Three ways teams can tackle Iran’s tangled web of state-sponsored espionage
COMMENTARY: While often overshadowed by Russian and Chinese threats, the cyber threat from Iran has become a formidable challenge for organizations globally.Once composed of amateur hacking groups, Iran’s cyber operations have matured and professionalized into a fluid, interconnected ecosystem leveraging third-party contractors, both custom and publicly available tools, and a range of techniques to achieve the Iranian government’s strategic objectives.[SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Read more Perspectives here.]Recent operations by a newly-identified cluster dubbed UNK_SmudgedSerpent illustrate how Iranian threat actors have blended tactics, techniques, and procedures (TTPs) once associated with distinct groups, complicating attribution efforts for defenders.Our research beginning in June 2025 reported that UNK_SmudgedSerpent borrowed techniques largely associated with the playbooks of TA453 (Charming Kitten), TA455 (Smoke Sandstorm), and TA450 (MuddyWater). This sharing of methods could suggest increased collaboration and adaptability among Iran-aligned groups.This notable campaign targeted U.S.-based academics and foreign policy experts. In a tailored social engineering attempt, attackers impersonated a Brookings Institution director and initiated contact through carefully crafted emails with political and topical lure content. After an extended exchange likely intended to build trust with the targets, the group progressed from engaging in benign conversation to sending malicious emails.UNK_SmudgedSerpent sent a link to a supposed OnlyOffice document, mirroring TA455’s techniques, but it led to a credential harvesting site disguised as a health-themed domain. When that failed, the attackers shifted to delivering malware via an archive file that contained legitimate RMM software (PDQConnect), a tactic often associated with TA450.This fusion of social engineering, pseudo-legitimate content delivery, and abuse of legitimate tooling exemplifies the evolving complexity and resourcefulness of modern Iranian operations.
The attribution puzzle: What does it mean?
While tasking and remits remain relatively consistent across groups to support national objectives, the tangled TTPs of UNK_SmudgedSerpent forces us to reconsider how we view the operational structure of Iranian threat groups. The links between groups vary in confidence, but collectively indicate an interconnected ecosystem. Several hypotheses could explain the convergence:
Regardless of the precise reason, CISOs need to take note: both technical and political attribution are significant and relevant. For potential target organizations, understanding attacker TTPs supports intelligence-led network defense in a SOC or pentesting function at a tactical level and informs incident response investigations if an intrusion occurs. By building attacker profiles based on attacker motivations and previous campaigns we can prevent – or at least mitigate – the damage from an intrusion.
What security pros should do now
The emergence of actors like UNK_SmudgedSerpent underscores that we need threat intelligence that’s dynamic and focused on behaviors as well as actors. It shows we need to build a defense-in-depth strategy that accounts for both technical characteristics and political attribution. Here are three ways to move forward:
UNK_SmudgedSerpent has just burst on the scene, but the techniques it employs are an extension of a persistent and evolving espionage effort. For CISOs, it’s a clear signal that the adversaries are adapting. Our defenses must do the same.Saher Naumaan, senior threat researcher, Proofpoint SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.
