CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 08, 2026

Iranian Threat Actors Disrupt US Critical Infrastructure Via Exposed PLCs

Dark Reading Archived Apr 08, 2026 ✓ Full text saved

Attackers compromised Internet-facing OT devices and caused file and display manipulation, operational disruption, and financial losses across sectors.

Full text archived locally
✦ AI Summary · Claude Sonnet


    ICS/OT SECURITY IOT VULNERABILITIES & THREATS CYBER RISK NEWS Iranian Threat Actors Disrupt US Critical Infrastructure Via Exposed PLCs Attackers compromised Internet-facing OT devices and caused file and display manipulation, operational disruption, and financial losses across sectors. Elizabeth Montalbano,Contributing Writer April 8, 2026 4 Min Read SOURCE: HAKAN GIDER VIA ALAMY STOCK PHOTO Iran-affiliated threat actors are disrupting US critical infrastructure through attacks on Internet-exposed operational technology (OT) devices across numerous sectors, the US government is warning.  The revelation came Tuesday, just before the US and Iran reached a tentative two-week ceasefire agreement in the ongoing war. The campaign by Iranian advanced persistent threat (APT) actors, which began last month, soon after the US and Israel jointly attacked Iran, targets programmable logic controllers (PLCs) — particularly Rockwell Automation/Allen-Bradley devices — used in energy, water and wastewater, and government facilities, according to a joint advisory from the Cybersecurity and Infrastructure Security Agency (CISA) and other agencies. Attackers already have successfully caused disruption to various systems across these industries, specifically manipulation of PLC project files and tampering with HMI and SCADA displays, according to CISA. "In a few cases, this activity has resulted in operational disruption and financial loss," the advisory stated. Related:Vehicle Tire Pressure Sensors Enable Silent Tracking Though the agencies did not specifically identify the actors behind the recent activity, they said it is reminiscent of similar attacks on PLCs by CyberAv3ngers (aka Shahid Kaveh Group), a threat actor affiliated with Iran's Islamic Revolutionary Guard Corps (IRGC) Cyber Electronic Command (CEC). In November 2023, the threat group compromised at least 75 US-based Unitronics PLC devices with an HMI used across multiple critical infrastructure sectors, including wastewater systems. Internet-Facing Devices Accessed The FBI, National Security Agency (NSA), Environmental Protection Agency (EPA), Department of Energy (DOE), and United States Cyber Command–Cyber National Mission Force (CNMF) joined CISA in the advisory, which outlined how Iranian-affiliated APT actors using several overseas-based IP addresses accessed Internet-facing Rockwell Automation/Allen-Bradley-manufactured PLCs. "The actors used leased third-party-hosted infrastructure with configuration software, such as Rockwell Automation's Studio 5000 Logix Designer software, to create an accepted connection to the victim's PLC," the agencies said. Devices specifically targeted included CompactLogix and Micro850 PLC devices, they said.  Loading... Attackers directed malicious traffic to devices via ports 44818, 2222, 102, 22, and 502, as well as port T0885, which signals devices such as the Siemens S7 PLC and others manufactured by companies besides Rockwell Automation/Allen-Bradley also may have been targeted. Related:Quantum-Resistant Data Diode Secures Sensitive Data on Edge Devices, Critical Systems "Additionally, the actors deployed Dropbear Secure Shell (SSH) software on victim endpoints to enable them to gain remote access through port 22 [T1219]," according to the advisory. Apply Mitigations Now Given the history of Iranian attackers targeting US critical infrastructure and the ongoing hostilities between the US and Iran — in which the US has already destroyed some Iranian infrastructure on the ground as part of the war effort — the US is urging critical infrastructure facilities to take immediate action to mitigate attacks. Prior to the ceasefire, President Donald Trump threatened to target Iranian critical infrastructure such as power plants on a grand scale, which also could further Iran's retaliatory cyber attacks on US targets. The problem extends beyond the current conflict, however, as the exposure of PLCs and other OT devices to the public Internet has been an ongoing concern for the critical infrastructure sector for years, notes Gabrielle Hempel, security operations strategist at Exabeam. "If an OT environment is reachable from the Internet, that is an inherent design flaw and not a nation-state problem," she tells Dark Reading. That said, CISA urged critical infrastructure organizations to remove PLCs from direct Internet exposure and implement secure gateways and firewalls. Additionally, security teams should check available logs for suspicious traffic on the ports associated with OT devices, including 44818, 2222, 102, and 502, and especially for traffic originating from overseas hosting providers. Related:'Richter Scale' Model Measures Magnitude of OT Cyber Incidents CISA also included a series of indicators of compromise (IoCs) in the advisory and recommended that potentially affected organizations search available logs for these IOCs in the corresponding time frames. Organizations with Rockwell Automation/Allen-Bradley devices should also place the physical mode switch on the controller into the "run" position. Organizations that suspect their devices may have been targeted should contact the authoring agencies and Rockwell Automation for guidance, the agency noted. About the Author Elizabeth Montalbano Contributing Writer Elizabeth Montalbano is a freelance writer, journalist, and therapeutic writing mentor with more than 25 years of professional experience. Her areas of expertise include technology, business, and culture. Elizabeth previously lived and worked as a full-time journalist in Phoenix, San Francisco, and New York City; she currently resides in a village on the southwest coast of Portugal. In her free time, she enjoys surfing, hiking with her dogs, traveling, playing music, yoga, and cooking. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Gartner IGA Voice of the Customer 2026 Access More Research Webinars Security in the AI Age Identity Maturity Under Pressure: 2026 Findings and How to Catch Up Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need More Webinars You May Also Like ICS/OT SECURITY AI in OT Sparks Cascade of Complex Challenges by Arielle Waldman DEC 11, 2025 ICS/OT SECURITY Critical Railway Braking Systems Open to Tampering by Nate Nelson, Contributing Writer NOV 19, 2025 ICS/OT SECURITY CISO Conversations: How IT and OT Security Worlds Are Converging by Kelly Jackson Higgins JUL 22, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 Editor's Choice CYBERSECURITY OPERATIONS RSAC 2026: AI Dominates, But Community Remains Key to Security byKristina Beek,Rob Wright APR 2, 2026 CYBERATTACKS & DATA BREACHES Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate byNate Nelson APR 2, 2026 3 MIN READ ENDPOINT SECURITY CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry byJeffrey Schwartz APR 3, 2026 3 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Loading... Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Security in the AI Age TUES, APRIL 28, 2026 AT 1PM EST Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Apr 08, 2026
    Archived
    Apr 08, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗