Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iranian Cyber Attacks Target US Networks, Cameras for Surveillance

Iranian Cyber Attacks Target US Networks, Cameras for Surveillance

Posted on March 17, 2026 By CWS

In early 2026, Iranian cyber operations expanded significantly, with state-affiliated threat groups embedding themselves in US and Canadian networks. Simultaneously, they targeted internet-connected surveillance cameras across the Middle East to gather battlefield intelligence.

Infiltration of US Networks

The Iranian APT group, MuddyWater, linked to Iran’s Ministry of Intelligence and Security, has reportedly been maintaining unauthorized access to various American organizations since February 2026. The sectors affected include banking, aviation, defense supply chains, and non-profit organizations.

Reports from Symantec and Carbon Black exposed this illicit activity, highlighting MuddyWater’s use of undocumented malware to secure persistent access in victim networks. This approach aligns with state-sponsored espionage, focusing on sustained intelligence collection rather than immediate disruption.

Malware Tools and Tactics

PolySwarm analysts have identified several malware families associated with MuddyWater’s attacks on US entities, including Dindoor and Fakeset. The Dindoor backdoor was discovered infiltrating a US software company’s network, which serves defense and aerospace clients, using the Deno runtime for JavaScript and TypeScript to maintain access.

Fakeset, a Python-based backdoor, was detected in the networks of a US airport and a non-profit organization. These tools are engineered to remain undetected, ensuring long-term presence in compromised systems.

Surveillance Camera Exploitation

Beyond network penetration, Iranian infrastructure initiated extensive scanning of internet-connected surveillance cameras from February 28, 2026. Check Point Research documented a surge in exploit attempts targeting Hikvision and Dahua cameras, affecting commercial, government, and municipal setups across the region.

This activity spanned Israel, Qatar, Bahrain, Kuwait, the UAE, Lebanon, and Cyprus, coinciding with regional hostilities, and emphasizes Iran’s strategic use of these devices for real-time intelligence gathering.

The exploitation of surveillance cameras is a deliberate tactic to transform standard security equipment into intelligence platforms. Iranian actors leverage vulnerabilities like CVE-2017-7921 in Hikvision and CVE-2021-33044 in Dahua devices to monitor and assess locations.

Recommendations and Outlook

Organizations using Hikvision or Dahua cameras must apply all available firmware patches, especially those addressing known vulnerabilities. Segmentation of camera systems from core networks, disabling unnecessary remote access, and enforcing strong authentication are vital preventive measures.

For sectors targeted by MuddyWater, vigilance for unusual activities involving Deno runtime, unexpected Python processes, and Rclone traffic is crucial. Digital certificate-based detection and traffic inspection should be integrated into defense strategies to counter these sophisticated threats.

Given the current geopolitical tensions, organizations must prioritize these risks in their incident response strategies to mitigate potential impacts.

Cyber Security News Tags:APT groups, CVE vulnerabilities, Cybersecurity, Dahua, Dindoor, Espionage, Fakeset, Hikvision, Iran, Malware, MuddyWater, Surveillance, US networks

Post navigation

Previous Post: AI Vulnerability Exposed Through Custom Font Attacks
Next Post: AWS Sandbox Vulnerability Exposes Data to Covert Channels

Related Posts

Fortinet FortiManager Flaw Risks Unauthorized Command Execution Fortinet FortiManager Flaw Risks Unauthorized Command Execution Cyber Security News
Chrome Security Update – Patch for 21 Vulnerabilities that Allows Attackers to Crash Browser Chrome Security Update – Patch for 21 Vulnerabilities that Allows Attackers to Crash Browser Cyber Security News
Hackers Exploit Google Calendar for AI Security Breach Hackers Exploit Google Calendar for AI Security Breach Cyber Security News
WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File Cyber Security News
Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code Cyber Security News
L7 DDoS Botnet Hijacked 5.76M Devices to Launch Massive Attacks L7 DDoS Botnet Hijacked 5.76M Devices to Launch Massive Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Reducing Alert Overload with Effective Threat Intelligence
  • AWS Sandbox Vulnerability Exposes Data to Covert Channels
  • Iranian Cyber Attacks Target US Networks, Cameras for Surveillance
  • AI Vulnerability Exposed Through Custom Font Attacks
  • React Native Packages Targeted by Credential-Stealing Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Reducing Alert Overload with Effective Threat Intelligence
  • AWS Sandbox Vulnerability Exposes Data to Covert Channels
  • Iranian Cyber Attacks Target US Networks, Cameras for Surveillance
  • AI Vulnerability Exposed Through Custom Font Attacks
  • React Native Packages Targeted by Credential-Stealing Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News