available as of early March 2026. Organizations should consult with a qualified cybersecurity advisor for guidance specific to their environment.