The 87-page dossier released on Tuesday is focussed on "Operation Cleaver", an Iranian group of hackers which uses the string "cleaver" in some of its malicious software.
Read MoreHackers target biotech
"This team displays an evolved skillset and uses a complex infrastructure to perform attacks of espionage, theft, and the potential destruction of control systems and networks," Stuart McClure, CEO of Cylance, explained.
Over a two-year period, researchers at Cylance claim to have documented at least 50 attacks by Operation Cleaver on energy infrastructure, airports and airlines, as well as governments across 16 countries. Earlier attacks from Iran have focussed on American and Middle East targets, but now the geographical footprint is wide, the report said, ranging from Canada to South Korea, with a notably heavy concentration in the oil-rich Gulf.
"Such broad targeting demonstrates to the world that Iran is no longer content to retaliate against the U.S. and Israel alone. They have bigger intentions: to position themselves to impact critical infrastructure globally," the report added.
Hacking campaigns sourced out of Iran appear to have increased following a series of cyberattacks on Iranian nuclear facilities, starting with the Stuxnet virus in 2009.