CyberWire Daily

Unit 42's Iran Threat Brief: What We're Seeing [Threat Vector]

7 snips
Mar 5, 2026
Andy Piazza, Senior Director of Threat Intelligence at Unit 42 with 20+ years in security ops, and Justin Moore, Senior Manager of Threat Intelligence Research with prior intelligence officer roles, discuss Iran-linked hacktivist activity. They cover observed group behaviors, how Iran's internet outages change the threat landscape, dispersed operators and proxy dynamics, and immediate defensive priorities like DDoS protection, backups, MFA, and validation of claims.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Connectivity Blackout Shifted Attack Origins

  • Iran's near-total internet outage shifted most observed attacks to actors outside the country.
  • Justin Moore and Andy Piazza note globally dispersed pro-activists carried the retaliation while in-country units faced operational isolation and limited collection ability.
INSIGHT

Isolated Units Favor Disruption Over Collection

  • Operationally isolated state-aligned units may act autonomously and change their normal mission focus.
  • Andy Piazza explains that forward-deployed or autonomous units may prioritize disruptive activity over long-term intelligence collection.
INSIGHT

Pragmatic Tracking Uses Self Names And Verifications

  • Unit 42 is using rapid-response naming (self-names) for hacktivist groups while validating origins and claims.
  • Andy Piazza highlights pragmatic tracking by handles/chat names and emphasises verifying pro-Iranian vs pro-Russian origins before attribution.
Get the Snipd Podcast app to discover more snips from this episode
Get the app