TI Mindmap HUB
Threat Intelligence Report

Initial access techniques used by Iran-based threat actors

📅 March 18, 2026 📰 www.sophos.com 🔍 9 CVE(s) referenced

Iranian threat actors consistently rely on cost-effective, repeatable initial access methods—primarily social engineering, rapid exploitation of public vulnerabilities, and abuse of weak or stolen credentials—to infiltrate organizations and launch wide-ranging cyber campaigns.

vendor
CVE-2021-26857, CVE-2020-12812, CVE-2019-5591, CVE-2021-26858, CVE-2021-26855, CVE-2021-27065, CVE-2018-13379, CVE-2021-44228, CVE-2021-34473

Sign in to access the full report including:
detailed analysis, IOCs, MITRE ATT&CK mapping, and STIX bundle.

🔐 Sign In to Read Full Report

You'll need to accept our Terms of Service to access the platform.

📊 Visual Mindmap
🎯 IOC Extraction
⚔️ MITRE ATT&CK TTPs
📦 STIX 2.1 Bundle