Cybersecurity researchers at Akamai are reporting a sharp rise in malicious online activity following the outbreak of conflict involving Iran, with cybercrime increasing by 245% since late February. The surge includes widespread activity such as credential harvesting attempts, automated reconnaissance, and probing of enterprise infrastructure as attackers capitalize on geopolitical instability.
The financial sector has been the most heavily impacted, accounting for approximately 40% of observed malicious traffic, followed by e-commerce, gaming, and technology companies.
Researchers also observed significant increases in:
- Automated reconnaissance traffic – Up 65%
- Credential harvesting attempts – Up 45%
- Infrastructure scanning for exposed services Up 52%
- Botnet-driven discovery traffic – Up 70%
- DDoS reconnaissance – Up 38%
Analysts warn that the volume and sophistication of activity are likely to persist as cyber operations continue to accompany broader geopolitical tensions.
Sunil Gottumukkala, CEO, Averlon provided this comment:
“The surge in activity following geopolitical tensions is consistent with what we typically see in these environments. Early-stage signals like reconnaissance, credential harvesting, and infrastructure probing tend to increase significantly as attackers look for initial access opportunities.
“Enterprises should assume this activity will persist and focus on preparedness. That means staying on top of attack surface and exposure management to reduce exploitable vulnerabilities and ensure known weaknesses cannot be used to gain initial access. It also means strengthening identity security and monitoring for credential misuse, since many of these campaigns rely on stolen credentials.
“The organizations that fare best are the ones that treat this activity as a precursor to more targeted attacks and invest in visibility into their exposure and rapid remediation of high-risk issues.”
Michael Bell, Founder & CEO, Suzu Labs supplied this comment:
“The 245% number is real but the breakdown underneath it matters more than the headline. Only 14% of the malicious traffic Akamai observed originated from Iranian IPs. Russia accounted for 35% and China 28%, which tells you this isn’t just Iranian retaliation. Russia and China are taking a “never let a good crisis go to waste” approach, using the conflict as operational cover to ramp up scanning, credential harvesting, and infrastructure mapping while defenders are focused on the named adversary.
“The attack mix confirms it. Botnet discovery traffic up 70% and automated reconnaissance up 65% means most of what Akamai is measuring is the setup phase, not the main event. The actual attacks that follow this reconnaissance, using the access and mapping being built right now, will be worse than the current numbers suggest.”
Phillip Wylie, Chief Security Evangelist & Senior Consultant, Suzu Labs follows with this comment:
“Geopolitical conflict has always created opportunity for cyber threat actors, whether they are nation-state aligned groups, cybercriminals exploiting distraction, or opportunistic attackers taking advantage of heightened uncertainty. What we are seeing now is consistent with historical patterns where global instability increases scanning, credential attacks, and reconnaissance activity as organizations shift attention toward crisis response.
“What stands out is not just the volume increase but the automation behind it. Attackers are clearly leveraging AI-assisted tooling, botnets, and automated discovery techniques to quickly identify weak points while defenders are distracted. This reinforces the importance of continuous exposure management, strong identity security, and monitoring for abnormal reconnaissance behavior, not just traditional alert-driven detection.
“Organizations should treat these spikes as a reminder that external events often translate into increased cyber risk. Security teams should prioritize basic defensive discipline such as patching exposed services, enforcing MFA, monitoring for credential abuse, and validating DDoS readiness. In periods of global tension, good cyber hygiene and visibility often make the biggest difference.”
Jacob Warner, Director of IT, Xcape, Inc. had this comment:
“The recent surge in Iranian cyber activity following Operation Epic Fury highlights a sophisticated “loud vs. quiet” strategic pivot. High-profile “wiper” attacks, where large amounts of data are deleted, on entities like Stryker dominate headlines and cause immediate operational paralysis. Meanwhile, state-sponsored actors are simultaneously executing quiet, long-term espionage campaigns.
“For security professionals, the danger lies in the “loud” attacks serving as a massive smoke screen, drawing incident response resources away from deep-seated persistence in critical infrastructure.
“Defenders must look past the immediate carnage of defacements and wipers to hunt for “living off the land” techniques and compromised administrative tools like UEM and MDM platforms. Prioritizing identity security and behavioral analytics is the only way to catch the quiet intruder while the sirens are blaring.
“In modern conflict, the wiper attack is just a loud invitation to a heist that has been running for months.”
We clearly live in interesting times. That is a bad thing at the moment as threats from threat actors are all around us. Meaning that we all have to be on our toes to counter those threats.
Freedom Mobile Appears To Have Been Pwned AGAIN
Posted in Commentary with tags Freedom Mobile, Hacked on March 20, 2026 by itnerdAs frequent readers of this blog might be aware, I am a Freedom Mobile customer. Their pricing and amazing roaming options are what attracted me to the carrier. But I have to admit that I am now rethinking my life choices as based on this Reddit thread as some Freedom Mobile customers are getting an email that says that between January 12 and 18, 2026 the telco got pwned and the following data was swiped:
This was further backed up by this post on the Freedom Mobile website that showed up on March 18th. And based on the data that was swiped, highly targeted phishing attacks are likely on the horizon for Freedom Mobile customers. Something that I should point out is that only Freedom Mobile customers who have been affected got an email. But you should not assume that if you are a Freedom Mobile customer and you didn’t get an email that you are in the clear.
For those keeping score at home, this is the third time that Freedom Mobile has been pwned. They have been pwned in December 2025, and they were pwned in 2019. Thus proving that what I said about how substandard their security is was accurate. Freedom Mobile honestly needs to justify why their customers should continue to be their customers because this telco clearly has a problem that they can’t or won’t fix. So Freedom, are you going to do that and detail how you are going to ensure that there is not a fourth go round of getting pwned? Or are you going to simply stay silent and hope that this simply goes away? I’ll be watching to see which route you take. And so will your customers. Choose which path you take wisely.
Leave a comment »