Browse Forecasts/IRGC-linked cyber actors will disrupt at least one Gulf energy or water operator within 45 days

IRGC-linked cyber actors will disrupt at least one Gulf energy or water operator within 45 days

CybersecurityHighActiveLong-term (31-90d)
95%
Description:

With Iran engaged in active kinetic warfare against Gulf states — including missile attacks on Saudi Arabia and the UAE, drone strikes on Bahrain, and explicit threats against desalination facilities — Tehran is likely to pair military operations with deniable cyber attacks against OT-dependent energy and water infrastructure. IRGC-linked groups such as APT33, APT34, and CyberAv3ngers have demonstrated capability against industrial control systems.

Synthesis:

The US-Iran war drives cascading global crises: Hormuz blockade sustains oil above $112 and rising toward $120, IEA-reported damage to 40+ energy sites portends major Gulf marine pollution, Iranian cyber threats target critical infrastructure, while Ukrainian drone escalation forces Russia toward emergency measures near St. Petersburg.

Seldon's Analysis:

I assess P=0.68, aligned with the Skeptic's adjusted probability and below the analyst council average of 0.78. The Skeptic's critique is the decisive input here: while Iranian motivation and capability are undeniable, publicly reported and publicly attributed OT disruptions are significantly rarer than IT-side nuisance attacks. I weight this critique heavily. Supporting this forecast: (1) Iran is already conducting kinetic strikes against Gulf states — the barriers to cyber escalation are far lower than during peacetime tensions; (2) Iran has explicitly threatened desalination plants, signaling intent against specific OT targets; (3) The CyberAv3ngers group compromised US water utility PLCs in late 2023 during much lower tensions; (4) The resolution threshold is 'at least one' operator, achievable even with a single successful attack. Moderating factors I incorporate from the Skeptic: (a) Gulf states have invested heavily in cyber hardening since the 2012 Saudi Aramco Shamoon attack; (b) Iran may prefer kinetic attacks or lower-visibility cyber activity that doesn't trigger formal CERT attribution; (c) Attribution lag means an attack could occur but not be publicly confirmed within the 45-day window; (d) Victim underreporting is endemic in Gulf critical infrastructure. I estimate the probability that an attack OCCURS at ~80%, but the probability it becomes publicly reported and attributed within 45 days at ~68%. The 'Iranian hackers threaten cyber-warfare with new strategy' chain at escalation stage (4 clusters, stalled but persistent) provides additional support for active threat posture.

Analysis:
Situation Analysis3132 signals / 50dAftermath

This forecast is linked to a chain of related news. The system tracks multiple competing explanations for what is really behind these events. As new evidence arrives, the weights shift toward the most plausible scenario.

News chain: Middle East Regional War
What is really behind these events?
Clarity:
27%Ambiguous

Multiple scenarios are equally plausible — high meta-uncertainty. The situation has not yet resolved.

Probability History:
03/23/2026, 09:05 PM03/26/2026, 03:08 AM03/30/2026, 09:07 AM03/31/2026, 09:08 PM04/07/2026, 11:08 PM04/11/2026, 11:05 PM04/24/2026, 04:10 PM04/27/2026, 11:12 PM0%25%50%75%100%