Morning Overview

US cyberwarriors quietly join the big leagues in digital war with Iran

Multiple U.S. federal agencies have escalated their coordinated response to Iranian cyber operations targeting American elections and critical infrastructure, combining criminal indictments, financial sanctions, and defensive advisories in a campaign that reflects a quiet but significant expansion of Washington’s digital confrontation with Tehran. The effort spans the FBI, NSA, CISA, U.S. Cyber Command, and the Treasury Department, and it has intensified sharply around the 2024 presidential election cycle. What makes this moment distinct is not any single hack or leak but the breadth of tools the U.S. government is now deploying simultaneously against Iranian cyber actors, from courtroom charges to network defense guidance for political campaigns.

Stolen Campaign Files and the 2024 Election

The clearest trigger for the recent escalation came over the summer of 2024, when Iranian actors directly targeted the American presidential race. In late June and early July 2024, Iranian malicious cyber actors sent unsolicited emails to individuals associated with Biden’s campaign containing excerpts from stolen, non-public Trump campaign material, as described in a joint intelligence and law enforcement statement from the Office of the Director of National Intelligence, the FBI, and CISA. The same statement noted that the actors continued sending the stolen material over time, underscoring that this was a sustained operation designed to shape the information environment around the election rather than a one-off leak.

The Department of Justice followed with its own action, unsealing an indictment charging three alleged IRGC cyber operators with a multi-year hacking conspiracy beginning around January 2020. According to the detailed charges, the defendants allegedly used spearphishing, social engineering, and other techniques to steal non-public campaign materials and conduct hack-and-leak operations intended to influence the 2024 U.S. presidential election. In parallel, the Treasury Department imposed sanctions on Iranian regime agents for activity since at least May 2024 that included compromising campaign-related accounts and leaking stolen data to media outlets, a move documented in a sanctions announcement that explicitly framed the campaign as an effort to undermine democratic processes. Together, the indictment and sanctions package represent one of the most forceful and coordinated U.S. responses to a foreign election interference effort since the Russian operations that drew scrutiny in 2016.

Infrastructure Under Siege Beyond the Ballot Box

Election meddling has drawn the most public attention, but a parallel Iranian cyber campaign against U.S. critical infrastructure may carry greater long-term risk. A joint advisory from CISA, the FBI, the NSA, and several international partners described how Iranian cyber actors used brute force and credential access techniques to compromise organizations across healthcare, government, IT, engineering, and energy sectors. The advisory emphasized that these were active intrusions, not hypothetical scenarios, documenting real-world compromises of hospitals, government systems, and industrial networks that provide essential services to Americans, and urging organizations in these sectors to review the guidance and harden remote access pathways.

The infrastructure threat also has a significant financial and criminal dimension. Another joint alert from CISA, the FBI, and the Department of Defense Cyber Crime Center linked Iran-based actors to access-brokering and ransomware enablement affecting U.S. education, finance, healthcare, defense, and local government entities. According to that advisory, Iranian-linked operators have sold or otherwise provided network footholds to ransomware groups, blurring the line between state-directed espionage and profit-driven cybercrime. This hybrid model complicates the job of network defenders, who cannot safely assume that a ransomware intrusion is “just” about extortion when the initial access may have been created or facilitated by actors aligned with Tehran’s security apparatus and capable of reusing those same pathways for more strategic purposes.

A Pattern Stretching Back Years

The current wave of Iranian cyber aggression did not emerge suddenly in 2024; it reflects a trajectory that U.S. officials have been tracking for years. In 2020, CISA and the FBI warned that Iranian advanced persistent threat actors were using fictitious and spoofed media sites, leaked voter-registration data, and tailored misinformation themes to interfere with U.S. elections, in a campaign aimed at amplifying social and political divisions. Those earlier warnings signaled that Iran saw value in information operations and electoral disruption, laying the groundwork for the more targeted hack-and-leak efforts now aimed at presidential campaigns and their staff.

On the technical front, Iranian government-sponsored groups have repeatedly exploited widely known software flaws to gain access to sensitive networks. A joint advisory from CISA and the FBI described how Iranian APT actors leveraged Microsoft Exchange ProxyShell vulnerabilities from at least March 2021 and multiple Fortinet FortiOS issues from at least October 2021 to compromise U.S. critical infrastructure and other high-value targets, emphasizing that these were unpatched but well-documented weaknesses rather than novel exploits. The alert on these vulnerabilities portrayed a persistent pattern. Once proof-of-concept code or public guidance emerged, Iranian operators moved quickly to scan for and exploit lagging organizations, often using the same access for follow-on actions such as data theft, lateral movement, or deployment of additional malware. The persistence of these campaigns, stretching across multiple years and software platforms, suggests an operational tempo that U.S. defenders have struggled to consistently match.

Washington’s Whole-of-Government Counterpunch

What distinguishes the current U.S. response is its coordinated, multi-agency character, which treats Iranian cyber operations as a strategic threat rather than a series of isolated incidents. The Treasury Department has sanctioned IRGC-affiliated cyber actors connected to ransomware and broader malicious activity since at least 2020, describing the effort as a whole-of-government response that brings together the Justice Department, the State Department, the FBI, U.S. Cyber Command, the NSA, and CISA. The combined use of indictments, sanctions, and operational defense guidance also signals that U.S. cyber forces are increasingly participating in this confrontation as part of a broader digital campaign against Iran. These sanctions aim not only to freeze assets but also to stigmatize specific individuals and entities, complicate their ability to transact internationally, and signal to other would-be partners that association with Tehran’s cyber apparatus carries reputational and financial costs.

At the same time, U.S. agencies are sharpening their defensive outreach, particularly to the political ecosystem most directly threatened by election-focused operations. CISA and the FBI have issued fact sheets tailored to people and organizations tied to national political campaigns, explaining how IRGC-linked actors use social engineering across email and chat applications, and urging campaigns to adopt stronger authentication, incident reporting, and information-sharing practices. The FBI has also encouraged politically exposed organizations and critical infrastructure operators to sign up for its cyber-related alerts, which distribute timely warnings and technical indicators that can be fed directly into security tools. Taken together, these measures illustrate a shift from reactive incident response toward a more proactive posture that combines law enforcement, intelligence, financial pressure, and practical guidance to raise the cost of Iranian cyber operations and reduce their chances of success.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.