Threat IntelHIGH

Iranian Cyberattacks Target Nearly 4,000 US Industrial Devices

Featured image for Iranian Cyberattacks Target Nearly 4,000 US Industrial Devices
#Iranian cyberattacks#Rockwell Automation#PLC devices

Original Reporting

BCBleepingComputer·Sergiu Gatlan

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

High severity — significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT GroupIranian state-backed hackers
Aliases
AttributionU.S. federal agencies
Target SectorsIndustrial, Critical Infrastructure
Target RegionsUnited States
Active SinceMarch 2026
Campaign NameIranian Cyberattacks on US PLCs
Primary TTPsData extraction, Data manipulation
Tools Used
MITRE ATT&CKTactic: Initial Access, Technique: Exploit Public-Facing Application
MotivationPolitical, Strategic disruption
🎯

Basically, hackers linked to Iran are attacking thousands of US industrial machines online.

Quick Summary

Iranian-linked hackers have targeted nearly 4,000 US industrial devices, raising alarms about critical infrastructure security. This ongoing threat could disrupt operations and cause significant losses. Immediate action is needed to protect these vulnerable systems.

What Happened

Iranian state-backed hackers have launched a series of cyberattacks targeting U.S. critical infrastructure networks. The focus has been on programmable logic controllers (PLCs) manufactured by Rockwell Automation, with nearly 4,000 devices exposed to the Internet. This alarming trend was highlighted in a recent joint advisory from multiple U.S. federal agencies.

The attacks began in March 2026 and have resulted in operational disruptions and financial losses for affected organizations. The FBI has reported that these attacks have led to the extraction of sensitive project files and manipulation of data on Human-Machine Interface (HMI) and SCADA displays.

Who's Affected

The primary targets of these attacks are U.S. industrial organizations utilizing Rockwell Automation's PLC devices. According to cybersecurity firm Censys, approximately 74.6% of the 5,219 internet-exposed Rockwell devices globally are located in the United States, with 3,891 hosts identified as vulnerable.

What Data Was Exposed

The attacks have compromised critical operational data, including project files and real-time operational data displayed on HMI systems. This data manipulation poses significant risks to the operational integrity of affected systems, especially in sectors reliant on automation and control systems.

What You Should Do

To mitigate the risks associated with these ongoing cyberattacks, network defenders are advised to take several proactive measures:

  • Secure PLCs: Use firewalls to restrict access or disconnect devices from the Internet.
  • Monitor Logs: Regularly scan logs for signs of malicious activity and check for suspicious traffic, particularly from overseas.
  • Implement MFA: Enforce multifactor authentication for access to operational technology (OT) networks.
  • Update Devices: Keep all PLC devices up to date with the latest security patches.
  • Disable Unused Services: Turn off any services or authentication methods that are not in use.

This recent wave of cyberattacks follows a pattern of similar threats from Iranian-affiliated groups, notably the CyberAv3ngers, who previously targeted vulnerabilities in U.S.-based operational technology systems. Such persistent threats underscore the urgent need for enhanced cybersecurity measures across critical infrastructure sectors.

🔍 How to Check If You're Affected

  1. 1.Check for unusual access logs on PLC devices.
  2. 2.Scan for unauthorized changes in HMI and SCADA displays.
  3. 3.Monitor network traffic for connections from foreign IP addresses.

🏢 Impacted Sectors

TechnologyEnergyManufacturing

Pro Insight

🔒 Pro insight: The targeting of PLCs indicates a strategic shift towards disrupting critical infrastructure, necessitating immediate defensive measures across all sectors.

🗓️ Story Timeline

Story broke by BleepingComputer
Covered by Cybersecurity Dive

Sources

Original Report

BCBleepingComputer· Sergiu Gatlan
Read Original

Also covered by

CYCybersecurity Dive

Nearly 4K industrial control devices vulnerable to Iran-linked hacking campaign

Read

Related Pings

HIGHThreat Intel

Iran Hackers Target Critical Infrastructure - Industry Reactions

Iran-linked hackers are targeting critical infrastructure, manipulating systems to cause disruptions. Experts stress the need for enhanced security measures to protect vital services.

SecurityWeek·
HIGHThreat Intel

Danii Shchukin - Europol Names Notorious Ransomware Leader

Danii Shchukin, a notorious ransomware leader, has been named on Europol's most-wanted list. His criminal activities have caused millions in damages. Authorities are intensifying efforts to capture him and his accomplice.

CSO Online·
HIGHThreat Intel

UK Exposes Russian Submarine Activity Near Undersea Cables

The UK has revealed Russian submarines' covert operations near undersea cables, raising alarms about potential sabotage. This activity threatens vital connectivity for the UK and beyond.

The Record·
HIGHThreat Intel

CISOs Can Learn from Musk Oxen - Third-Party Risks Explained

CISOs can learn valuable lessons from musk oxen about managing third-party risks. Recent cyberattacks highlight the importance of collaborative strategies. By working together, organizations can enhance their security posture against vulnerabilities.

CSO Online·
HIGHThreat Intel

Contagious Interview Campaign Expands - New Malicious Packages Found

The Contagious Interview campaign is growing, with new malicious packages targeting sensitive data. North Korean group UNC1069 is behind this expansion, raising alarms for users.

SC Media·
HIGHThreat Intel

Russia's Fancy Bear APT Continues Its Global Onslaught

Russia's Fancy Bear APT is on the attack again, targeting various organizations. Experts warn that patching and zero trust measures are essential. Stay vigilant to protect against these sophisticated threats.

Dark Reading·