Iranian Threat Actor Cotton Sandstorm Adopts New Cyber Tactics

The US and Israel have released a joint advisory, warning that the Iranian state-sponsored threat actor known as Cotton Sandstorm has adopted new cyber tactics. These new methods include leveraging generative AI tools to enhance their operations, which now target not just Israel but also France, Sweden, and the US. Historically, Cotton Sandstorm, also referred to as Marnanbridge and Haywire Kitten, was primarily involved in “hack and leak” operations targeting organizations mainly in Israel. However, the group has recently broadened its scope, indicating a significant evolution in its approach and intentions.

One of the most concerning developments is Cotton Sandstorm’s newly observed activity, specifically targeting US election-related websites and media outlets. This suggests that the group may be gearing up to conduct direct influence operations as the US Presidential Election Day approaches. To add to the urgency, the group has also targeted the 2024 Paris Olympics, compromising a French commercial dynamic display provider and initiating content harvesting from IP cameras. Since April 2024, the group has used the online persona “Cyber Court” to promote activities by various hacktivist groups, aiming to protest the Israel-Hamas conflict.

Cotton Sandstorm’s New Tradecraft

Recent observations have shown that Cotton Sandstorm has developed several new tactics, techniques, and procedures (TTPs) to execute its operations more effectively. One major shift is the group’s approach to infrastructure tradecraft. Since mid-2023, the group has utilized various hosting providers for infrastructure management and obfuscation. These providers, such as “Server-Speed” and “VPS-Agent," enable the group to set up its own resellers and procure server space from Europe-based providers. These cover resellers are then used to provision operational servers for conducting malicious activities, including technical support to individuals involved in hosting Hamas-affiliated websites.

Cotton Sandstorm has also intensified its efforts to harvest open-source information. Following the October 7, 2023 Hamas attack on Israel, the group has focused on identifying information about Israeli fighter pilots and UAV operators. They accomplish this by searching multiple platforms such as Pastebin and LinkedIn. Furthermore, they utilize online resources like ancestry.com and familysearch.org, as well as previously leaked data sets to gather intelligence. This shift in focus indicates a strategic move to exploit publicly available information for their operations.

Incorporating AI into their tactics, Cotton Sandstorm was observed using generative AI in its messaging efforts during an operation named “For-Humanity.” This cyber-enabled influence operation took place in December 2023 and impacted a US-based Internet Protocol Television (IPTV) streaming company. The attack leveraged unauthorized access to IPTV streaming services to disseminate crafted messages about the Israel-Hamas conflict. This advanced use of AI demonstrates the group’s evolving capabilities in executing sophisticated cyber operations and influence campaigns.

Defending Against Cotton Sandstorm Attacks

The US and Israel have jointly issued an advisory alerting the public about the evolving cyber tactics of the Iranian threat actor Cotton Sandstorm, also known as Marnanbridge and Haywire Kitten. Previously focused on "hack and leak" operations targeting organizations in Israel, Cotton Sandstorm has expanded its reach to include France, Sweden, and the US. They have adopted new strategies that utilize generative AI tools to amplify their operations.

Alarmingly, Cotton Sandstorm is now concentrating its efforts on US election-related websites and media outlets, suggesting potential influence operations as the upcoming US Presidential Election draws near. Additionally, the group has set its sights on the 2024 Paris Olympics, compromising a French commercial display provider and collecting footage from IP cameras. Since April 2024, the group has used the online alias "Cyber Court" to broadcast activities by various hacktivist groups, protesting the Israel-Hamas conflict.

Explore more

Trend Analysis: Agentic Commerce Protocols

The clicking of a mouse and the scrolling through endless product grids are rapidly becoming relics of a bygone era as autonomous software entities begin to manage the entirety of the consumer purchasing journey. For nearly three decades, the digital storefront functioned as a static visual interface designed for human eyes, requiring manual navigation, search, and evaluation. However, the current

Trend Analysis: E-commerce Purchase Consolidation

The Evolution of the Digital Shopping Cart The days when consumers would reflexively click “buy now” for a single tube of toothpaste or a solitary charging cable have largely vanished in favor of a more calculated, strategic approach to the digital checkout experience. This fundamental shift marks the end of the hyper-impulsive era and the beginning of the “consolidated cart.”

UAE Crypto Payment Gateways – Review

The rapid metamorphosis of the United Arab Emirates from a desert trade hub into a global epicenter for programmable finance has fundamentally altered how value moves across the digital landscape. This shift is not merely a superficial update to checkout pages but a profound structural migration where blockchain-based settlements are replacing the aging architecture of correspondent banking. As Dubai and

Exsion365 Financial Reporting – Review

The efficiency of a modern finance department is often measured by the distance between a raw data entry and a strategic board-level decision. While Microsoft Dynamics 365 Business Central provides a robust foundation for enterprise resource planning, many organizations still struggle with the “last mile” of reporting, where data must be extracted, cleaned, and reformatted before it yields any value.

Clone Commander Automates Secure Dynamics 365 Cloning

The enterprise landscape currently faces a significant bottleneck when IT departments attempt to replicate complex Microsoft Dynamics 365 environments for testing or development purposes. Traditionally, this process has been marred by manual scripts and human error, leading to extended periods of downtime that can stretch over several days. Such inefficiencies not only stall mission-critical projects but also introduce substantial security