CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 10, 2026

Industrial Controllers Still Vulnerable As Conflicts Move to Cyber

Dark Reading Archived Apr 10, 2026 ✓ Full text saved

The US government warns programmable logic controllers are being targeted, and research turns up 179 vulnerable operational technology (OT) devices.

Full text archived locally
✦ AI Summary · Claude Sonnet


    ICS/OT SECURITY CYBERSECURITY OPERATIONS PERIMETER VULNERABILITIES & THREATS NEWS Industrial Controllers Still Vulnerable As Conflicts Move to Cyber The US government warns programmable logic controllers are being targeted, and research turns up 179 vulnerable operational technology (OT) devices. Robert Lemos,Contributing Writer April 10, 2026 4 Min Read SOURCE: 1ST FOOTAGE VIA SHUTTERSTOCK As the US government warns energy companies, water utilities, and industrial firms that state-sponsored adversaries are targeting Internet-connected operational technology, researchers have found a small number of older industrial control systems allow direct access without requiring authentication. A scan of the Internet for operational technology (OT) using the Modbus protocol found at least 179 devices that allow unauthenticated access, according to researchers at technology-evaluation firm Comparitech. While representing a relatively small number of devices, the dozens of public-facing systems are likely being targeted by cyberthreat actors, experts say. While the most common attacks on industrial systems continue to focus on compromising IT systems and then pivoting to operational technology (OT), the direct targeting of Internet-exposed assets remains a significant issue, says Jeff Macre, principal OT security solutions architect at Darktrace, an AI cybersecurity platform. Related:Iranian Threat Actors Disrupt US Critical Infrastructure via Exposed PLCs "Internet-facing control system components, insecure remote access pathways, default credentials, and poorly protected boundary devices continue to create direct routes into industrial environments," he says. "IT-to-OT pivoting remains the dominant path in many incidents, but direct exposure is still one of the clearest and most avoidable sources of OT risk." The US government warned on April 7 that Iran-linked cyberattackers are targeting programmable logic controllers (PLCs), OT devices that automate specific functions in a variety of critical industrial systems, such as those in water and wastewater treatment plants and energy generation facilities. In December 2025, a cyberattack compromised Poland's decentralized wind- and solar-energy infrastructure, but failed to — or did not intend to — cut power to civilians. Multiple analysts connected the attack to Russia-aligned actors.  All the major players in current conflicts — Iran, Israel, Russia, Ukraine, and the US — have also targeted IP cameras as a way to gain intelligence on targeted locations, from the daily habits of Iranian leadership to the level of impact of missile strikes. Serious Physical Consequences' Nation-state attackers targeting critical infrastructure have a landscape ripe for exploitation. In its research, Comparitech used the open source tool Masscan to flag 311 possible open Modbus devices, and excluded systems that showed signs of being a honeypot. The remaining 179 devices exposed the Modbus protocol on the default port 502 without requiring authentication. Related:Vehicle Tire Pressure Sensors Enable Silent Tracking Mantas Sasnauskas, head of security research at Comparitech, stresses that the research likely found a conservative number of systems, and far more insecure and Internet-exposed ICS devices would be found if the scan focused on a wider variety of protocols. "These aren't 179 exposed Web servers — they're industrial controllers with no authentication that anyone on the Internet can read from and potentially write to," he says. "We identified devices tied to a national railway and two national power grids. A single compromised device in those environments can have serious physical consequences." While cyberattackers most often infect IT devices and then pivot to OT devices, groups have started directly targeting OT as well, says Liz Martin, senior director of threat hunting at Dragos, a provider of OT cybersecurity services. "The direct targeting of exposed industrial devices is no longer theoretical, it's happening with enough precision to suggest pre-operational intent to impact OT," she says. Ceasefire? The Danger Remains Organizations should not link their security response to geopolitical events or risks, especially with threats to industrial control systems, says Austin Warnick, director of the national security intelligence team at Flashpoint, a cyberthreat intelligence provider. While nation-state actors are the current primary driver targeting programmable logic controllers in critical sectors such as water and energy, opportunistic groups will often attack those targets irrespective of the relations between nations, he says. Related:Quantum-Resistant Data Diode Secures Sensitive Data on Edge Devices, Critical Systems "Recent intelligence indicates that the distinction between state actors and opportunistic proxies is increasingly blurred, creating a two-tiered threat landscape," Warnick says. "These proxies often treat ceasefires as mere technicalities, maintaining or even escalating their 'cyber jihad' against private-sector infrastructure to exert political pressure when kinetic options are restricted." Companies should be scanning their own systems — both internally and externally — to find their vulnerable devices. Fewer than 10% of OT networks globally have visibility and monitoring in place, creating essentially a visibility gap, according to Dragos. A lack of visibility hampered detection in nearly half of architecture reviews (46%) and the vast majority of tabletop exercises (88%), while nearly a third of incident response cases (30%) began with an unexplained operational issue and not a detected anomaly, according to Dragos's "2026 OT Cybersecurity Year in Review" report. External scans only find what is visible and fail to capture devices behind NAT devices and firewalls, or those behind cellular-connected OT assets, which often are not protected by perimeter defenses, Dragos's Martin says. "Internet-wide scans measure exposure at the perimeter, but the most persistent and consequential gaps are internal: Poor segmentation, weak credentials on privileged accounts, limited OT telemetry, and absence of ICS-aware monitoring," she says. "Those conditions don't show up in [an external scan], but they're what adversaries are exploiting once they're past the front door." About the Author Robert Lemos Contributing Writer Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline Journalism (Online) in 2003 for coverage of the Blaster worm. Crunches numbers on various trends using Python and R. Recent reports include analyses of the shortage in cybersecurity workers and annual vulnerability trends. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Gartner IGA Voice of the Customer 2026 Access More Research Webinars Tips for Managing Cloud Security in a Hybrid Environment? Zero Trust Architecture for Cloud environments: Implementation Roadmap Security in the AI Age Identity Maturity Under Pressure: 2026 Findings and How to Catch Up Building a Robust SOC in a Post-AI World More Webinars You May Also Like ICS/OT SECURITY Bombarding Cars With Lasers: Novel Auto Cyberattacks Emerge by Nate Nelson, Contributing Writer OCT 20, 2025 ICS/OT SECURITY Cyberattack Leads to Beer Shortage as Asahi Recovers by Robert Lemos, Contributing Writer OCT 08, 2025 ICS/OT SECURITY Water Systems Under Attack: Norway, Poland Blame Russia Actors by Robert Lemos, Contributing Writer AUG 15, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 Editor's Choice CYBERSECURITY OPERATIONS RSAC 2026: AI Dominates, But Community Remains Key to Security byKristina Beek,Rob Wright APR 2, 2026 THREAT INTELLIGENCE Axios Attack Shows How Complex Social Engineering Is Industrialized byAlexander Culafi APR 6, 2026 5 MIN READ ICS/OT SECURITY Iranian Threat Actors Disrupt US Critical Infrastructure via Exposed PLCs byElizabeth Montalbano APR 8, 2026 4 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Tips for Managing Cloud Security in a Hybrid Environment? THURS, MAY 7, 2026 AT 1PM EST Zero Trust Architecture for Cloud environments: Implementation Roadmap TUES, MAY 12, 2026 AT 1PM EST Security in the AI Age TUES, APRIL 28, 2026 AT 1PM EST Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Apr 10, 2026
    Archived
    Apr 10, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗