Today produced the clearest strategic picture of the Iran-US conflict's cyber dimension since it began on 28 February.
The defining finding: two of Iran's most senior national security officials were killed, named Iranian cyber operators were physically eliminated — and the attacks continued anyway. Decapitation is not deterrence when the infrastructure is distributed.
ISraeli strikes killed Ali Larijani, Secretary of Iran's Supreme National Security Council, and Gholamreza Soleimani, Commander of the Basij. Forbes confirmed US and Israeli strikes also killed at least two named Iranian cyber operators, including Mohammad Mehdi Farhadi Ramin, DOJ-charged in 2020 for aerospace and defence hacking. Iranian operations continued without detectable pause. Iran's hacktivist proxy layer — Handala, Void Manticore, MuddyWater — is sufficiently decentralised to sustain operations regardless of who in the IRGC is still alive.
CISA published a Cyber Vulnerability Insights Estimate cataloguing 136 CVEs that Iranian government-sponsored actors have targeted or exploited — the most authoritative Iranian targeting watchlist published to date, covering all 16 US critical infrastructure sectors.
The Stryker forensic picture was corrected: the attacker used a compromised existing Intune administrator account, not a newly created Global Admin. Detection rules updated after early Stryker reporting that target new account creation have a gap. NHS UK procurement is now formally affected — Day 11 is the longest documented sustained US medtech disruption from a destructive cyberattack.
Six defensive actions with the highest signal-to-noise ratio: (1) Update Intune detection rules to alert on bulk Wipe commands from existing privileged accounts. (2) Patch Hikvision CVE-2017-7921 and Rockwell CVE-2021-22681 — CISA KEV, March 26 deadline, nine days. (3) Signal Registration Lock for senior leaders. (4) Chrome 146.0.7680.75+ — March 27 federal deadline. (5) Patch any pac4j-jwt Java services — CVE-2026-29000, CVSS 10.0, public PoC live. (6) Wing FTP Server 7.4.4+ — March 30 deadline, confirmed RCE chain active.