
Send Email
Confidentiality Guaranteed
Confidentiality Guaranteed

Online fraud

Iranian-linked hackers are focused on Web-exposed Rockwell/Allen-Bradley programmable logic controllers (PLCs) on the networks of U.S. severe infrastructure organizations.
The warning came earlier as of late within the acquire of a joint advisory authored by the FBI, CISA, NSA, the Environmental Protection Agency (EPA), Division of Energy (DOE), and the US Cyber Whine – Cyber National Mission Force (CNMF).
The authoring agencies acknowledged that these ongoing assaults possess centered organizations across numerous U.S. severe infrastructure sectors (at the side of Authorities Products and services and Products and services, Water and Wastewater Methods, and Energy), and possess resulted in financial losses and operational disruptions since March 2026.
“The FBI assesses a group of Iranian-affiliated APT actors are targeting internet-exposed PLCs with the intent to cause disruptions—including maliciously interacting with project files, and manipulating data displayed on HMI and SCADA displays—to U.S. critical infrastructure organizations,” the advisory warns.
“Iranian-affiliated APT targeting campaigns against U.S. organizations have recently escalated, likely in response to hostilities between Iran, and the United States and Israel.”
“The FBI identified that this activity resulted in the extraction of the device’s project file and data manipulation on HMI and SCADA displays,” the U.S. agencies added.
A an identical advisory issued in November 2023 warned that the CyberAv3ngers chance community, affiliated with the Iranian Authorities Islamic Innovative Guard Corps (IRGC), had been exploiting vulnerabilities in U.S.-based mostly Unitronics operational technology (OT) techniques.
Between November 2023 and January 2024, CyberAv3ngers hackers compromised in any case 75 Unitronics PLC devices across numerous waves of cyberattacks, half of which were in WWS severe infrastructure networks.
To defend in opposition to such assaults, network defenders are educated to disconnect PLCs from the Web or derive them using a firewall, scan logs for indicators of compromise shared in as of late’s joint advisory, and test for suspicious traffic on OT ports (especially traffic originating from foreign web train hosting companies).
They’ll additionally quiet also enforce multifactor authentication (MFA) for entry to the OT network, retain PLCs up to this level with the most modern within the market firmware, disable all unused services and authentication strategies (comparable to default authentication keys), and video show network traffic for suspicious assignment.
Final month, the Iranian-linked and pro-Palestinian Handala hacktivist community wiped roughly 80,000 devices on the network of U.S. scientific massive Stryker, at the side of workers’ cell devices and private computers managed by the firm.
The FBI also warned that Iranian hackers linked to the nation’s Ministry of Intelligence and Security (MOIS) are using Telegram in malware assaults.
Automated pentesting proves the path exists. BAS proves whether your controls quit it. Most teams shuffle one without the assorted.
This whitepaper maps six validation surfaces, presentations the put protection ends, and provides practitioners with three diagnostic questions for any tool review.
