Home Cybersecurity Disaster Recovery Identity Security AI Governance Sectors IT Services About Insights Contact
Cybersecurity

Iran's New Strategy: Why State Hackers Now Hire Real Criminals

17 March 2026 · 4 min read

← All insights

Iranian state-sponsored hackers have evolved from merely impersonating cybercriminal groups to actively collaborating with genuine criminal enterprises, creating unprecedented challenges for threat attribution and organisational defence. According to reporting from Dark Reading, recent research from Check Point reveals that Iran's Ministry of Intelligence and Security (MOIS) operatives are now working directly with the cybercriminal ecosystem they previously only mimicked.

State-sponsored Advanced Persistent Threat (APT) groups represent nation-state cyber operations designed to achieve strategic intelligence, economic, or political objectives through sustained network intrusions. The traditional model saw these groups operating independently, occasionally adopting criminal tactics as cover for their activities.

Key Facts:
- MOIS operatives are now directly collaborating with actual cybercriminal groups rather than merely imitating them
- This shift represents a fundamental change from deception to genuine partnership with criminal enterprises
- The convergence complicates threat attribution and makes defensive strategies more challenging
- Traditional indicators of state-sponsored versus criminal activity are becoming increasingly unreliable

The Attribution Challenge for UK Organisations

This convergence of state and criminal operations creates immediate problems for UK security teams attempting to understand and respond to attacks. When Iranian state actors collaborate with genuine cybercriminals, the resulting attacks blend the sophisticated persistence of APT groups with the profit-driven efficiency of criminal operations. This makes it significantly harder to determine whether an organisation faces a targeted state-sponsored campaign or opportunistic criminal activity.

The NCSC has consistently warned UK organisations about the difficulty of attributing cyber attacks, particularly those originating from Iran. This new collaboration model intensifies that challenge. Security teams can no longer rely on traditional indicators such as attack sophistication, targeting patterns, or monetisation methods to distinguish between state and criminal threats.

Why Iran Chose Criminal Collaboration

Iranian intelligence services gain several strategic advantages through genuine criminal partnerships. Criminal groups provide established infrastructure, proven attack methods, and existing victim networks that state actors can leverage without developing these capabilities internally. This approach also enhances operational security by making state-sponsored activities appear as routine criminal enterprise.

The criminal partners benefit from state-level resources, including advanced reconnaissance capabilities and sustained operational funding. This symbiotic relationship allows both parties to achieve objectives that might be beyond their individual capabilities. For UK organisations, this means facing threats that combine the strategic patience of nation-state actors with the operational agility of criminal enterprises.

What This Means for UK Business Defence

UK organisations must now assume that sophisticated attacks may simultaneously serve both criminal profit motives and state intelligence objectives. This dual-purpose nature of modern Iranian operations means that even apparently straightforward ransomware attacks could be gathering intelligence for state purposes alongside generating revenue.

The traditional approach of tailoring defences based on perceived threat actor type becomes less effective when those categories blur. Organisations can no longer assume that paying a ransom ends their exposure, as state actors may retain access for ongoing intelligence collection even after criminal objectives are satisfied. This convergence particularly affects sectors with strategic value to foreign intelligence services, including critical infrastructure, defence contractors, and technology companies.

Boardroom Questions

How does our current threat intelligence capability distinguish between state-sponsored and criminal attacks when these categories increasingly overlap?

What additional controls do we need when assuming that successful criminal attacks may also serve foreign intelligence purposes?

Are our incident response procedures adequate for scenarios where attackers have both immediate financial and longer-term espionage objectives?

Quick Diagnostic

Does your threat intelligence programme specifically account for hybrid state-criminal operations rather than treating these as distinct threat categories?

Can your security operations centre identify when an apparently criminal attack shows signs of secondary intelligence-gathering activities?

Do your incident response plans address the possibility that paying a ransom may not end unauthorised access if state actors are also involved?

PTG Advisory Team
Pacific Technology Group

Related Reading

Fake VPN Downloads Stealing UK Corporate Credentials Through SEO Trickery — Storm-2561 cybercriminals are manipulating Google search results to distribute signed malware disguised as legitimate VP

Data Centers Become War Targets as Iran Strikes AWS Facilities — Iranian attacks on AWS infrastructure reveal how geopolitical conflicts now threaten business operations directly. UK or

NCSC Issues Alert as Middle East Tensions Spill Into Cyberspace — The NCSC warns UK businesses of heightened cyber threats from Middle East conflicts. Mid-market companies face indirect

Microsoft Teams A0Backdoor Attacks Target UK Financial Services — Cybercriminals are using Microsoft Teams to deploy A0Backdoor malware via fake Quick Assist requests, bypassing traditio

FBI Launches Steam Investigation After Gaming Malware Steals Millions — FBI seeks victims of Steam malware that stole cryptocurrency and credentials across seven games from May 2024 to January

Strengthen your organisation's security posture

Take the PTG Cyber Assessment Speak With Our Advisory Team

Ready to strengthen your cyber resilience?

Talk to our team about protecting your organisation against evolving threats.

Get in Touch