Digital Event Horizon
Hackers on Behalf of Iran Target US Critical Infrastructure Sites Amid Ongoing Conflict
A recent advisory from the FBI and other agencies has issued a warning about a potential threat to US critical infrastructure sites, attributed to hackers working on behalf of Iran's Islamic Revolutionary Guard Corps. The threat is targeting Programmable Logic Controllers (PLCs), which are used in various industrial settings to automate physical machinery. Stay up-to-date with the latest developments as Ars Technica provides comprehensive coverage of this story and its implications for US critical infrastructure.
A warning has been issued by multiple US agencies about a potential threat to US critical infrastructure sites from hackers working on behalf of Iran's Islamic Revolutionary Guard Corps.The threat targets Programmable Logic Controllers (PLCs), which are used in industrial settings and can be vulnerable to cyber attacks.A total of 5,219 PLCs were exposed to the Internet, with 75% located in the US, according to a security firm.The attackers are using legitimate vendor software to gain access to the PLCs without requiring zero-day exploitation.Organizations are urged to lock down their PLCs and take steps to prevent unauthorized access to mitigate the threat.
A recent advisory from the FBI, Cybersecurity and Infrastructure Security Agency, National Security Agency, Environmental Protection Agency, Department of Energy, and US Cyber Command has issued a warning about a potential threat to US critical infrastructure sites. The threat, attributed to hackers working on behalf of Iran's Islamic Revolutionary Guard Corps, is said to be targeting Programmable Logic Controllers (PLCs), which are used in various industrial settings to automate physical machinery.
These devices, typically the size of a toaster, play a crucial role in factories, water treatment centers, oil refineries, and other industrial facilities. However, they also provide an interface between computers used for automation and physical machinery, making them vulnerable to cyber attacks. The attackers are using legitimate vendor software, such as Rockwell Studio 5000 Logix Designer, to gain access to the PLCs without requiring zero-day exploitation.
The compromised devices include CompactLogix and Micro850 models from Rockwell Automation/Allen-Bradley, which were identified during an internet scan by security firm Censys. A total of 5,219 such devices were exposed to the Internet, with 75% located in the US and likely in remote locations where equipment is situated. The infrastructure being used to target these devices is a single multi-home Windows engineering workstation running the Rockwell tool chain.
In an effort to mitigate the threat, the affected agencies are urging organizations to lock down their PLCs and take steps to prevent unauthorized access. The attackers' use of a self-signed certificate with the common name DESKTOP-BOE5MUC suggests that they may be attempting to establish a legitimate connection with the devices.
Furthermore, researchers have identified another threat actor, known as Handala, which was responsible for disrupting operations at Stryker and other medical device manufacturers. This group has also been linked to attacks on Australian government portals and the hacking of a personal email account belonging to FBI Director Kash Patel.
In light of these developments, it appears that pro-Iranian proxy groups are successfully conducting distributed denial-of-service (DDoS) attacks against major platforms like Netflix and Pinterest, as well as Australian government portals. The use of such tactics suggests a coordinated effort by Iranian-backed hackers to disrupt US critical infrastructure sites during the ongoing conflict.
As tensions between the US and Iran continue to escalate, it is essential for organizations to remain vigilant and take proactive measures to secure their industrial control systems against cyber threats.
In an advisory published Tuesday, the affected agencies urged all organizations to take immediate action to prevent potential attacks. They emphasized the importance of implementing robust security protocols, monitoring PLCs closely, and patching any vulnerabilities in order to minimize the risk of disruption and financial loss.
Additionally, researchers have identified a total of 5,219 devices exposed to the Internet that are likely to be targeted by hackers on behalf of Iran's Islamic Revolutionary Guard Corps. These devices include CompactLogix and Micro850 models from Rockwell Automation/Allen-Bradley, which were compromised or targeted across multiple US critical infrastructure sectors.
As the war between the US and Iran continues to intensify, it is clear that hackers working on behalf of Iranian-backed groups are actively seeking to disrupt US critical infrastructure sites. It is essential for organizations to take immediate action to secure their industrial control systems against cyber threats.
Related Information:
https://www.digitaleventhorizon.com/articles/Hackers-on-Behalf-of-Iran-Target-US-Critical-Infrastructure-Sites-Amid-Ongoing-Conflict-deh.shtml
https://arstechnica.com/security/2026/04/iran-linked-hackers-disrupt-operations-at-us-critical-infrastructure-sites/
https://www.cnn.com/2026/04/07/politics/iran-linked-hackers-disrupt-us-industrial-sites
Published: Wed Apr 8 17:36:58 2026 by llama3.2 3B Q4_K_M