dimmed lighted office
Security
admin  

EU vs. Cyber Contractors: Targeting Chinese and Iranian Firms to Degrade Attacks

The European Union has shifted from broad sanctions rhetoric to targeted measures aimed at private cyber contractors from China and Iran, with the explicit goal of degrading their ability to operate against European targets. Those measures—asset freezes, travel bans and prohibitions on EU financial support—apply now to 19 individuals and seven entities identified in recent investigations and allied enforcement actions.

Who was named and why this is different

The list includes Integrity Technology Group, linked to the ‘Raptor Train’ botnet built from roughly 260,000 infected devices, and Anxun Information Technology (aka i‑Soon), whose 2024 data leak exposed offensive toolkits and evidence of hacker‑for‑hire work dating back to 2011. On the Iranian side, Emennet Pasargad is singled out for selling 230,000 Charlie Hebdo subscriber records for 20 bitcoins and hijacking digital billboards ahead of the 2024 Paris Olympics; the U.S. Department of Justice has offered rewards for information on individuals tied to Emennet.

These listings matter because they target private firms and contractors—not just state intelligence services—and the EU’s package explicitly cuts off financial and logistical channels inside Europe. That moves enforcement from symbolic naming to concrete operational constraints aimed at making continued attacks more expensive and logistically fraught for the suppliers themselves.

How the sanctions are intended to disrupt operations

Sanctions combine three practical blocks: asset freezes that lock funds or property in EU jurisdictions, travel bans that restrict movement of key personnel, and legal prohibitions on EU entities providing any financial, technical or economic resources to the named actors. The EU action mirrors earlier U.S. moves—Integrity Technology Group was sanctioned by the U.S. Treasury in January 2025—creating coordinated pressure across jurisdictions.

Entity Primary allegation Scale or evidence EU measures Related U.S. action
Integrity Technology Group Operator/supplier for ‘Raptor Train’ botnet ~260,000 infected devices used for disruptive ops Asset freeze, travel ban, cut-off from EU finance Sanctioned by U.S. Treasury (Jan 2025)
Anxun Information Technology (i‑Soon) Hacker‑for‑hire, offensive toolkits exposed 2024 leak revealed internal operations and toolkit Asset freeze, travel ban, service restrictions Public exposure via leak; targeted by EU measures
Emennet Pasargad Data sales, disinformation and espionage Sold 230,000 Charlie Hebdo subscriber records (20 BTC); billboard hijacks Asset freeze, travel ban, service restrictions U.S. DOJ reward offers; wider law‑enforcement interest

How Chinese contractors and Iranian actors differ in tactics

Chinese-linked contractors named in the sanctions—like Integrity and Anxun—tend to specialize in scalable offensive tooling and managed botnet services that can be rented or integrated into hybrid campaigns; the Raptor Train example shows how a contractor model can aggregate hundreds of thousands of compromised endpoints. By contrast, Iranian-linked actors such as Emennet have mixed criminal‑and‑political tradecraft: data exfiltration, dark‑web sales, and public influence operations timed around events like the 2024 Paris Olympics.

That practical difference influences what disruption looks like. Cutting financial flows to a contractor can shrink its capacity to maintain botnet C2 infrastructure or pay for bulletproof hosting, while stopping influence operations requires both data seizures and counter‑messaging. The EU’s design reflects this distinction by pairing financial and travel restrictions with law‑enforcement cooperation expected across member states and with U.S. counterparts.

Concrete checkpoints: how to tell if the sanctions work

Success is measurable only by operational indicators, not headlines. Meaningful checkpoints include sustained drops in botnet command‑and‑control traffic tied to Integrity’s infrastructure, a halt or steep decline in dark‑web listings tied to Anxun and Emennet, and visible freezes of assets or arrests of named individuals in EU jurisdictions. Europol’s current alerts about rising Iran‑linked cyber threats underline why verification matters: critical infrastructure—power, health and comms—remains exposed while campaigns continue regionally.

green and white typewriter on blue textile

Short Q&A

Q: When should we expect signs of impact? A: Look for technical indicators within weeks (DNS takedowns, C2 sinkholing) and financial/legal markers over months (asset seizures, prosecutions).

Q: Can sanctioned firms simply move operations elsewhere? A: They can try, but relocation raises costs and coordination demands; continued service degradation or loss of European revenue channels will constrain many contractor business models.

Q: Will this stop state‑level cyberattacks? A: No single measure will. The EU’s action narrows a supplier class and raises the price of contracting offensive capabilities inside Europe, but state programs with indigenous capacity remain a separate, harder problem.