Threat IntelHIGH

CyberAv3ngers - IRGC-Linked Group Targets Critical Infrastructure

Featured image for CyberAv3ngers - IRGC-Linked Group Targets Critical Infrastructure
#CyberAv3ngers#IRGC#ICS Malware#CVE-2021-22681#Rockwell Automation

Original Reporting

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

High severity — significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILECVE-2021-22681CVSS: 9.8ACTIVELY EXPLOITED
Threat Actor / APT GroupCyberAv3ngers
AliasesStorm-0784, Hydro Kitten
AttributionIran's IRGC Cyber-Electronic Command
Target SectorsWater, Energy, Government
Target RegionsUnited States
Active Since2020
Campaign NameCVE-2021-22681 Exploitation
Primary TTPsCredential exploitation, Custom malware deployment
Tools UsedIOCONTROL
MITRE ATT&CKG1027
MotivationGeopolitical retaliation
🎯

Basically, a group linked to Iran is attacking important U.S. systems with advanced hacking tools.

Quick Summary

CyberAv3ngers, linked to Iran, is now targeting U.S. critical infrastructure with advanced malware. This poses serious risks to water, energy, and government sectors. Immediate action is necessary to mitigate these threats.

What Happened

CyberAv3ngers, an Iranian state-directed cyber threat group, has significantly escalated its operations, moving from defacing water utility displays to deploying sophisticated malware targeting critical infrastructure in the U.S. This group operates under the auspices of Iran's IRGC Cyber-Electronic Command and has been linked to various attacks against water, energy, and government facilities.

In April 2026, a joint advisory from multiple U.S. agencies confirmed that CyberAv3ngers is actively exploiting vulnerabilities in internet-facing programmable logic controllers (PLCs), specifically targeting Rockwell Automation systems. This advisory highlighted operational disruptions and financial losses at several organizations, emphasizing the group's growing threat.

Who's Behind It

CyberAv3ngers has been active since at least 2020 and is recognized by various names across the cybersecurity community, including Storm-0784 and Hydro Kitten. In February 2024, the U.S. Treasury sanctioned six officials linked to the group, underscoring its ties to the Iranian government. The group has shown resilience through rebranding efforts, maintaining operational continuity despite attempts to disrupt its activities.

Tactics & Techniques

The group has evolved through several phases:

  1. Propaganda (2020–2022): Initially focused on creating fear through false claims of successful attacks.
  2. Credential Exploitation (2023): Targeted PLCs using default passwords, leading to significant incidents, including water outages.
  3. Custom Malware Deployment (2024): Developed IOCONTROL, a sophisticated malware platform designed for industrial control systems, allowing for stealthy operations.
  4. Active Exploitation (2026): Currently exploiting CVE-2021-22681, a critical vulnerability in Rockwell Automation controllers, with no vendor patch available.

Defensive Measures

Organizations operating critical infrastructure must take immediate action to protect against CyberAv3ngers' tactics. Key recommendations include:

  • Implementing strong access controls: Ensure that PLCs and other critical devices are not exposed to the internet without robust security measures.
  • Regularly updating credentials: Change default passwords and utilize strong, unique credentials for all devices.
  • Monitoring network traffic: Employ intrusion detection systems to identify unusual activity indicative of a breach.
  • Engaging in threat intelligence sharing: Collaborate with other organizations to stay informed about emerging threats and vulnerabilities.

Conclusion

The threat posed by CyberAv3ngers is significant and evolving. As this group continues to refine its techniques and expand its targets, organizations in critical sectors must prioritize cybersecurity and remain vigilant against potential attacks. The U.S. government's response, including sanctions and bounties for information, highlights the seriousness of this threat and the need for collective action to safeguard critical infrastructure.

🔍 How to Check If You're Affected

  1. 1.Check for default credentials on all internet-facing PLCs.
  2. 2.Monitor network traffic for unusual access patterns.
  3. 3.Review logs for unauthorized access attempts.

🏢 Impacted Sectors

WaterEnergyGovernment

Pro Insight

🔒 Pro insight: CyberAv3ngers' evolution reflects a broader trend of state-sponsored actors targeting critical infrastructure with increasing sophistication.

Sources

Original Report

Read Original

Related Pings

HIGHThreat Intel

Russia's Fancy Bear APT Continues Its Global Onslaught

Russia's Fancy Bear APT is on the attack again, targeting various organizations. Experts warn that patching and zero trust measures are essential. Stay vigilant to protect against these sophisticated threats.

Dark Reading·
HIGHThreat Intel

NERC Actively Monitoring Grid Amid Iran-Linked Cyber Threat

Hackers are targeting U.S. critical infrastructure, raising alarms. NERC is closely monitoring the grid for potential disruptions. This threat emphasizes the need for robust cybersecurity measures.

Cybersecurity Dive·
HIGHThreat Intel

Threat Hunters' Gambit - Outsmarting Evolving Threat Actors

Bill Largent reveals how strategy games can sharpen threat hunting skills. By understanding patterns, analysts can outsmart evolving cyber threats. Discover how to defend against these tactics.

Cisco Talos Intelligence·
HIGHThreat Intel

Treasury Department Launches Cyber Threat Sharing for Crypto

The U.S. Treasury is sharing cybersecurity intelligence with cryptocurrency firms to combat rising cyber threats. This initiative aims to protect digital assets and enhance industry resilience. Eligible companies can access vital security information at no cost, promoting a safer digital ecosystem.

The Record·
HIGHThreat Intel

Russia Accuses Journalist of Aiding Cyberattacks for Ukraine

Russia has detained a journalist for allegedly aiding Ukraine's cyberattacks. This highlights the ongoing cyber conflict and the risks of information sharing during war. Authorities are intensifying their crackdown on dissent through platforms like Telegram.

The Record·
HIGHThreat Intel

Hybrid P2P Botnet and 13-Year-Old Apache RCE Exposed

A new hybrid P2P botnet variant and a long-standing Apache RCE vulnerability have been uncovered. These threats are impacting various sectors, highlighting the need for enhanced cybersecurity measures. Stay informed to protect your systems from evolving dangers.

The Hacker News·