millions of customers
A significant supply chain cyberattack, named IRLeaks, has caused a massive data breach at several major Iranian banks, exposing the sensitive data of millions of customers. The attack originated with the compromise of a third-party IT vendor in October 2025. Using this foothold, the threat actors moved laterally into the interconnected banking networks. For weeks, they exfiltrated large volumes of data before the breach was discovered and disclosed in late November 2025. The stolen data includes highly sensitive customer PII and financial records. This incident serves as a stark reminder of the systemic risk posed by third-party vendors and the critical need for robust supply chain security management.
The IRLeaks attack was a classic supply chain compromise, where the attackers targeted a weaker link in the ecosystem to gain access to their ultimate, higher-value targets.
T1199 - Trusted Relationship): The attackers first breached a third-party IT vendor that provided services to the Iranian banking sector. This was reportedly achieved by exploiting unpatched vulnerabilities and using stolen credentials.T1021 - Remote Services): From the compromised vendor's network, the attackers pivoted into the internal networks of the connected banks, likely using the vendor's legitimate access privileges.T1041 - Exfiltration Over C2 Channel): Throughout November 2025, the attackers exfiltrated large quantities of data using encrypted outbound connections to avoid detection.The success of the IRLeaks attack hinged on weaknesses in the third-party vendor's security posture, specifically inadequate patch management and credential security. By targeting the vendor, the attackers bypassed the banks' potentially stronger perimeter defenses. The use of encrypted channels for data exfiltration is a common technique to blend malicious traffic with legitimate SSL/TLS traffic, making it harder for network security tools to detect.
The compromised data is extensive and highly sensitive:
It is currently unconfirmed if this data was encrypted at rest within the banks' databases before being stolen.
This is one of the most significant financial sector breaches in Iran's history, with severe consequences:
The source articles mention that specific IP addresses and phishing domains were identified as indicators of compromise, but the values were not provided in the reports.
D3-OTF: Outbound Traffic Filtering.M1016 - Vulnerability Scanning): Implement a comprehensive third-party risk management program. This must include rigorous security assessments before onboarding a vendor and continuous monitoring throughout the relationship. Mandate that vendors adhere to your organization's security standards.M1030 - Network Segmentation): Do not allow vendors to have flat access to your network. Segment vendor access into isolated enclaves with strict access controls, allowing them to reach only the specific systems and services they need to manage. This prevents lateral movement in the event of a vendor compromise.Segmenting networks to isolate third-party vendor access prevents attackers from moving laterally from a compromised vendor system to critical internal assets.
Enforce strict access control lists (ACLs) and firewall rules for vendor connections, ensuring they can only access the specific hosts and ports required for their function.
Mapped D3FEND Techniques:
While intended for internal use, this principle extends to vendor management. Organizations should require evidence of a robust vulnerability management program from their critical vendors.
To defend against supply chain attacks like IRLeaks, organizations must treat vendor connections as untrusted. The most effective architectural control is Network Isolation. Instead of allowing vendor VPNs to connect directly to the corporate network, all third-party access should terminate in a dedicated, isolated DMZ or 'vendor enclave.' This enclave should have no default connectivity to the internal network. Strict, 'default-deny' firewall rules must be implemented, allowing traffic only to specific internal IP addresses and ports that are absolutely necessary for the vendor's function. This strategy contains the 'blast radius' of a vendor compromise. If the vendor's systems are breached, the attackers are trapped within the isolated enclave and cannot perform lateral movement into the broader corporate network, preventing a vendor incident from becoming a catastrophic breach of the organization's own systems.
To prevent data exfiltration, as seen in the IRLeaks attack, organizations must implement strict outbound traffic filtering at their network egress points. The default policy should be to deny all outbound traffic. Specific rules should then be created to allow traffic only to known, legitimate destinations required for business operations. For sensitive internal systems like database servers, there should be an explicit rule denying any direct outbound connection to the internet. All data transfers should be routed through proxy servers or data loss prevention (DLP) gateways where they can be inspected. This control would have made it significantly more difficult for the IRLeaks attackers to exfiltrate data using encrypted connections to their own infrastructure, as those connections would have been blocked by the egress firewall.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats