Skip to content

Instantly share code, notes, and snippets.

@Hamid-K
Created July 11, 2025 22:19
Show Gist options
  • Save Hamid-K/a2baf6e4dc0a6e97d8fdca3ce0c14153 to your computer and use it in GitHub Desktop.
Save Hamid-K/a2baf6e4dc0a6e97d8fdca3ce0c14153 to your computer and use it in GitHub Desktop.
ISC "Iran" Reoport cyber-specific summary (HC 1116, Jul 2025)

Iran: Cyber Dimension of the ISC Report (HC 1116, July 2025)

*(All material drawn exclusively from the public text of the report; all redactions **/ are reproduced exactly as printed.)

Original report:

https://isc.independent.gov.uk/wp-content/uploads/2025/07/Intelligence-and-Security-Committee-of-Parliament-Iran.pdf


1. Why Cyber Matters to Iran

Strategic driver Report detail
Regime survival Cyber is treated as an “asymmetric” capability which allows Tehran to threaten adversaries “with minimal risk of retaliation”.
Forward-defence doctrine Offensive cyber and remote proxies fit Iran’s aim of keeping conflict “outside its own borders”.
Low cost / high deniability Tools are “cheap, deniable, and enable [the IIS] to gain information which would not necessarily be possible to obtain within the UK”.
Retaliation Iran sees cyber as a proportionate response when direct military action would be “unachievable or impragmatic”.

2. Iranian Cyber Landscape

2.1 Organisational Spectrum

Category Named in report Characteristics
State-controlled MOIS, IRGC-IO, IRGC-QF Direct tasking, larger budgets, ability to leverage intelligence obtained by other arms of regime.
Affiliated front-companies • Mabna Institute (2013-)
• Rana Intelligence Computing
Work under contract, gather bulk data (e.g., 8 000 academic e-mails), run spear-phish campaigns, receive state protection/sanctions.
Private “patriotic” actors e.g., CHARMING KITTEN Claim ideological loyalty; mix state tasks with private extortion.
Criminal mercenaries Drug-smuggling group run by Naji Sharifizindashti; ransomware crews Hired for remote ops, logistics or physical surveillance. IIS value: deniability & diversified tradecraft.

NCSC: “The ecosystem sits on a sliding scale from organs of the state to private groups with only perceived state links.”

2.2 Signature Clusters & Toolsets

Cluster mentioned Primary activity Tools/techniques in report
APT39 / “PEPPERCAT” Bulk collection of travel & academic datasets. Spear-phish, fake airline portals, credential harvest.
CHARMING KITTEN Target diplomats, think-tankers, health sector. Impersonates Wall St Journal/CNN reporters, fakes social accounts, steals log-ins.
APT33 Disruption of petro-chem sector (KSA, Italy). Shamoon wiper waves; Visual Basic Script droppers; scheduled destructive trigger.
PEPPER Ransomware operations . Encryption + data-leak extortion.
Black Shadow (US media) Hack-and-leak attempts against Israel and academics. Website defacement, TOR leak sites.

Commodity TTPs: password spraying, open-source recon, reuse of leaked credentials, deployment of web-shells on PHP/IIS servers, dual-use pentest tools (Cobalt Strike, Mimikatz), DNS tunnelling.


3. Activity Against UK Interests

3.1 Cyber-Espionage in the UK

  • 2017 Parliament attack – password-spray; 39 mailboxes (MPs & staff) accessed; cited by MI5 as lesson for “raising resilience bar”.
  • Iran International – repeated phishing; 2022 hostile reconnaissance at London HQ; associated phone spoofing & credential phish.
  • Bulk travel & finance datasets – APT39 theft of airline PNR records; NCSC: “almost certainly” used for surveillance / kidnap planning.
  • Academia – fake scholar invitations; 2018 Mabna campaign stole 31.5 TB from 176 universities world-wide incl. UK.
  • Defence sector – APT33 & spear-phish at UK-headquartered oil-services firm ***; malware capable of ICS interference exfiltrated R&D data.
  • Personal e-mail compromises – MOIS targeting of serving & former UK officials, including *** policy advisers, by spoof login pages.

3.2 Offensive & Disruptive Operations with UK Impact

Year Incident UK relevance
2012 Shamoon 1 wiper on Saudi Aramco/RasGas. UK crude prices spiked; UK energy firms alerted via NCSC.
2018 Shamoon 3 against Italian *** firm; 300+ servers lost. UK servers “affected collaterally” (report).
2020 Israeli water-facility infiltration. HMG/NCSC assessed capability could “in theory” target UK utilities.
2022 Albania government wiper. First UK public attribution of destructive Iranian cyber-attack.

No publicly documented direct destructive strike on UK soil, but NCSC warns “UK entities would almost certainly be targeted” if Tehran shifts priority.

3.3 Influence / Disinformation

  • Coverage: nearly 100 covert domains (FireEye study), 28 languages, IRIB funding; Facebook removed 500 Iran-linked assets (Q1 2021).
  • UK focus: Black Lives Matter, Scottish independence (“yes vote” push in 2014), anti-UK-military narratives, repeated attacks on BBC Persian and Iran International credibility.
  • Diaspora intimidation: doctored videos, deep-fake confessions, threats via WhatsApp to relatives in Iran; effect judged “significant” on free speech.

4. UK Policy & Operational Response

4.1 Governance & Strategy

Document Cyber-relevant points on Iran
Integrated Review 2021 + Refresh 2023 Calls cyber a critical domain; 2023 text adds “persistent destabilising behaviour of Iran”.
NSC Iran Strategy (2021, refocused 2023) Four pillars: Nuclear, Threats to UK, Values/Human Rights, Regional Security. “Threats” pillar includes cyber & disinformation.
Counter-State Threats Strategy 2023 Actor-agnostic; Home Office ‘Threats’ strand co-ordinates cyber-resilience, sanctions, legislation.
National Cyber Strategy 2022 Whole-of-society resilience; Active Cyber Defence tool-set.
National Security Act 2023 • “Assisting a Foreign Intelligence Service” offence
• Foreign Influence Registration Scheme – Iran “will be considered for Enhanced Tier”.

4.2 Intelligence & Resilience

  1. NCSC Active Cyber Defence – Protective DNS now mandatory across central government and “wider public sector, including the health sector during the pandemic”.
  2. Tailored Briefings – NCSC + MI5 joint sessions for Parliamentary Digital Service; sector alerts to airlines, academia, energy.
  3. Research Safeguards – Academic Technology Approval Scheme expanded (2021) to stop Iranian students accessing dual-use tech; new Research Collaboration Advice Team.
  4. CNI Assessment – Cabinet Office considering “ambitious targets for all CNI to implement by 2025”.
  5. Intelligence Coverage – *** tri-Agency “Iran Mission”; partner-and-proxy desk in MI5; GCHQ digital transformation to counter “active Iranian counter-espionage”.

4.3 Disruption & Deterrence

Mechanism Detail from report
Public attribution UK statements on Albania wiper; PEPPERCAT & Mabna advisories.
NCF operations SESAME – disruption of *** exfiltration nodes
TAMARIND – counter-ransomware.
Sanctions 508 individuals / 1 189 entities: cyber actors (Mabna, PEPPER), IRGC ransomware crew, UAV manufacturers.
Visa & immigration powers Home Office Special Cases Unit: exclusions & revocations where cyber-espionage suspected; one Royal-Prerogative passport removal ***.
Intelligence diplomacy UK shares technical indicators with Five Eyes & EU; briefings to IAEA, *** “to maintain awareness of Iran’s programme”.

5. Unresolved Issues Highlighted by ISC

  1. Resource vs. Threat – GCHQ Iran staffing down; SIS de-prioritised after JCPOA then forced to “surge”. MI5 still waiting for extra funding requested in previous ISC report.
  2. Legal modernisation lag – Computer Misuse Act update & Official Secrets Act 1989 reform still outstanding, hampering cyber-espionage prosecutions.
  3. FIRS Enhanced Tier – Government “considering” but no decision; ISC expects Iran to be designated at launch.
  4. CNI Exposure & Iran’s ICS intent – Industrial Control Systems risk underlined by Israeli water-facility incident. Committee: “must avoid repeating mistakes that let Russia pre-position”.
  5. Proxy–Criminal Fusion – IRGC hire of ransomware gangs increases unpredictability; current UK disruption capability “a really challenging thing” (MI5).
  6. AI Acceleration – FCDO evidence: regime using generative AI for interception, face-recognition, influence. Threat tempo likely to rise.
  7. Governance Proliferation – “too many boards” (NSC Iran Pillars, FIOG, Defending Democracy Taskforce, Cabinet Office Cyber Unit) → risk of talking vs. doing.

6. ISC Cyber-Specific Recommendations

# Recommendation (verbatim or paraphrased from report)
1 Restore or exceed pre-JCPOA GCHQ/SIS resourcing on Iran; reverse “draw-down”.
2 Include Iran in Foreign Influence Registration Scheme – Enhanced Tier when scheme commences.
3 Complete Computer Misuse Act overhaul and Official Secrets Act 1989 reform; set binding cyber-resilience baselines for Critical National Infrastructure by 2025.
4 Expand National Cyber Force counter-Iran portfolio; develop rapid “interdict-and-expose” playbooks to raise Iranian costs.
5 Mandatory NCSC cyber-hygiene baseline for academia, travel & diaspora organisations; stronger parliamentary guidance on office vetting.
6 Government must provide annual statement on outcomes of Defending Democracy Taskforce; rationalise overlapping boards.
7 Where Tehran uses intimidation, HMG should state publicly that attacks on dissident/Israeli/Jewish targets in UK do equal attacks on UK.
8 Maintain evacuation planning for a regional cyber/kinetic escalation; ensure lessons from Afghanistan withdrawal applied.

References (all from ISC Report HC 1116)

  • Threat sections: pp. 87–108 (Cyber Environment & Capabilities); pp. 93–103 (Offensive Cyber); pp. 103–113 (Interference).
  • UK response: pp. 203–208 (Offensive Cyber Response); pp. 201–203 (Cyber Espionage); pp. 129–147 (Strategy/Policy).
  • Legal tools: pp. 179–185 (Legislation, Sanctions, Proscription).
  • Resourcing & Coverage: pp. 151–176 (Resourcing; UK Intelligence Coverage).

(All numbers, code-words, redactions and agency quotations appear exactly as in the published pdf.)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment