Skip to main content
NukeClock

Critical Infrastructure Targeted in Coordinated Cyber Campaign Before Iran Strikes

A coordinated cyber campaign attributed to Iranian state actors targeted critical infrastructure across the US and allied nations on February 26, 2026 — two days before Operation Epic Fury launched — marking a new front in the escalating conflict.

irancyber-attackcritical-infrastructurecybersecurityescalationhybrid-warfare
Iranian flag over Tehran — a coordinated cyber campaign targeted critical infrastructure before military strikes began

Critical infrastructure across the United States and allied nations was targeted in a coordinated cyber campaign on February 26, 2026, two days before Operation Epic Fury launched military strikes against Iran. Intelligence analysts assess the campaign as the work of Iranian state-sponsored actors pre-positioning disruptive capabilities as part of broader conflict preparation. NukeClock moved 1 second closer to midnight in response.

Iranian flag flying over Tehran skyline
The cyber dimension preceded kinetic warfare — a coordinated digital campaign targeted critical infrastructure two days before the first missiles flew.

What Was Targeted

US energy grid management systems, water treatment facility control networks, and financial sector infrastructure all detected unusual intrusion activity beginning on February 26. Network defenders identified coordinated scanning, credential harvesting, and attempts to establish persistent access across multiple sectors simultaneously.

Similar patterns were observed in Gulf state allies — the UAE, Bahrain, and Saudi Arabia all reported anomalous activity targeting government networks and energy infrastructure. The breadth and coordination of the targeting profile suggests a state-level operation with strategic objectives rather than criminal activity.

CISA issued emergency advisories to critical infrastructure operators across all 16 designated critical infrastructure sectors, urging immediate review of network logs, implementation of enhanced monitoring, and activation of incident response plans.

Attribution: Iranian State Actors

Several Iranian Advanced Persistent Threat (APT) groups were identified in the activity based on toolsets, tactics, and infrastructure overlap with previously documented campaigns:

  • APT33 (Elfin / Refined Kitten) — typically targets energy and aviation sectors; linked to the IRGC and known for deploying destructive malware
  • APT34 (OilRig / Helix Kitten) — targets government and financial sector networks; has conducted operations against Gulf state institutions for years
  • APT35 (Charming Kitten / Phosphorus) — targets diplomatic, research, and defense institutions; known for sophisticated social engineering

The IRGC's Cyber Command coordinates state-sponsored operations across these groups. CISA's assessment linked the February 26 activity patterns to known Iranian toolsets and command-and-control infrastructure, though attribution in real-time remains probabilistic rather than definitive.

Iran's Cyber Warfare History

Iran's cyber capabilities have a well-documented track record of targeting critical infrastructure:

  • 2012 Shamoon attack — wiped 35,000 computers at Saudi Aramco, replacing data with images of a burning American flag. It remains one of the most destructive cyber attacks in history.
  • 2013–2014 — Iranian hackers breached the control system of the Bowman Avenue Dam in Rye Brook, New York, gaining access to operational controls.
  • 2021 — Attempted manipulation of chemical levels at a Florida water treatment plant was attributed to Iranian actors seeking to demonstrate reach into US domestic infrastructure.

Iran's cyber capabilities developed partly as blowback from Stuxnet — the US-Israeli cyber weapon that destroyed approximately 1,000 Iranian nuclear centrifuges at the Natanz facility in 2010. Stuxnet demonstrated that cyber operations could cause physical destruction of industrial equipment. Iran took the lesson seriously and invested heavily in developing equivalent capabilities, building a cyber warfare apparatus that US intelligence now considers among the most active globally.

Cyber as Precursor to Kinetic War

The timing of the campaign — two days before US military strikes began — suggests integration with broader military planning rather than an isolated operation. Pre-positioning malware for activation during conflict is a documented military doctrine: gain access during peacetime, maintain persistence, and activate disruptive capabilities when kinetic operations begin.

The concept of "preparing the battlefield" in cyberspace mirrors traditional military preparation — reconnaissance, infiltration, and staging assets for use at the decisive moment.

The most direct historical analogy is the 2008 Russia-Georgia War, where coordinated cyber attacks on Georgian government websites and communications infrastructure preceded the ground invasion by hours. That conflict demonstrated that cyber operations would become an integral component of modern military campaigns rather than a separate domain.

This represents the evolution of hybrid warfare: cyber, kinetic, and proxy operations combined into a multi-domain campaign designed to overwhelm an adversary's ability to respond coherently across all vectors simultaneously.

The Hybrid Warfare Dimension

The cyber campaign fits into Iran's broader multi-domain response strategy. Each vector targets a different vulnerability:

  • The Strait of Hormuz closure targets energy supply physically — disrupting the flow of 20% of global oil
  • Cyber attacks on energy infrastructure target the same systems digitally — attempting to disrupt grid management and distribution
  • Proxy forces across the region create military pressure across multiple geographies simultaneously

The combination creates compound pressure that is harder to defend against than any single vector alone. Defenders must allocate resources across physical, digital, and geographic domains simultaneously, and a failure in any one domain can cascade into others.

Iran has long invested in asymmetric capabilities precisely because it cannot match US conventional military power directly. Cyber warfare, proxy networks, and control of geographic chokepoints are the tools of a nation that has adapted its strategy to its relative military position.

Impact on the Clock

This event moved NukeClock 1 second closer to midnight. The relatively small delta reflects several factors:

  • Uncertainty about attribution certainty at the time of detection
  • No confirmed physical damage resulting from the cyber operations
  • The campaign's full significance was retrospective — its meaning as a precursor to war became clearer only after kinetic strikes began two days later

However, the precedent of coordinated cyber attacks on critical infrastructure as a precursor to military action represents a concerning evolution in conflict escalation patterns. If cyber pre-positioning becomes a recognized indicator of imminent military action, it may compress decision-making timelines and increase the risk of preemptive responses based on ambiguous signals.

Defensive Measures

CISA activated its Shields Up campaign, issuing emergency advisories to critical infrastructure operators across all 16 critical infrastructure sectors. Specific guidance included:

  • Immediate review of network access logs for indicators of compromise associated with known Iranian toolsets
  • Enhanced monitoring of industrial control systems and operational technology networks
  • Implementation of network segmentation to isolate critical systems
  • Activation of incident response plans and establishment of communication channels with federal agencies

US Cyber Command initiated defensive operations, though specific details remain classified. The challenge of cyber attribution in real-time conflict is significant — establishing confidence in who is responsible for an intrusion takes time, forensic analysis, and intelligence correlation. That analytical process is a luxury not available during rapid military escalation, creating a dangerous gap between detection and confident attribution.

Get Clock Alerts

Receive updates when the threat level changes. Breaking developments, new analysis, and daily situation reports — straight to your inbox.

No spam. Unsubscribe anytime. Also available via RSS feed.