Threat IntelHIGH

Iranian APT Targets 5,219 Exposed Rockwell PLCs Worldwide, Disruption Reported

Featured image for Iranian APT Targets 5,219 Exposed Rockwell PLCs Worldwide, Disruption Reported
#Rockwell Automation#Allen-Bradley#APT#IRGC-CEC#CISA#Iranian APT#Rockwell PLCs#cybersecurity#critical infrastructure#malware

Original Reporting

CSCyber Security News·Tushar Subhra Dutta

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

High severity — significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT GroupIRGC-CEC
AliasesCyberAv3ngers, Shahid Kaveh Group, Storm-0784
AttributionIranian-affiliated actors
Target SectorsCritical Infrastructure
Target RegionsUnited States, Spain, Taiwan, Italy
Active SinceMarch 2026
Campaign NameRockwell PLC Targeting
Primary TTPsExploiting legitimate software for access
Tools UsedStudio 5000 Logix Designer
MITRE ATT&CKTactics include initial access and exploitation
MotivationCyber espionage and disruption of critical services
🎯

Iranian hackers are trying to break into important machines that help run things like water treatment plants and power stations. They are using normal software to sneak in and mess with the machines, which could cause big problems. It's like someone using the keys to your house to change the locks without you knowing!

Quick Summary

Iranian-affiliated APT actors are targeting thousands of exposed Rockwell PLCs globally, leading to operational disruptions and financial losses across critical infrastructure sectors.

What Happened

On April 7, 2026, the FBI, CISA, NSA, EPA, DOE, and U.S. Cyber Command jointly warned that Iranian-affiliated advanced persistent threat (APT) actors are actively targeting internet-facing Rockwell Automation/Allen-Bradley programmable logic controllers (PLCs). This ongoing campaign has been linked to the Islamic Revolutionary Guard Corps Cyber Electronic Command (IRGC-CEC) and has escalated since at least March 2026. The advisory, labeled AA26-097A, highlights that these attacks have already resulted in diminished PLC functionality, manipulation of display data, and in some cases, operational disruption and financial loss.

Who's Affected

Censys researchers identified 5,219 internet-exposed Rockwell PLCs globally, with the United States accounting for 74.6% of that exposure (3,891 hosts). Other countries with notable exposure include Spain (110 hosts), Taiwan (78), and Italy (73). The targeted devices are primarily used in critical infrastructure sectors such as water treatment, energy facilities, and government operations.

What Data Was Exposed

The threat actors are using Rockwell's legitimate engineering software, Studio 5000 Logix Designer, to access these PLCs directly. This enables them to read and modify project files and manipulate HMI/SCADA display screens, making their activities harder to detect. Confirmed targeted device families include CompactLogix and Micro850, with additional probing of OT protocols like Modbus and S7, indicating a broader targeting strategy across multiple vendor platforms.

What's at Risk

The exposure of these PLCs poses significant risks to operational technology (OT) environments. The heavy reliance on consumer and mobile carrier networks for internet connectivity increases vulnerability, with nearly 49.1% of the devices behind Verizon Business cellular modems and 13.3% behind AT&T Mobility. This situation underscores a widespread deployment risk that has often gone overlooked.

Attack Techniques

The Iranian threat actors are not using zero-day exploits but rather leveraging legitimate software to establish connections with the PLCs. Upon gaining access, they deploy Dropbear, a Secure Shell (SSH) software, to maintain command-and-control capabilities. This allows them to extract project files and manipulate data on HMI and SCADA displays, leading to operational disruptions.

Patch Status

Organizations are urged to remove PLCs from direct internet exposure and implement robust security measures. This includes disabling unnecessary services like VNC and Telnet, implementing multi-factor authentication, and conducting audits on devices running outdated firmware.

Immediate Actions

To mitigate risks, organizations should:

  • Remove PLCs from direct internet exposure.
  • Implement physical and software controls to prevent remote modifications.
  • Use firewalls or network proxies to control access.
  • Keep PLC devices updated and disable unused authentication features.
  • Monitor for unusual traffic patterns.

The ongoing campaign represents a significant escalation in cyber attacks by Iranian groups, which have previously targeted operational technology in the U.S. This advisory serves as a critical reminder of the vulnerabilities within critical infrastructure and the need for heightened security measures in OT environments.

🔍 How to Check If You're Affected

  1. 1.Monitor for unusual traffic patterns on PLCs.
  2. 2.Audit access logs for unauthorized access attempts.
  3. 3.Implement alerts for changes in PLC project files.

🏢 Impacted Sectors

Water TreatmentEnergyGovernment Services

Pro Insight

The current escalation in Iranian cyber attacks reflects a broader strategy targeting both IT and OT infrastructure, emphasizing the need for organizations to enhance their cybersecurity posture.

🗓️ Story Timeline

Story broke by Cyber Security News
Covered by The Hacker News

Sources

Original Report

CSCyber Security News· Tushar Subhra Dutta
Read Original

Also covered by

THThe Hacker News

Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs

Read

Related Pings

HIGHThreat Intel

FBI Disrupts GRU Router Hijacking Operation Amid Rising Threats

The FBI has disrupted a significant cyber espionage operation by the Russian GRU, targeting thousands of compromised TP-Link routers across the U.S. and stealing sensitive user data.

SentinelOne Labs·
HIGHThreat Intel

UK Exposes Russian Submarine Activity Near Undersea Cables

The UK has revealed Russian submarines' covert operations near undersea cables, raising alarms about potential sabotage. This activity threatens vital connectivity for the UK and beyond.

The Record·
HIGHThreat Intel

CISOs Can Learn from Musk Oxen - Third-Party Risks Explained

CISOs can learn valuable lessons from musk oxen about managing third-party risks. Recent cyberattacks highlight the importance of collaborative strategies. By working together, organizations can enhance their security posture against vulnerabilities.

CSO Online·
HIGHThreat Intel

Contagious Interview Campaign Expands - New Malicious Packages Found

The Contagious Interview campaign is growing, with new malicious packages targeting sensitive data. North Korean group UNC1069 is behind this expansion, raising alarms for users.

SC Media·
HIGHThreat Intel

Russia's Fancy Bear APT Continues Its Global Onslaught

Russia's Fancy Bear APT is on the attack again, targeting various organizations. Experts warn that patching and zero trust measures are essential. Stay vigilant to protect against these sophisticated threats.

Dark Reading·
HIGHThreat Intel

CyberAv3ngers - IRGC-Linked Group Targets Critical Infrastructure

CyberAv3ngers, an Iranian state-backed group, is targeting U.S. critical infrastructure, exposing over 5,200 devices to potential attacks. Immediate action is needed to bolster cybersecurity.

Tenable Blog·