What America Built at Natanz
Stuxnet was meant to destroy centrifuges. It built Iran's cyber army instead.
The worm arrived at Natanz sometime in 2009, almost certainly on a USB drive carried by someone who did not know what they were carrying. It moved quietly through the Siemens programmable logic controllers that governed the centrifuge arrays, spinning them too fast and then too slow, inducing the kind of mechanical stress that produces catastrophic failure without triggering a single alarm. The PLCs, as they destroyed the machines they governed, simultaneously reported to the operator console that everything was functioning normally. Iranian engineers watched clean readouts while their centrifuges tore themselves apart.
By the time anyone understood what had happened, somewhere between 900 and 1,000 centrifuges had been destroyed. The Federation of American Scientists tracked the decline in operational enrichment capacity: the count at Natanz fell from approximately 4,700 to 3,900 centrifuges during the period the malware was active. The Haaretz assessment in September 2010 put the operational capacity drop at 30 percent. Uranium enrichment at the Fuel Enrichment Plant ceased several times due to what Iranian officials described as a series of major technical problems. Gholam Reza Aghazadeh, the head of Iran’s Atomic Energy Organization, resigned in the first half of 2009. He gave no explanation.
Washington and Tel Aviv denied responsibility. They still do officially. The record tells a different story.
THE ANATOMY OF OLYMPIC GAMES
Operation Olympic Games began under the Bush administration in 2006, when diplomatic pressure through four consecutive UN Security Council resolutions had failed to halt Iran’s enrichment program and Israeli Prime Minister Benjamin Netanyahu was making credible threats to bomb Natanz. General James Cartwright, then head of United States Strategic Command, presented Bush with the framework for a covert cyber campaign. The goal, as the program’s architects described it, was to gain access to Natanz’s industrial computer controls and use code to invade the specialized computers commanding the centrifuges.
The operation was built on physical intelligence gathered over years. American and Israeli engineers did not write code blind. Developers studied Iranian propaganda footage from Nuclear Energy Day in which then-President Ahmadinejad appeared with SCADA system screens visible in the background. Detailed examination of those images identified six groups of centrifuges, each containing 164 tubes. The attack code reflected those exact numbers, targeting six arrays of 164 elements precisely. The CIA and Mossad had also separately penetrated the supply chain of Iranian companies that illicitly acquired Siemens equipment for the centrifuge program. Researchers who studied the program concluded that the developers had inside knowledge of Natanz operations far exceeding anything derivable from IAEA inspection reports.
To test the weapon before deployment, the United States built a replica of the Natanz plant at American national laboratories using the same P-1 centrifuge design Iran operated, centrifuges reportedly procured from Libya’s surrendered nuclear program and tested at the Dimona facility in Israel. Pieces of destroyed test centrifuges were laid out on a White House Situation Room conference table late in the Bush administration. That demonstration gave the green light. When Obama took office, Bush personally urged him to continue the program. Obama not only continued it, he accelerated it.
The NSA, US Cyber Command, CIA, Israel’s Unit 8200, and the Mossad all participated in the operation. Four zero-day Windows vulnerabilities were exploited simultaneously. The Siemens Step 7 software environment was compromised with specificity requiring prior knowledge of Natanz’s exact configuration. The result was what researcher Ralph Langner called a one-shot weapon: designed for a single facility, a single hardware configuration, a single mission.
Stuxnet escaped.
A programming error in an updated version caused the worm to spread when an engineer left Natanz and connected his computer to the internet from home. Within weeks, 60 percent of infected computers worldwide were in Iran, but the malware had replicated onto systems across the globe, including Chevron’s network in the United States. Sources inside the operation, as recounted in the Zero Days documentary, said the Israeli team had deployed a more aggressive version of the worm unilaterally, causing it to propagate beyond the facility’s air-gapped environment. The weapon became public. Security firms began dissecting it. Iran began studying it.
The NSA documented what happened next in its own classified files. A leaked NSA document, cited by Wired, stated explicitly that Iran, having been a victim of a cyberattack against its own oil industry in April 2012, demonstrated a clear ability to replicate the techniques used against it. The agency that built the weapon confirmed in writing that the adversary had learned from it.
NITRO ZEUS: THE PROGRAM STUXNET CONCEALED
Stuxnet was not the ceiling of American cyber ambition against Iran. It was the part that escaped and became visible.
The documentary Zero Days, drawing on sources including NSA personnel, CIA officers, and Israeli intelligence officials, described a broader program codenamed Nitro Zeus. Where Stuxnet targeted one facility and one piece of hardware, Nitro Zeus was designed to disable Iran’s entire critical infrastructure on command: air defenses, communications systems, power grid, and transportation networks. At its operational height, the program involved thousands of American military and intelligence personnel and cost tens of millions of dollars. US Cyber Command pre-positioned electronic implants inside Iranian computer networks to prepare the battlefield, in the Pentagon’s language, for activation if diplomacy collapsed. The New York Times confirmed the program’s existence in 2016. Obama regarded Nitro Zeus as an option short of full-scale war.
A parallel component, separate from the main Nitro Zeus architecture, was designed specifically to insert a computer worm into the Fordo enrichment facility buried inside a mountain near Qom, a site considered unreachable by any US conventional weapon other than the most powerful bunker-buster in the American arsenal. The worm was intended to fry Fordo’s computer systems in the event negotiations failed.
Nitro Zeus was suspended when the JCPOA was agreed in 2015. The implants pre-positioned inside Iranian networks did not simply cease to exist.
Iran knew this. The partial disclosure of Nitro Zeus in 2016 confirmed for Tehran what it had already concluded: that US Cyber Command regarded Iranian civilian and military infrastructure as a legitimate operational target, that pre-positioned malware was already sitting inside Iranian systems, and that the American cyber program extended far beyond Stuxnet and far beyond what had ever been publicly attributed. The strategic lesson required no interpretation. Any country that the United States had pre-positioned for digital shutdown needed the equivalent capability to make executing that shutdown carry a symmetrical cost.
Iran built it.
THE ARCHITECTURE BUILT FROM THE RUINS
By 2012, the Supreme Council of Cyberspace had been established to direct national digital strategy at the highest level of government. The IRGC stood up its Electronic Warfare and Cyber Defence Organization, responsible for offensive cyber operations and for recruiting, training, and coordinating hacker groups across both state and private sectors. The Basij Cyber Council, operating as a paramilitary formation under IRGC supervision, claimed over 1,000 cyber battalions staffed by volunteer hackers designated as cyber war commandos. The Mabna Institute, a private contractor network directly linked to the IRGC, was built specifically for state-directed computer intrusion and data theft. The National Passive Defense Organization was tasked with deploying every national resource to detect and counter incoming attacks against Iranian infrastructure.
This is not a list of loosely coordinated individual actors. It is a tiered institutional architecture constructed within two years of Stuxnet’s public discovery, designed to wage asymmetric digital conflict at scale and to compensate for Iran’s conventional military disadvantages through cost-imposing operations in the one domain where the gap between attacker and defender can be closed cheaply and rapidly.
Iran produces a substantial number of software and computer engineers annually. The cyber ecosystem is not a talent shortage problem. The IRGC and the Ministry of Intelligence and Security ensured a significant portion of that engineering output fed directly into the state cyber apparatus, supplemented by the Basij volunteer network and a sprawling ecosystem of private contractors operating as state proxies. By 2013, an IRGC general declared publicly that Iran had built the fourth-largest cyber army in the world. Western intelligence agencies did not dismiss the claim.
SHAMOON: THE FIRST REPLY
The first major operational demonstration of what Iran had built came at 11:08 a.m. on August 15, 2012, at Saudi Aramco.
A logic bomb triggered across the company’s network. The Shamoon wiper virus erased data on 35,000 workstations and replaced their contents with a burning American flag. Three-quarters of Aramco’s corporate computers were destroyed. Supply management, shipping, and contract management systems collapsed. Aramco reverted overnight to faxes, inter-office mail, and typewriters. The attack had been seeded through a phishing operation targeting a domain administrator as early as April or May 2012, when Aramco’s security operations center was occupied with an ISO certification process and did not treat incoming incident reports as serious. The attackers had spent months inside the network before the logic bomb detonated.
The recovery operation was staggering. Aramco deployed its private fleet of aircraft to purchase hard drives on global markets, temporarily spiking worldwide hard drive prices. It took approximately five months to restore the full network to pre-attack operational levels. The NSA’s internal assessment, later leaked, described the Shamoon attack as the first destructive cyberattack it had observed from Iran against a foreign adversary, and noted directly that Iran had demonstrated it learned from techniques previously deployed against its own systems.
The Shamoon malware itself reveals Iran’s learning methodology in precise terms. The NSA document stated that Shamoon mimicked the wiper malware used against the Iranian Oil Ministry and National Iranian Oil Company in April 2012, the same attack wave from which Wiper had emerged against Iranian targets. Iran watched a technique deployed against its own oil infrastructure, replicated that technique at higher scale, and aimed the replication at a target of greater strategic consequence. The progression from victim to practitioner took under four months.
Qatar’s RasGas was hit in the same operational window. The same month, a sustained distributed denial-of-service campaign struck American financial institutions including Bank of America and JPMorgan Chase, attributed to an Iranian group operating under the name Izz ad-Din al-Qassam Cyber Fighters. The Atlantic Council’s Barbara Slavin was direct about the arithmetic: Iran’s response to Stuxnet cost millions of dollars to the US financial sector, and that was the restrained version.
The Shamoon malware returned in 2016, hitting over a dozen Saudi government agencies and businesses. The operational methodology had evolved: where the 2012 attackers inflicted damage and withdrew quickly, the 2016 operators penetrated networks first, established remote control, gathered intelligence to identify specific organizational targets for the wiper payload, and then detonated. Shamoon had evolved from a blunt instrument into a precision targeting operation run from pre-positioned access.
THE SANDS AND THE PATTERN
In 2014, the Sands Casino in Las Vegas had its internal network destroyed. The attack followed owner Sheldon Adelson’s public suggestion that the United States should detonate a nuclear weapon in the Iranian desert as a demonstration. American cybersecurity officials attributed the Sands attack to Iranian state actors. The casino’s IT infrastructure was wiped, customer data was exposed, and the recovery cost ran into tens of millions of dollars. Iran had responded to a political statement made by a private citizen by destroying the enterprise infrastructure of his company on American soil.
The pattern from 2012 through 2014 established consistent characteristics that have held across every subsequent Iranian cyber operation: target selection tied directly to geopolitical grievance, proportionality in operational ambition calibrated to the triggering event, and progressive technical sophistication with each successive campaign. Simple website defacements in 2010 gave way to enterprise-grade wiper operations by 2012. By 2014, Iran demonstrated the capability to destroy private sector infrastructure inside the continental United States.
THE ADVANCED PERSISTENT THREAT ECOSYSTEM
Iran’s offensive cyber structure now operates through a network of advanced persistent threat groups with distinct targeting mandates reflecting their institutional controllers.
APT33, known as Elfin or Refined Kitten and operating under IRGC oversight, has concentrated on aerospace, energy, and petrochemical sectors since at least 2013. Between 2023 and 2025, Brandefense researchers documented the group’s transition to quieter operational methods: identity-based attacks, modular implants, and segmented infrastructure separating initial access teams from lateral movement teams from command-and-control operations. The compartmentalization limits attribution exposure and contains operational losses when one cell is compromised. This is not improvised tradecraft. It is institutional evolution built across a decade of tracked operations and public attribution.
APT34, known as OilRig or Helix Kitten, has run sustained espionage operations against government, financial, energy, and telecommunications sectors across the Middle East since at least 2014. The group’s SideTwist backdoor uses job opportunity documents with DNS tunneling to establish persistent network access. When OilRig went silent in the days following the February 2026 strikes on Iranian nuclear facilities, Anomali analysts stated the conclusion explicitly: this signals covert pre-positioning, not inactivity. A group running continuous operations for over a decade does not simply stop. It changes posture.
APT35 and APT42, tracked collectively as Charming Kitten and attributed to the IRGC, specialize in sustained social engineering operations targeting journalists, academics, government officials, and political campaign staff across the United States, Europe, and the Middle East. Between June and August 2025, the group ran operations impersonating think tank personnel, initiating benign email contact with targets, then directing them to credential-harvesting pages built to intercept multi-factor authentication tokens in real time using custom React-based phishing kits with WebSocket-driven flow control and keystroke logging across more than 130 attacker-controlled domains. Successful credential theft was followed by deployment of commercial remote management tools for persistent access. Trellix researchers noted that the group’s infrastructure overlapped with Smoke Sandstorm and MuddyWater, suggesting shared personnel across MOIS and IRGC attribution clusters, or deliberate borrowing of proven techniques across Iranian state cyber entities.
MuddyWater, attributed to Iran’s Ministry of Intelligence and Security, has been active since at least 2017. Following the initial US military strikes on Iranian nuclear infrastructure in 2025, Nozomi Networks’ telemetry identified MuddyWater as the most active Iranian APT against American companies, having targeted at least five US firms in Transportation and Manufacturing within a two-month operational window.
Beyond these state-aligned formations, analysts have identified over 120 hacktivist collectives with pro-Iranian orientation. They provide a plausible-deniability layer for operations where direct state attribution would carry diplomatic cost. The Congressional Research Service documented that major attacks attributed to nominally independent groups are typically bankrolled and coordinated by the IRGC. The organizational distance is political insulation, not operational independence.
Fox Kitten, also known as Pioneer Kitten, Lemon Sandstorm, or Parisite in different threat intelligence taxonomies, serves as a persistent intrusion force across global critical infrastructure sectors. Trellix’s 2026 assessment documented the group’s sustained campaign against Middle Eastern energy and infrastructure between May 2023 and February 2025, beginning with VPN credential theft and progressively deepening access through a custom malware ecosystem including HanifNet, HXLibrary, and NeoExpressRAT, with persistence maintained through web shells and proxy-chaining to bypass network segmentation. When initial access was disrupted, the group pivoted to exploit zero-day vulnerabilities in industrial time-management software. This campaign ran continuously for nearly two years before the first American bomb fell in 2025. The access was already there, placed during years of patient operation that preceded the current kinetic conflict.
WHAT THE CURRENT WAR ACTIVATES
As of March 2026, with US and Israeli strikes on Natanz, Fordo, and Isfahan ongoing since late February, the Iranian cyber apparatus is in what analysts consistently describe as a pre-positioning posture. Nozomi Networks, drawing on customer telemetry across the Middle East and United States, documented a systematic increase in Iranian APT activity in early March 2026, concentrated in Transportation and Manufacturing sectors in the US. Vulnerability exposure across Middle Eastern organizations sits at 61 percent high or critical CVSS scores, against a global average of 48 percent. The proportion of vulnerabilities with high EPSS exploit prediction scores is double the global average in the region.
The dominance of default credential abuse, valid account exploitation, brute force, and network scanning in current detection patterns indicates, as Nozomi’s March 2026 assessment noted, that Iranian-linked adversaries are still in the exploratory and positioning phase of their operations. They are mapping environments rather than detonating payloads. The detonation comes later.
DHS issued a national terrorism bulletin following the initial US strikes in 2025, warning of heightened threat conditions and likely cyberattacks against American networks. CISA confirmed active monitoring. The warnings acknowledged what the intelligence community had known for fifteen years: the infrastructure to strike back was already built, already funded, already pre-positioned inside American and allied networks during years of sustained campaigns that ran long before the first bomb fell this time.
The sectors most at risk, according to Deepwatch’s June 2025 assessment, are critical infrastructure including defense and government supply chains, financial services, energy, and healthcare. These are not abstract categories. They are the same sectors Iran demonstrated it could reach with Shamoon in 2012, with the financial sector DDoS campaign that same year, with the Sands attack in 2014, and with the Fox Kitten pre-positioning operations running without interruption through February 2025. The capability was built incrementally over fifteen years. It did not require the current war to exist. The current war only determines when it is used.
THE COST OF THE LESSON
The strategic logic Washington applied at Natanz in 2009 was that a precision cyberweapon could delay Iran’s nuclear program without triggering a conventional military response. The most optimistic Obama administration assessments held that Stuxnet had set the Iranian program back eighteen months to two years. The Institute for Science and International Security estimated the destruction of up to 1,000 centrifuges during the operational window. Iranian technicians replaced those centrifuges. Enrichment resumed. By January 2013, Iran notified the IAEA it planned to install more than 3,000 advanced IR-2m centrifuges, more durable and efficient than the IR-1 model Stuxnet had destroyed. The nuclear program continued. It expanded.
What did not continue was Iranian strategic ignorance of American cyber capabilities and intentions.
Stuxnet showed Iran what was possible in the physical sabotage of industrial infrastructure through malicious code. The Nitro Zeus disclosures confirmed that the American program had pre-positioned implants across Iranian critical infrastructure to disable the country’s air defenses, power grid, and communications on demand. Together these two revelations told Tehran something precise: the United States had already prepared the battlefield for a digital conflict that would accompany any kinetic escalation, and Iran’s critical systems were already compromised. The rational response was to pre-position identically inside American and allied infrastructure, to ensure that any American decision to execute Nitro Zeus carried a symmetrical cost.
Iran spent those years building what the 2014 Institute for National Security Studies report described as one of the most active presences in the international cyber arena. It built the Supreme Council of Cyberspace, the IRGC cyber apparatus, the Basij volunteer battalions, the contractor networks, the APT ecosystem, the hacktivist proxy layer, and the pre-positioned access inside adversary networks that is now the subject of active DHS and CISA warnings.
The NSA knew this progression was coming. Its own classified documents recorded it in real time, noting explicitly that Iran learned from the techniques used against it and replicated them against larger targets. That documentation existed inside the agency before Shamoon had finished wiping Aramco’s hard drives.
Washington built the weapon. Documented the learning. Escalated anyway.
The implants are in the networks. The groups are in pre-positioning mode. The sectors at risk are the same ones that have been targeted continuously for fifteen years.
Blowback.



