π―There's a group called Nasir Security that's linked to Iran, and they're trying to hack into energy companies in the Middle East. At the same time, U.S. officials are warning that similar hackers are also targeting important machines used in things like water and electricity systems, which could cause big problems if they succeed.
The Threat
Resecurity has identified a new cybercriminal group known as Nasir Security, which is believed to be linked to Iran. This group is actively targeting energy companies in the Gulf region. The motivation behind these attacks is tied to ongoing geopolitical tensions and military threats in the area. The energy sector is particularly vulnerable, given its critical role in regional economies and the geopolitical landscape.
In addition to these regional threats, U.S. agencies, including the FBI and CISA, have issued warnings about Iran-linked actors targeting internet-exposed programmable logic controllers (PLCs) used in critical infrastructure across the United States. These attacks are part of a broader campaign aimed at causing disruption in sectors such as government services, water systems, and energy.
Who's Behind It
The groupβs activities are presumed to be state-sponsored, reflecting Iran's broader strategy to leverage cyber operations as a component of its military capabilities. Resecurity's intelligence indicates that Nasir Security has targeted several notable companies, including Dubai Petroleum and CC Energy Development. These attacks are not isolated incidents but part of a broader pattern of cyber warfare aimed at destabilizing the region's energy infrastructure. The U.S. advisory highlights that Iranian-affiliated advanced persistent threat (APT) actors, including groups like CyberAv3ngers, have been linked to disruptive activities against critical infrastructure, specifically targeting internet-facing Rockwell/Allen-Bradley PLCs. This indicates a potential escalation in cyber warfare tactics employed by Iranian actors, further complicating the security landscape.
Tactics & Techniques
Nasir Security employs a range of tactics to achieve its goals. Their methods include business email compromise (BEC) through targeted spear phishing, impersonation techniques, and exploiting weaknesses in public-facing applications. One alarming aspect of their operations is the exfiltration of data from insecure cloud storage services, which can lead to significant data breaches.
The U.S. advisory notes that these Iran-linked actors are manipulating project files and altering data on human-machine interface (HMI) and supervisory control and data acquisition (SCADA) systems, leading to operational disruptions and financial losses. The stolen data often includes sensitive documents such as contracts, risk assessments, and engineering schematics, which can be leveraged to plan further attacks, including targeted strikes against oil fields and pipeline infrastructure.
Defensive Measures
Organizations in the energy sector need to take immediate action to bolster their cybersecurity defenses. This includes implementing robust email security protocols to prevent phishing attacks and ensuring that all software is up-to-date with the latest security patches. Additionally, companies should conduct regular security audits of their supply chain partners to identify potential vulnerabilities.
In light of the U.S. warnings, organizations are urged to assess their internet-exposed PLCs, follow security guidance from vendors, and disconnect systems from the internet where possible. Monitoring OT ports for suspicious traffic, enabling multifactor authentication, and continuously monitoring network activity are critical steps to mitigate risks associated with these threats. As geopolitical tensions continue to rise, the threat from groups like Nasir Security and other Iranian-affiliated actors is likely to increase, making proactive cybersecurity measures essential for protecting critical infrastructure.
The recent warnings from U.S. agencies highlight a concerning trend in which Iranian-linked actors are not only targeting energy firms in the Middle East but also expanding their reach to critical infrastructure in the U.S. This indicates a strategic shift that could have serious implications for global energy security and operational stability.





