blog
Published
March 4, 2026

Simulating Iranian APT Attacks Against Middle East Governments

8

Minute Read

Adversary Emulation

TL;DR

An Iranian nation-state actor compromised Middle East government infrastructure and operated undetected for nearly two years. The attackers deployed web shells on Exchange servers, established over 15 scheduled tasks for persistence, harvested credentials via password filter DLLs and LSASS dumping, moved laterally using built-in admin tools, and exfiltrated executive mailboxes over encrypted HTTPS channels. This article breaks down each phase of the attack, maps it to the MITRE ATT&CK framework, and shows how continuous breach and attack simulation with Thawd's Simlight platform can detect these TTPs before real adversaries exploit them.

Introduction

Do you know what modern cyber-attacks against government institutions actually look like? Recently, Fortinet released a comprehensive threat intelligence report detailing a long-running nation-state intrusion attributed to an Iranian threat actor targeting critical infrastructure in the Middle East. This article explores the technical progression of that attack and how the attackers operated for almost two years without detection.

Today’s advanced threats rarely rely on loud or immediately disruptive techniques. Instead, sophisticated adversaries operate quietly in the background: harvesting credentials, deploying backdoors, escalating privileges, and positioning themselves for future operations while remaining largely invisible. For this reason, one of the most effective ways to defend against modern adversaries is to simulate their techniques and continuously stress-test security controls before real attackers do.

This article summarizes the TTPs leveraged by the APT and demonstrates how effective simulation ensures that such TTPs are prevented and detected as early as possible in the attack chain.

Leveraging IIS & Exchange for External Access

The attackers relied heavily on ASPX web shells deployed on Exchange and IIS servers, turning public-facing infrastructure into their long-term command-and-control layer. Within one day of intrusion, they installed an advanced obfuscated web shell that enabled file browsing, command execution, file upload/exfiltration, timestamp manipulation, and system profiling.

Because the web shells operated over normal HTTP traffic, activity blended with legitimate Exchange traffic, making detection difficult. The IIS worker process (w3wp.exe) became the main execution point for early attacker activity. Continuous validation of web shell detection capabilities could have identified this intrusion much earlier.

Thawd Insight: This multi-year intrusion could have been detected much earlier if defenders had continuously validated their ability to prevent and detect web shell behaviors. Security teams can expose control gaps before attackers do by simulating real-world web shell techniques like file system manipulation, command execution from IIS processes, and tunneling attacks. For this reason, we have added more than 30 behavioral web shell simulations to our breach and attack simulation platform to reflect the exact techniques observed in campaigns like this one.

Web Shell Attack Scenario
Webshell Attacks List

Resilient Persistence Methods

The attackers built redundant persistence to survive remediation. They deployed eight web shells and over fifteen scheduled tasks disguised as legitimate Windows components. These tasks launched both open-source frameworks and custom backdoors, ensuring execution after reboots or credential resets.

At least five distinct backdoor families were identified. Effective detection requires behavioral monitoring of scheduled task creation and abnormal execution patterns rather than relying on static indicators.

Thawd Insight: Effective detection of persistence mechanisms such as scheduled tasks must focus on behavioral patterns rather than static indicators like task names or file paths, which attackers can easily modify. Our breach and attack simulation platform exercises multiple scheduled task creation and execution techniques — including those observed in this campaign — allowing defenders to continuously validate their ability to detect stealthy persistence in real-world conditions.

Persistence Attacks

Persistence Simulation — Scheduled Task Techniques

Multiple Credential Access Methods

The adversary continuously harvested credentials to maintain flexibility. They installed malicious password filter DLLs on domain controllers to intercept user logins, capturing credentials for over a year.

They also dumped LSASS memory using tools like Mimikatz and NanoDump to obtain plaintext credentials, hashes, and Kerberos tickets. Detection should focus on behavioral indicators such as abnormal LSASS access, unauthorized DLL registration, and credentials written to unusual locations.

Thawd Insight: Detecting credential abuse of this nature requires focusing on behavioral signals rather than specific tooling. Unauthorized access to LSASS memory, abnormal DLL registration within authentication providers, and credential material being written to non-standard locations all represent high-fidelity indicators of compromise. Our breach and attack simulation platform exercises both memory access abuse and authentication pipeline tampering, allowing organizations to continuously validate their ability to detect credential theft techniques before attackers leverage them in real campaigns.
Credential Access Simulation

Lateral Movement Methods

To expand access, the attackers used legitimate tools including RDP, PsExec, and PowerShell Remoting. These techniques allowed interactive control, rapid command execution, and remote access without dropping additional malware.

Since these are standard administrative tools, detection must focus on abnormal authentication paths, unusual remote execution patterns, and movement from systems not typically used for administration.

Thawd Insight: At Thawd, we focus on simulating attacker-style lateral movement to determine whether internal controls can detect unauthorized movement across the network. This allows organizations to identify blind spots in internal access monitoring before those gaps are exploited in a real intrusion.
Lateral Movement Simulation

Exfiltration Methods

Sensitive data, including executive mailboxes, was staged and exfiltrated over HTTPS to blend with normal outbound traffic. Attackers leveraged native Exchange PowerShell modules to export mailboxes, then used base64 encoding, encryption, and chunked transfers to reduce the likelihood of detection.

In parallel, multiple backdoors maintained periodic HTTP/HTTPS C2 beaconing to receive tasking and transmit collected data. By operating through legitimate protocols and trusted system processes, the adversary sustained remote control and exfiltrated information while generating minimal security alerts.

Thawd Insight: To validate defenses against covert data theft, our breach and attack simulation platform emulates data staging and exfiltration across multiple channels (e.g., HTTPS and SSH), chunked file transfers, and abnormal outbound traffic from infrastructure servers. In addition, the platform supports a wide range of staging techniques, including compression, encryption, and encoding.

Exfiltration Simulation
C2 Beaconing Simulation

Key Takeaways

1. Web shells remain one of the most dangerous persistence mechanisms. Operating over standard HTTP traffic, they blend seamlessly with legitimate web activity and can go undetected for months  or years. Organizations must continuously validate that their security stack can detect web shell deployment and activity.

2. Redundant persistence is the norm for nation-state actors. With eight web shells and over fifteen scheduled tasks, this adversary ensured that no single remediation action could fully remove their access. Detection strategies must account for layered persistence across multiple vectors.

3. Credential theft is a long game. Password filter DLLs silently intercepted credentials for over a year. Combined with LSASS memory dumps, the attackers maintained a constantly refreshed pool of valid credentials. Behavioral detection of abnormal authentication patterns is essential.

4. Living-off-the-land makes lateral movement nearly invisible. By using RDP, PsExec, and PowerShell Remoting tools already present in any Windows environment  the attackers avoided deploying detectable malware for lateral movement. Defenders need to baseline normal admin behavior and alert on deviations.

5. Continuous simulation is the best defense. Static, point-in-time assessments cannot keep pace with adversaries who evolve their tradecraft. Regularly simulating the full attack chain  from initial access through exfiltration  is the most effective way to identify and close detection gaps before they are exploited.

Book a Demo and See the Difference

Two years. That’s how long this adversary operated undetected inside critical government infrastructure  harvesting credentials, exfiltrating executive communications, and expanding their foothold across the network.

The question isn’t if your organization will be targeted. It’s whether your defenses will catch it when it happens.

Thawd’s Simlight platform delivers continuous, real-world attack simulations designed by our engineers and threat researchers. Every technique covered in this article  from web shell deployment to credential theft to covert exfiltration  can be safely simulated against your production environment to reveal exactly where your defenses hold and where they break.

Schedule Your Demo →

See how Simlight can help you find the gaps before adversaries do.

Thawd Labs

Related articles

Thawd Satruday
October 15, 2025

What is Breach and Attack Simulation (BAS)?

Breach and Attack Simulation is no longer a niche technology; it is becoming an essential component of any mature, proactive security program. In a world where you are a constant target, you need a constant, evidence-based understanding of your defenses. BAS provides the continuous assurance and actionable intelligence that organizations need to stay resilient and confidently manage their cyber risk.
Read more
Thawd Satruday
October 15, 2025

What is SOC Readiness? 

SOC Readiness is the ultimate measure of a security program's effectiveness. It moves beyond simply having a security team to proving that the team is equipped, trained, and prepared to defend the organization against modern, sophisticated attacks. In today's threat landscape, a continuously validated, high-readiness SOC is not a luxury—it's an absolute necessity.
Read more
Adversary Emulation
October 15, 2025

What is Adversary Emulation? 

Adversary emulation is the hallmark of a mature security program. It elevates testing from a generic compliance exercise to a highly strategic, intelligence-driven validation of an organization's defenses. By focusing on how real adversaries operate, it provides the clearest possible picture of an organization's ability to protect itself from the threats that truly matter.
Read more

See Thawd In Action

Submit a request and we'll share answers to your top security validation and exposure management questions.
Contact Us
Arrow icon