Iranian Hackers Breach US Airport, Bank, and Software Firm!

Iranian hackers have breached multiple U.S. organizations, targeting critical infrastructure and exploiting vulnerabilities in operational technology devices, particularly PLCs.

BreachesHIGHUpdated: Published: πŸ“° 15 sources

Original Reporting

SWSecurityWeekΒ·Ionut Arghire

AI Summary

CyberPings AIΒ·Reviewed by Rohit Rana

🎯Imagine if hackers could break into the machines that control water and electricity. That's what's happening with Iranian hackers targeting important U.S. systems. It's like someone messing with the controls of a train or a water plant, which could cause big problems.

What Happened

Imagine waking up to find that your favorite local airport and bank have been breached by hackers. This is the reality that several US organizations are facing. Iranian hackers have infiltrated networks of a US airport, a bank, and a software company since February. This alarming trend shows a growing presence of foreign cyber threats right in our backyard.

The attacks were not just random; they were part of a systematic effort by an Iranian Advanced Persistent Threat (APT) group, believed to have ties to the Iranian government. Recent reports indicate that these hackers are also targeting critical infrastructure, specifically Internet-exposed Rockwell/Allen-Bradley programmable logic controllers (PLCs) used in various sectors such as energy and water systems. The FBI warns that these ongoing attacks have resulted in financial losses and operational disruptions since March 2026. Their goal? To gather sensitive information and potentially disrupt critical services.

Critical Infrastructure Targeted

In a joint advisory published by multiple U.S. agencies, including the FBI, the National Security Agency, and the Cybersecurity and Infrastructure Security Agency (CISA), it was revealed that Iranian-affiliated hackers are conducting exploitation activities targeting operational technology devices, including PLCs. These devices, often the size of a toaster, are crucial for automation in factories, water treatment centers, and oil refineries. The advisory noted that hackers have manipulated data displayed on human-machine interface (HMI) and supervisory control and data acquisition (SCADA) systems, potentially causing dangerous conditions in some cases. Rob Lee, CEO of Dragos, emphasized that Iranian actors have shown a consistent ability to understand control loops and physical processes, indicating a serious risk of physical damage to critical systems. The advisory highlighted that this activity is part of a broader campaign linked to the Iranian Revolutionary Guard Corps (IRGC), which has previously targeted similar systems. Recent reports indicate that these Iranian-affiliated actors have escalated their intrusions, disrupting operations at critical US water and energy facilities. The FBI noted that these attacks are part of a broader escalation in cyber activities coinciding with geopolitical tensions, particularly following the ongoing conflict involving the US and Israel. The intent behind these cyber intrusions is not only to gather intelligence but also to cause operational disruptions, as evidenced by previous attacks that exploited default passwords on internet-connected PLCs.

Escalation of Tactics

The U.S. government has issued warnings that Iranian-backed hackers are escalating their tactics by specifically targeting American critical infrastructure systems. The advisory states that these hackers aim to cause significant disruption and have already resulted in operational disruption and financial loss across various sectors, including water and wastewater utilities, energy, and local government facilities. The hackers have been able to manipulate information displayed on PLCs and SCADA systems, maliciously interacting with project files that store essential device configurations.

The advisory also revealed that the hackers used leased overseas infrastructure and legitimate Rockwell Automation configuration software to connect to victim PLCs. This included CompactLogix and Micro850 devices that were left directly exposed to the public internet. Security firm Censys reported that an Internet scan identified over 5,200 such devices exposed, with a significant majority located in the US. Once inside, the attackers extracted project files, altered SCADA and HMI display data, and installed remote access software to maintain a persistent foothold. The attacks have compromised at least 75 devices across critical infrastructure sectors since March 2026.

Additionally, new intelligence suggests that the Iranian hackers are employing sophisticated social engineering tactics to gain initial access, such as spear-phishing campaigns targeting employees in key positions within these organizations. This highlights the need for organizations to bolster their training programs to recognize and mitigate such threats.

Industry experts have noted that the threat landscape is further complicated by the fact that many organizations remain unaware of the vulnerabilities presented by internet-exposed operational technology devices. According to Censys, nearly 3,891 Rockwell Automation devices are exposed online in North America alone, creating a vast attack surface for these threat actors.

New Insights on Attack Methods

Recent intelligence has confirmed that Iranian actors are using advanced techniques to gain access to PLCs. They have been observed deploying Dropbear, a Secure Shell (SSH) software, on victim endpoints to establish command-and-control capabilities through port 22. This allows them to extract project files and manipulate display data on HMI and SCADA systems, further emphasizing the need for robust security measures.

Moreover, the advisory warns organizations to prevent remote modifications of PLCs by implementing multi-factor authentication (MFA) and erecting firewalls or network proxies in front of these devices. The report also highlights the significant risk posed by the use of third-party hosted infrastructure, which has been leveraged by these hackers to create accepted connections to victim PLCs.

Recommendations for Organizations

In response to these breaches, cybersecurity experts are working diligently to assess the damage and fortify defenses. Organizations affected are urged to take immediate action:

  • Update security protocols and software.
  • Monitor network traffic for unusual activity.
  • Educate employees on recognizing phishing attempts.
  • Implement secure gateways and firewalls to protect PLCs from direct internet exposure.
  • Query available logs for the IOCs provided in the advisory and check for suspicious traffic on relevant ports.

Moreover, industry professionals recommend that organizations disconnect PLCs from publicly accessible networks and enforce strict access controls. The advisory emphasizes that PLCs should never be directly accessible from the internet, and organizations should adopt zero trust architectures to strengthen their security posture.

As we navigate this cyber landscape, remember that staying informed and vigilant is your best defense against such threats.

πŸ”’ Pro Insight

The ongoing cyber threats from Iranian hackers highlight the urgent need for organizations to enhance their cybersecurity measures, particularly for internet-exposed operational technology devices.

πŸ“… Story Timeline

Story broke by SecurityWeek

Covered by The Register Security

Covered by Help Net Security

Covered by SC Media

Covered by Cybersecurity Dive

Covered by CSO Online

Covered by TechCrunch Security

Covered by The Record

Covered by Infosecurity Magazine

Covered by BleepingComputer

Covered by Wired Security

Covered by SecurityWeek

Covered by CyberScoop

Covered by Ars Technica Security

Covered by The Hacker News

SWSecurityWeekΒ· Ionut Arghire
Read Original

Also covered by

THThe Register Security

The Register Security

Iran intelligence backdoored US bank, airport, software outfit networks

Read β†—
HEHelp Net Security

Help Net Security

Iran-linked APT targets US critical sectors with new backdoors

Read β†—
SCSC Media

SC Media

US state, local governments warned of Iran war-related cyber intrusions

Read β†—
CYCybersecurity Dive

Cybersecurity Dive

Pro-Russia actors team with Iran-linked hackers in attacks

Read β†—
CSCSO Online

CSO Online

Hacker zielen auf Exilportal Iranwire

Read β†—
TETechCrunch Security

TechCrunch Security

Iranian hackers claim breach of FBI director Kash Patel’s personal email account

Read β†—
THThe Record

The Record

Iran-linked ransomware gang targeted US healthcare org amid military conflict

Read β†—
INInfosecurity Magazine

Infosecurity Magazine

Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel

Read β†—
BLBleepingComputer

BleepingComputer

US warns of Iranian hackers targeting critical infrastructure

Read β†—
WIWired Security

Wired Security

Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure

Read β†—
CYCyberScoop

CyberScoop

Iranian hackers launching disruptive attacks at U.S. energy, water targets, feds warn

Read β†—
ARArs Technica Security

Ars Technica Security

Iran-linked hackers disrupt operations at US critical infrastructure sites

Read β†—
THThe Hacker News

The Hacker News

Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs

Read β†—

Related Pings