Threat Actor Characterization
Islamic Revolutionary Guard Corps Cyber
ID: d9d80d03cfe271e7a52c9a8768b0178c82621| Cyber Defense Organization | IRGC Electronic Warfare | IR****** | IR*************************** |
| Is******************************************************** | Is****************************************** | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
IRGC-CEC is a state-linked Iranian cyber command organization publicly tied to critical-infrastructure targeting, front-company support activity, and proxy-style brands such as CyberAv3ngers. The strongest open-source evidence centers on exposed OT/ICS devices, default-credential abuse, HMI defacement, and later Linux/IoT/OT malware activity linked to IOCONTROL.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1110 | Brute Force | TA0006 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1491.001 | Internal Defacement | TA0040 |
|
| T1565.001 | Stored Data Manipulation | TA0040 |
|
| T1595 | Active Scanning | TA0043 |
|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1059.004 | Unix Shell | TA0002 |
|
| T1059.006 | Python | TA0002 |
|
| T1105 | Ingress Tool Transfer | TA0011 |
|
| T1583.001 | Domains | TA0042 |
|
Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC)
Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE
Author: iQBlack Team
Executive Summary
The Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC), also referenced in public material as the IRGC Electronic Warfare and Cyber Defense Organization, is a state-linked Iranian cyber command structure tied to malicious cyber operations against critical infrastructure, government entities, and private-sector organizations in the United States, Israel, and other countries. Public reporting and sanctions actions indicate that the IRGC-CEC does not operate only through a single public-facing brand. Instead, it appears to use a layered operational model that includes official personnel, front companies, contractor-like cyber staff, and branded personas such as CyberAv3ngers to create distance between the state organization and the visible operation.
The most visible and best-documented IRGC-CEC-linked activity in open sources is the targeting of internet-exposed operational technology (OT) devices, especially Israeli-made Unitronics PLC/HMI systems, using weak or default credentials and public exposure to achieve defacement and operational impact. That campaign is strategically important not because it demonstrated exquisite stealth or novel exploitation, but because it showed willingness to touch civilian critical infrastructure and public services in a way that carried disruptive and psychological value disproportionate to the simplicity of the intrusion path.