Threat Actor Characterization
Mahdi Lashgarian
ID: bd1c4dda869dd9a6f9450fcc24ef675b53497| Mehdi Lashgarian | مهدی لشگریان | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
Mahdi Lashgarian is a publicly named senior official of the Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC). Open reporting ties him to the command environment behind CyberAv3ngers-linked critical-infrastructure targeting and to a broader IRGC-CEC ecosystem that includes proxy branding and OT/IoT-focused activity.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1110 | Brute Force | TA0006 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1491.001 | Internal Defacement | TA0040 |
|
| T1565.001 | Stored Data Manipulation | TA0040 |
|
| T1595 | Active Scanning | TA0043 |
|
| T1105 | Ingress Tool Transfer | TA0011 |
|
| T1583.001 | Domains | TA0042 |
|
Mahdi Lashgarian
Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE
Author: iQBlack Team
Executive Summary
Mahdi Lashgarian is publicly identified by the U.S. Department of the Treasury as a senior official of the Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC). Public sanctions and reward reporting also place him inside the same leadership environment linked to CyberAv3ngers activity targeting exposed industrial control assets and, later, to a broader Iran-linked OT/IoT malware and proxy-brand ecosystem.
Unlike public-facing handles or propaganda personas, Mahdi Lashgarian appears in open sources as a named state official rather than as a visible online operator. His analytical importance therefore comes from organizational position and repeated public linkage to IRGC-CEC-related malicious cyber activity, not from a rich trail of personal social-media presence, leaked chats, or directly observed hands-on-keyboard tradecraft.