State-Aligned Hackers from China, Iran, Belarus Escalate Espionage in Middle East

Heightened Middle East Conflict Drives Surge in Cyber-Espionage from Multiple State-Aligned Threat Actors

HIGH
March 11, 2026
5m read
Threat ActorCyberattackPhishing

Related Entities

Threat Actors

UNK_InnerAmbushTA402TA473TA453 Winter VivernCharming Kitten

Organizations

Proofpoint Ministry of Foreign Affairs of Iraq

Other

Hamas

Full Report

Executive Summary

Amid a regional conflict, multiple state-aligned threat actors have intensified cyber-espionage operations against government and diplomatic targets across the Middle East. Research from Proofpoint has identified several distinct campaigns leveraging the conflict as a thematic lure to compromise high-value targets. The activity involves a mix of known and newly identified threat groups with suspected links to the governments of China, Iran, and Belarus, as well as Hamas-aligned actors. These groups are using sophisticated social engineering, often amplified by the use of compromised government email infrastructure, to conduct strategic intelligence gathering. This convergence of multiple threat actors on a single geopolitical hotspot highlights the role of cyber operations as an integrated part of modern statecraft and conflict.


Threat Overview

The report details a complex web of overlapping campaigns, all seeking to exploit the regional instability for intelligence gains.

Key Threat Actors and Campaigns:

  • UNK_InnerAmbush (Suspected China-aligned): This actor targeted Middle Eastern governments in early March 2026. They used a compromised email account to send phishing lures related to regional leaders, directing victims to a malicious Google Drive URL.
  • TA402 / Frankenstein (Iran-aligned): This group used a compromised email account from the Iraqi Ministry of Foreign Affairs to target entities with lures referencing a potential U.S. military operation in Iran. This demonstrates the use of one compromised government entity to target others.
  • TA473 / Winter Vivern (Belarus-aligned): This actor, not previously known for targeting the Middle East, was observed attacking government organizations in the region between March 3-5, 2026. This expansion of their target scope is a significant development.
  • TA453 / Charming Kitten (Iran-aligned): This well-known group continued its typical espionage activities, targeting a U.S.-based think tank focused on the region.
  • Hamas-aligned actors: Also observed participating in the general increase of espionage activity.

The common thread is the use of the ongoing conflict as a powerful social engineering theme, making emails about military operations, diplomatic statements, or regional leaders highly likely to be opened by their intended targets.

Technical Analysis

The campaigns primarily rely on spear phishing as the initial access vector.

Impact Assessment

The collective impact of these campaigns is the widespread theft of sensitive government and diplomatic intelligence by multiple state actors. This intelligence can be used to:

  • Gain advantage in diplomatic negotiations.
  • Predict military or political actions.
  • Undermine regional stability.
  • Identify and track individuals of interest (dissidents, intelligence officers, etc.).

The targeting of a U.S. think tank by TA453 shows that the impact is not confined to the Middle East, as adversaries seek to understand and influence U.S. foreign policy.

Detection and Response

  • Email Security: Enhance email security gateways to detect phishing attempts, even from trusted or previously compromised senders. Look for suspicious links, mismatched sender names/addresses, and threat intelligence feeds for known malicious domains.
  • Identity and Access Management: Monitor for anomalous login activity, especially for government email accounts. A single account sending phishing emails to multiple other government entities is a major red flag.
  • User Training: Train diplomatic and government staff to be extremely cautious of emails related to the conflict, even if they appear to come from a legitimate source. Encourage verification of unexpected requests through separate communication channels.

Mitigation

  • Multi-Factor Authentication (MFA): Enforce MFA on all government email accounts to make them more resilient to compromise.
  • Threat Intelligence Sharing: Foster robust threat intelligence sharing between allied governments and cybersecurity partners to quickly identify and block campaigns from actors like TA473 as they expand their targeting.
  • Endpoint Protection: Use EDR solutions to detect and block post-exploitation activity, such as the execution of backdoors or reconnaissance commands.

Timeline of Events

1
March 3, 2026
Belarus-aligned group TA473 begins targeting government organizations in Europe and the Middle East.
2
March 11, 2026
This article was published

MITRE ATT&CK Mitigations

Enforcing MFA on all email accounts, especially for government and diplomatic staff, makes it significantly harder for attackers to take over accounts even if they steal credentials.

Mapped D3FEND Techniques:

Train high-value targets to recognize sophisticated spear phishing attacks that leverage current events and to verify unexpected requests out-of-band.

Use URL filtering and analysis to block links to known malicious sites and to inspect links leading to file-sharing services for malicious content.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To counter the espionage campaigns targeting Middle Eastern governments, it is crucial to implement robust Domain Account Monitoring. Since attackers are compromising and using legitimate government accounts (e.g., from the Iraqi Ministry of Foreign Affairs) to send phishing emails, detection must focus on anomalous account usage. Security teams should ingest email logs and identity provider logs into a SIEM. Create correlation rules that alert on a single account sending a high volume of similar emails to external government or diplomatic domains in a short period. Monitor for accounts that suddenly start sending emails with links to cloud storage platforms like Google Drive, especially if this is not normal behavior. Furthermore, track login locations and flag when an account authenticates from one country but is then used to send emails from a server in another. This technique helps turn a compromised 'trusted' account into a high-fidelity indicator of an ongoing attack.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CyberespionageState-SponsoredAPTMiddle EastProofpointPhishing

📢 Share This Article

Help others stay informed about cybersecurity threats