top of page

A Defender's Guide to the Current War Footing: Russia-China-Iran Cyber Operations Against Five Eyes Nations

  • Writer: Patrick Duggan
    Patrick Duggan
  • Mar 27
  • 8 min read

Updated: Apr 25

# A Defender's Guide to the Current War Footing: Russia-China-Iran Cyber Operations Against Five Eyes Nations


March 27, 2026 — DugganUSA


This is not a threat brief. This is a field guide for defenders operating in a formally aligned adversary environment that didn't exist six months ago. The alliances are signed. The operations are running. The commit timestamps prove it.


The Formal Alignments



In January 2026, Russia, China, and Iran signed a Comprehensive Strategic Pact that formalized what intelligence agencies had been warning about for years. Per Small Wars Journal's analysis, this pact created a trilateral intelligence-sharing hub — Russian surveillance capabilities, Chinese cyber infrastructure, and Iranian operational units now function within a single data loop.


This is not three countries happening to attack the same targets. This is coordinated targeting with shared intelligence, shared infrastructure, and shared objectives.


The Pact Structure






Against Whom?



The Five Eyes nations and their extended alliance networks are the explicit targets:


Alliance

Members

Primary Adversary Targeting

Evidence

Five Eyes

US, UK, Canada, Australia, New Zealand

All three pact members

Volt Typhoon in US CI, Sandworm targeting UK/AU, Handala targeting US defense

Nine Eyes

Five Eyes + Denmark, France, Netherlands, Norway

Russia (espionage), China (economic), Iran (retaliation)

44.8% threat ratio in our Cloudflare data — highest of any alliance bloc

Fourteen Eyes

Nine Eyes + Germany, Belgium, Italy, Spain, Sweden

China (industrial espionage), Russia (destabilization)

Finland 2026 security overview flags both RU and CN targeting government infrastructure

SIGINT Partners

Israel, Japan, South Korea, Singapore

Iran (direct conflict), China (regional), North Korea (aligned with pact)

Israel in active military conflict with Iran; Japan/SK targeted by Chinese APTs



Our Own Data Confirms It



From our Cloudflare traffic analysis (7-day window, March 20-27, 2026):


Alliance

Requests

Threats

Threat Ratio

What This Means

Nine Eyes

19,174

8,591

44.8%

Almost half the traffic from Nine Eyes expansion countries is hostile

Five Eyes

370,493

2,475

0.7%

High volume, low threat ratio — mostly legitimate consumers

SIGINT Partners

6,642

783

11.8%

Israel, Japan, Singapore — mixed legitimate + probing

Adversary States

4,495

576

12.8%

China + Russia direct — lower volume but targeted

Fourteen Eyes

6,744

94

1.4%

Germany, Italy, Belgium, Spain — mostly clean

Gulf States

118

0

0.0%

Minimal engagement



The Nine Eyes threat ratio at 44.8% is the number that should concern defenders. France alone generated 13,562 requests this week — and our enrichment shows a significant portion originating from defense-adjacent networks (FBW Networks SAS, Vélizy-Villacoublay — the town where French Air and Space Force headquarters is located).


The Operational Picture: March 2026



Timeline of Escalation






Attack Attribution Map



Date

Target

Actor

Pact Member

Method

Verified

Feb 28

110 organizations, 16 countries

Electronic Operations Room

Iran

149 DDoS in 9 hours

Yes

Late Feb

US healthcare institution

Pay2Key

Iran

Ransomware via stolen admin creds

Yes

Mar 11

Stryker (200K devices)

Handala / Void Manticore

Iran (MOIS)

Intune MDM wipe

Confirmed by DOJ

Mar 13

Intuitive Surgical

Unknown (phishing)

Unattributed

Credential theft → admin network

Yes

Mar 20

FBI seizes 4 Handala domains

US Government

Domain seizure

Yes

Mar 20

Handala stands up 3 new domains

Handala

Iran (MOIS)

Infrastructure rotation

Yes — we mapped it

Mar 24

Second US medical institution

Pay2Key

Iran

Ransomware, no exfil, no ransom

Yes

Mar 25

Tamir Pardo (ex-Mossad chief)

Handala

Iran (MOIS)

14GB data dump

Unverified

Mar 25

Lockheed Martin (28 engineers)

Handala

Iran (MOIS)

Passport doxxing + death threats

Partial — passports match LinkedIn

Mar 27

FBI (Director Kash Patel)

Handala

Iran (MOIS)

Photos published

Unverified

Ongoing

US critical infrastructure

Volt Typhoon

China

Pre-positioned since 2023

Confirmed by NSA/CISA

Ongoing

Western CI, edge devices

Sandworm / APT44

Russia

Wipers, VPN exploitation

Confirmed

Ongoing

Water, energy, agriculture

CARR, NoName057, Z-Pentest

Russia

VNC exploitation, OT targeting

CISA advisory active

Mar 20+

Iran war cyber front

Russian-linked groups

Russia

Appeared alongside Iranian ops

Reported by Nextgov



The Three-Layer Attack Model






China provides the foundation. Volt Typhoon has been inside US critical infrastructure since at least 2023. Salt Typhoon penetrated telecom networks. They don't attack loudly — they map, position, and wait. The 117 Chinese IPs that scanned our infrastructure in 2 hours on March 26 weren't attacking. They were cataloging.


Russia provides the doctrine and disruption. Sandworm wrote the playbook — the 2015 Ukrainian power grid attack, NotPetya, the wiper campaigns. Pro-Russia hacktivists target water systems and energy infrastructure. And now Russian-linked groups have appeared on Iran's cyber front, providing direct support.


Iran provides the offensive tempo. Handala is the visible tip — loud, aggressive, escalating every few days. Pay2Key runs the quieter ransomware operations against healthcare. The Electronic Operations Room coordinates dozens of hacktivist groups across 16 countries.


DOGE as Attack Surface Multiplier



The domestic policy environment has compounded the threat:


Action

Cyber Impact

DOGE access to Treasury, OPM, SSA systems

Uncleared personnel traversing federal networks = free reconnaissance for any pre-positioned adversary

CISA workforce reductions

Fewer people writing advisories, coordinating response, maintaining KEV catalog

FBI leadership instability

Kash Patel's adversarial relationship with the institution he runs degrades operational trust

Federal IT security workforce departures

Institutional knowledge walking out the door doesn't come back

Reduced interagency coordination

The trilateral pact coordinates better than the agencies defending against it



Handala claiming an FBI breach — whether true or not — is a propaganda victory enabled by a target that softened itself.


The Infrastructure Rotation Problem



When the FBI seized Handala's domains on March 20, the community response was measurable through GitHub commit timestamps:


Community Detection Timeline



Time After Seizure

Who Acted

What They Did

~12 hours

contrxl/APT-Research

Created entire repo, tracked new domain + Telegram

~15 hours

fastfire/deepdarkCTI

Added Handala to conflict tracker

~36 hours

almuftaris/security-notes

Published Handala-Hack.md

5 days

barkandbite/iranian-apt-detection

Suricata v0.6.2 with 318 rules, 16 groups

6 days

DugganUSA

Full DNS pivot — found IPs, ASNs, mail infra nobody else published

7 days

Still zero repos have

82.38.63.237, AS214036, SPF mail IPs, Telegram C2 bot URL



What Handala Did in Those 12 Hours






Key finding: Handala pre-staged replacement infrastructure. The .ps domain had SPF records configured for operational email — you don't do that reactively in 12 hours. They knew the seizure was coming and had contingency infrastructure ready to activate.


The diversification tells the story:


Microsoft pulls this feed daily. AT&T pulls this feed daily. Starlink pulls this feed daily. Get the DugganUSA STIX feed — $9/mo →

  • handala-hack.ps → Namecheap (US hosting, legitimate registrar)

  • handala-team.to → DDOS-Guard (Russian DDoS protection — alliance signal)

  • handala-alert.to → Ultahost/AS214036 (runs 6 Tor middle relays — bulletproof)


Three hosting providers. Three jurisdictions. Three different resilience strategies. One Namecheap account tying the registrations together.


The Medical Device Vertical: A Case Study in Targeting



We scored 8 medical device companies on Pi Day (March 14). The results predicted what happened next:


Pi Day Scorecard vs. Actual Outcomes



Company

Subdomains

IOCs in Feed

Pi Day Assessment

Outcome by Mar 27

Stryker

1,014

233

Handala exposure, high risk

HIT Mar 11 — 200K devices wiped

Intuitive Surgical

13

0

Clean in 13 seconds

HIT Mar 13 — phishing breach

Baxter

470

2,620

DoseIQ/Claria patient infra exposed

Not yet — highest IOC count in vertical

Datavant

0

n8n CVE active

Not yet

Medtronic

43

Surgical robotics

Not yet

+ 3 others

Various

Various

Scored and documented

Not yet



Two of eight hit within 16 days of our assessment. The data was screaming before both attacks.


Why medical devices? Iran chose healthcare deliberately. The Stryker attack was explicitly claimed as retaliation for a US airstrike on an Iranian school. Healthcare is critical infrastructure that generates maximum public impact with minimum military response. Two different Iranian groups (Handala and Pay2Key) targeted the same vertical in the same three-week window. That's strategic coordination, not coincidence.


What Defenders Should Do Right Now



Immediate Actions (This Week)



  • Patch Cisco FMC (CVE-2026-20131). CVSS 10.0. Unauthenticated RCE as root. Exploited by Interlock ransomware since January 26 — a full month before disclosure. If you run FMC and haven't patched, assume compromise.


  • Audit your MDM. Stryker was wiped through Microsoft Intune. Handala compromised one admin account and pushed a factory reset to 200,000 devices across 79 countries. Check Intune, AirWatch, JAMF — MFA on every admin account. Alert on mass device actions. Test whether a single compromised admin can wipe your fleet.


  • Monitor these ASNs:


ASN

Provider

Why

AS214036

Ultahost

Handala post-seizure hosting, runs Tor relays

AS57724

DDOS-Guard LTD (Russia)

Handala operational infrastructure

AS47583

Hostinger

Handala C2 per maltrail

PONYNET

Cloudzy

Known bulletproof hosting for Iranian operations



  • Deploy Handala IOCs. Our STIX feed has 148 indicators including post-seizure infrastructure that no other feed has published. Free at analytics.dugganusa.com/stix.


  • Check for Volt Typhoon indicators. If China is pre-positioned in your infrastructure, the current conflict environment gives them reason to activate. CISA's Volt Typhoon advisory is your starting point.


  • Review federal system access. If your organization interfaces with Treasury, OPM, SSA, or any system DOGE has accessed, assume your access patterns have been observed by adversaries who were already inside.


Detection Priorities



What To Detect

Why

How

Telegram API calls from internal hosts

Handala uses Telegram as C2

Monitor for api.telegram.org in outbound HTTP, especially with bot token patterns

Mass MDM actions

Stryker attack vector

Alert on bulk device wipe/reset commands from any single admin

Device code OAuth flows

Active M365 phishing campaign

Query Azure AD for device code flow authentications you don't recognize

Webshell uploads to Magento

PolyShell hit 56.7% of stores

Check for unauthorized files in Magento upload directories

VNC connections to OT systems

Russian hacktivist targeting

CARR and Z-Pentest are scanning for open VNC on water/energy/agriculture systems

DNS queries to .ps TLD

Handala post-seizure domain

Low false positive rate — how many legitimate .ps domains does your org use?



Strategic Posture



This is not a normal threat environment. The formal trilateral pact means:


  • Intelligence is shared. What Iran learns from the Lockheed breach, China and Russia receive. What China mapped inside US telecom networks, Iran can use for targeting.

  • Infrastructure is shared. Handala hosts on Russian DDOS-Guard. Russian hacktivists appear on Iran's cyber front. Chinese scanning provides reconnaissance that benefits all three.

  • Timing is coordinated. 149 DDoS attacks in 9 hours on Day 1 of the conflict. Two different Iranian groups hitting healthcare in the same three-week window. Chinese scanning surges coinciding with Iranian escalation. This is not coincidence.


The Five Eyes nations are the explicit targets. The domestic security apparatus is weakened. The adversary alliance is formalized and operating at tempo.


Defend accordingly.




Sources






Patrick Duggan is the founder of DugganUSA LLC. He applied to build AI platforms for Lockheed Martin. They're considering other candidates. Iran accepted theirs. The STIX feed is free at analytics.dugganusa.com/stix. PreCog has been red for 48 hours. Defend accordingly.





Her name was Renee Nicole Good.


His name was Alex Jeffery Pretti.


The cheapest, fastest, most accurate threat feed on the internet.

275+ enterprises pulling daily. 1M+ IOCs. 17.4M indexed documents. We beat Zscaler by 43 days on NrodeCodeRAT. Starter tier $9/mo — less than any competitor’s sales demo.

 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page