March 2026 Cyber Environment Update

Security Insights  /  March 2026 Cyber Environment Update

Allan Grant | SOC Analyst | 2 April 2026

The month of March 2026 was defined by a single event: the US-Israeli military campaign against Iran and the cyber operations that accompanied, enabled, and followed it. Beyond the conflict, the month also delivered a reminder that the broader threat landscape continues to evolve regardless of geopolitics, with supply chain compromises, ransomware activity across multiple sectors, and Australia crossing a significant regulatory threshold in IoT security.

The Cyber Dimension of the US-Israeli War Against Iran

The US-Israeli campaign against Iran, which opened on 28 February 2026 with the killing of Supreme Leader Khamenei, has a significant and still-evolving cyber dimension spanning intelligence operations, kinetic strikes on digital infrastructure, and a broad wave of state-backed and proxy hacktivist retaliation.

The precise nature of the cyber operations that accompanied the opening strikes is unclear. What has been confirmed is that cyber capabilities played a role. US Chairman of the Joint Chiefs of Staff General Dan Caine confirmed that coordinated space and cyber operations effectively disrupted communications and sensor networks in Iran prior to the main kinetic strikes, with the explicit goal of leaving the adversary "disrupted, disoriented and confused."

There was also widespread reporting that Israel had hacked Tehran's traffic cameras for years, with footage encrypted and transmitted to servers in Israel. Israeli intelligence then used AI tools and algorithms to map a pattern of life for Khamenei and his protection detail, including travel routes, duty hours, and the identities of assigned officials, enabling the precision strike that opened the campaign. (Wikipedia) (Iran International) (The Jerusalem Post)

Iran's kinetic response against commercial infrastructure

On 1 March, Iranian Shahed drones struck two AWS data centres in the UAE and a third in Bahrain, the first time a country has deliberately targeted commercial data centres during wartime. The strikes took out two of three availability zones in AWS's UAE region.

Iran explicitly cited the facilities' role in hosting US military AI systems, deliberately blurring the line between commercial cloud and military infrastructure. Cascading outages hit major UAE banks, payments platforms, and consumer services across the Gulf.

On 11 March, Israel reportedly conducted a reciprocal strike against a data centre in Tehran, targeting bank services used to pay IRGC members. (Network World) (The Conversation) (Tech Policy Press)

Hacktivist activity

Iran's state cyber capability was constrained in the opening days of the conflict by a near-total internet blackout, with connectivity dropping to between 1 and 4 percent of normal levels, driving greater tactical autonomy among cells operating outside the country. Despite this, proxy groups have conducted significant attacks across the US, Israel, and allied nations.

Iran's cyber retaliation has played out primarily through proxy hacktivist groups, with Handala the most prominent.

Handala presents publicly as a pro-Palestinian hacktivist group, using the imagery of a defiant child that has become a symbol of Palestinian resistance. In practice, multiple Western threat intelligence firms assess it to be an operational front for Void Manticore, a threat actor linked to Iran's Ministry of Intelligence and Security, giving Tehran plausible deniability for destructive cyber operations. (7ai)

Confirmed attacks by Handala include:

Claimed but unverified or denied operations include:

Broader hacktivist action

Handala is not operating alone. As of 2 March, an estimated 60 hacktivist groups had mobilised under a coordinating structure called the Cyber Islamic Resistance, organising operations through a shared channel on Telegram. (Palo Alto Networks)

Implications for Australian organisations

Australian organisations should be aware that Iranian cyber actors are not a new concern.

In October 2024, well before the current conflict, the Australian Federal Police and ASD's Australian Cyber Security Centre co-signed a joint advisory with the FBI, CISA, NSA, and Canada's Communications Security Establishment, warning critical infrastructure operators of Iranian threat actors using brute force and MFA-based techniques to compromise networks across government, healthcare, energy, and technology sectors. (AFP/ACSC)

While Australian authorities have not yet issued public advisories relating to the current conflict, many other allied governments have issued warnings:

The warnings issued by allied governments and the nature of the attacks observed to date suggest that Australian organisations, particularly those in the defence and critical infrastructure sectors, and those with supply chain links to US or Israeli entities in particular should review their exposure and ensure that their cyber controls are in place and operating effectively.

International Cyber Threat Environment

Trivy Supply Chain Attack Turns Security Tool into Threat

Trivy is a widely used open source security tool that helps software development teams scan their code and infrastructure for known vulnerabilities. On 19 March 2026, a threat actor known as TeamPCP compromised Trivy, injecting credential-stealing malware into official releases across GitHub, Docker Hub, and Amazon's container registry simultaneously.

The attack targeted CI/CD pipelines, which are the automated systems that software teams use to build, test, and deploy code, which typically hold broad access to cloud credentials, keys, and infrastructure. The malicious code was injected into over 10,000 CI/CD workflows globally, running before the legitimate scan so pipelines appeared to complete normally while credentials were being stolen in the background. At least 1,000 enterprise SaaS environments are reported to have been affected, and the campaign subsequently expanded to compromise the Checkmarx KICS scanner and LiteLLM Python packages with the same infostealer malware.

The root cause was incomplete remediation of an earlier breach that left residual attacker access in place. Any organisation that ran Trivy between 19 and 23 March 2026 should treat all secrets accessible from those pipelines as compromised and rotate them immediately. (Microsoft) (Arctic Wolf) (Aqua Security)

Notable International Breaches and Incidents

Australian Incidents

March saw Australian organisations continue to feature on ransomware group leak sites, with healthcare remaining a consistent target and two separate organisations pursuing court injunctions to prevent stolen data from being published, which is an emerging legal response that is gaining traction in Australia.

Australian Policy Developments

For the first time, baseline IoT security is a legal requirement. Manufacturers must now ensure devices ship without universal default passwords, publish a  vulnerability disclosure process, and disclose how long security updates will be provided. The regime applies not only to Australian organisations but to any overseas manufacturer or supplier whose products are sold into the Australian consumer market. standards align closely with the internationally recognised ETSI EN 303 645 baseline for consumer IoT security, placing Australia alongside the UK, EU, and other jurisdictions moving in the same direction (Department of Home Affairs)

4 March 2026 marked the commencement of the Cyber Security (Security Standards for Smart Devices) Rules 2025, established under the Cyber Security Act 2024. The rules introduce mandatory cyber security standards for most smart devices acquired in Australia by a consumer, following a 12-month transition period.

This is a welcome development. These requirements directly target some of the most persistently exploited weaknesses in consumer IoT - default credentials have long powered large-scale botnets  and opaque update lifecycles leave consumers running devices with known vulnerabilities long after vendors have moved on. By making these obligations enforceable rather than voluntary, and extending them to any vendor seeking access to the Australian market, the rules represent a meaningful uplift in baseline security.

ACSC cyber updates

The ACSC published two notable alerts during March 2026. Australian organisations should review these directly at cyber.gov.au and apply recommended mitigations where relevant.

CONTACT US

Sign up or speak with a Fortian Security Specialist

Request a consultation with one of our security specialists today or sign up to receive our monthly newsletter via email.  

Get in touch