On March 17, 2026, the Council of the European Union announced new sanctions against three companies and two individuals based in China and Iran for their participation in malicious cyber activities. The restrictive measures, which include asset freezes and travel bans, target entities responsible for cyberattacks on EU critical infrastructure, media organizations, and democratic processes. The sanctioned firms are Iran's Emennet Pasargad and China's Anxun Information Technology (iSoon) and Integrity Technology Group. This action underscores the EU's commitment to using diplomatic and economic tools to deter and respond to malicious behavior in cyberspace.
The sanctions were adopted under the EU's cyber sanctions framework, which allows the Union to impose targeted restrictive measures on persons and entities responsible for cyberattacks that threaten the EU or its member states. The measures include:
This Tehran-based company is identified as a front for Iranian state-sponsored cyber operations. The EU Council linked Emennet to several malicious campaigns:
Known as iSoon, this company was identified as a hack-for-hire contractor working for the Chinese government and military. Despite claiming to be a cybersecurity training firm, iSoon was sanctioned for developing and providing offensive cyber capabilities used in attacks targeting critical infrastructure within the EU. The two co-founders of iSoon were also sanctioned individually.
This Chinese firm was sanctioned for supporting cyber operations that compromised over 65,000 devices across six EU member states between 2022 and 2023. The U.S. Treasury had previously sanctioned Integrity Technology in January 2025 for its connections to the Chinese state-backed threat actor Flax Typhoon (also known as Ethereal Panda).
The sanctions are designed to have a significant financial and operational impact on the targeted entities by cutting off their access to the EU's financial system and restricting the travel of key personnel. More broadly, the action serves as a strong geopolitical signal to China and Iran, demonstrating the EU's willingness to attribute and impose costs for malicious cyber activities. For businesses within the EU, the sanctions create a compliance obligation, as they are now prohibited from conducting any transactions with the listed entities. This move aims to disrupt the business model of hack-for-hire groups and state-sponsored front companies.
EU citizens and companies must immediately cease all financial dealings with the sanctioned entities and individuals. This includes:
Training users to recognize and report phishing attempts and social engineering can help prevent initial compromise by these threat actors.
Deploying network intrusion prevention systems can help detect and block command and control traffic or exploitation attempts from known malicious infrastructure.
Keeping software and systems patched is crucial to prevent exploitation of known vulnerabilities, a common tactic for these groups.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats