{"id":531,"date":"2026-04-08T06:03:47","date_gmt":"2026-04-08T06:03:47","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=531"},"modified":"2026-04-08T06:03:47","modified_gmt":"2026-04-08T06:03:47","slug":"iran-linked-hackers-disrupt-u-s-critical-infrastructure-by-targeting-internet-exposed-plcs","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=531","title":{"rendered":"Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiBiMBUkucAS1NG7NHlk46hGqNyjv5iU5w1Z6HVNXgQywcDfTSOdtQWSqYA5ccSojgRB45ScYHFfyPWqe_9QbOZYo6u6V5qUAcRQIm4CfIDvkRqhs7rtPhmD7yNR4bn_StYbNZm2UWqXfeqXCUeDL1eneK7VyGnHfGbk3EatILzs_fKtRN6VxF8vnKDgQL_\/s1700-e365\/plc.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including programmable logic controllers (PLCs), cybersecurity and intelligence\u00a0agencies <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa26-097a\">warned<\/a>\u00a0Tuesday.<\/p>\n<p>\u00abThese attacks have led to diminished PLC functionality, manipulation of display data and, in some cases, operational disruption and financial loss,\u00bb the U.S. Federal Bureau of Investigation\u00a0(FBI) <a href=\"https:\/\/x.com\/FBICyberDiv\/status\/2041566548691660897\">said<\/a> in a post on\u00a0X.<\/p>\n<p>The agencies said\u00a0the campaign is part of\u00a0a recent escalation in cyber attacks orchestrated by Iranian hacking groups against U.S. organizations in response to the ongoing conflict between Iran and the U.S. and\u00a0Israel.<\/p>\n<p>Specifically, the activity has led to PLC disruptions across several U.S. critical infrastructure sectors via what the authoring agencies described as malicious interactions with the project file and manipulation of data on human-machine interface (HMI) and supervisory control and data acquisition (SCADA)\u00a0displays.<\/p>\n<p>These attacks have singled out Rockwell Automation and Allen-Bradley PLCs deployed in government services and facilities, Water and Wastewater Systems (WWS), and energy\u00a0sectors.<\/p>\n<p>\u00abThe actors used leased, third-party hosted infrastructure with configuration software, such as Rockwell Automation&#8217;s Studio 5000 Logix Designer software, to create an accepted connection to the victim&#8217;s PLC,\u00bb the advisory said. \u00abTargeted devices include CompactLogix and Micro850 PLC\u00a0devices.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Upon obtaining initial access, the threat actors established command-and-control by deploying Dropbear, a Secure Shell (SSH) software, on victim endpoints to enable remote access through port 22 and facilitate the extraction of the device&#8217;s project file and data manipulation on HMI and SCADA\u00a0displays.<\/p>\n<p>To combat the threat, organizations are advised to avoid exposing the PLC to the internet, take steps to prevent remote modification either via a physical or software switch, implement multi-factor authentication (MFA), and erect a firewall or network proxy in front of the PLC to control network access, keep PLC devices up-to-date, disable any unused authentication features, and monitor for unusual\u00a0traffic.<\/p>\n<p>This is not the first time Iranian threat actors have targeted OT networks and PLCs. In\u00a0late 2023, Cyber Av3ngers (aka Hydro Kitten, Shahid Kaveh Group, and UNC5691)\u00a0was <a href=\"https:\/\/thehackernews.com\/2023\/11\/iranian-hackers-exploit-plcs-in-attack.html\">linked to the active exploitation of Unitronics PLCs to target the Municipal Water Authority of Aliquippa in western Pennsylvania. These\u00a0attacks compromised at least 75\u00a0devices.<\/p>\n<p>\u00abThis advisory confirms what we&#8217;ve observed for months: Iran&#8217;s cyber escalation follows a known playbook. Iranian threat actors are now moving faster and broader and targeting both IT and OT infrastructure,\u00bb Sergey Shykevich, threat intelligence group manager at Check Point Research, said in a statement shared with The Hacker\u00a0News.<\/p>\n<p>\u00abWe documented identical targeting patterns against Israeli PLCs in March. It\u00a0is not the first time Iranian actors are targeting operational technology in the US for disruption purposes, so organizations shouldn&#8217;t treat this as a new threat, but as an accelerating\u00a0one.\u00bb<\/p>\n<p>The development comes amid\u00a0a new-found\u00a0surge in distributed denial-of-service (DDoS) attacks and claims of hack-and-leak operations carried out by cyber proxy groups and hacktivists targeting Western and Israeli entities, according to Flashpoint.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj7W8LInOXE8F6a39wHidYzWarzH9aT7ltfdTqpH6RI8JFyh2jkWqjC8KhMKTNvPSVRJBsFH9o8y3qALMSp-MW7mreghnyK2sHefLpVni6QJR8DGUidJSgec1S-qXIwBep3zMo4IOJ_osMGniqWhlINxNUt-ZR1_MNBONUxWD6aRLYqytsIv6wt8KLcctbO\/s1700-e365\/Telegram.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj7W8LInOXE8F6a39wHidYzWarzH9aT7ltfdTqpH6RI8JFyh2jkWqjC8KhMKTNvPSVRJBsFH9o8y3qALMSp-MW7mreghnyK2sHefLpVni6QJR8DGUidJSgec1S-qXIwBep3zMo4IOJ_osMGniqWhlINxNUt-ZR1_MNBONUxWD6aRLYqytsIv6wt8KLcctbO\/s1700-e365\/Telegram.png\" alt=\"\" border=\"0\" data-original-height=\"731\" data-original-width=\"1600\"\/><\/a><\/div>\n<p>In a report published this week, DomainTools Investigations (DTI) described activity attributed to Homeland Justice, Karma\/KarmaBelow80, and Handala Hack as a \u00absingle, coordinated cyber influence ecosystem\u00bb aligned with Iran&#8217;s Ministry of Intelligence and Security (MOIS) rather than a set of distinct hacktivist\u00a0groups.<\/p>\n<p>\u00abThese personas function as interchangeable operational veneers applied to a consistent underlying capability,\u00bb\u00a0DTI <a href=\"https:\/\/dti.domaintools.com\/research\/handala-mois-linked-cyber-influence-ecosystem-threat-intelligence-assessment\">said<\/a>. \u00abTheir purpose is not to reflect organizational separation, but to enable segmentation of messaging, targeting, and attribution while preserving continuity of infrastructure and tradecraft.\u00bb<\/p>\n<p>Public-facing domains and Telegram channels serve as the primary dissemination and amplification hub, with the messaging platform also playing a huge role in command-and-control (C2) operations by allowing the malware to communicate with threat actor-controlled bots, reduce infrastructure overhead, and blend in with normal operations.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abThis ecosystem represents a state-directed instrument of cyber-enabled influence, in which technical operations are tightly integrated with narrative manipulation and media amplification dynamics to achieve coercive and strategic effects,\u00bb DTI\u00a0added.<\/p>\n<h3>MuddyWater a\u0219 a CastleRAT\u00a0Affiliate<\/h3>\n<p>The development comes as JUMPSEC detailed MuddyWater ties with the criminal ecosystem, stating that the Iranian state-sponsored threat actor operates at least two CastleRAT builds against Israeli\u00a0targets. It&#8217;s worth noting that CastleRAT is a remote access trojan that&#8217;s part of\u00a0the CastleLoader\u00a0framework attributed by Recorded Future to a group it tracks under the moniker GrayBravo\u00a0(aka\u00a0TAG-150).<\/p>\n<p>Central to the operations is a PowerShell deployer (\u00abreset.ps1\u00bb) that deploys a previously undocumented JavaScript-based malware called ChainShell,\u00a0which then contacts a smart contract on the Ethereum blockchain to retrieve a C2 address and use it to fetch next-stage JavaScript code for execution on compromised\u00a0hosts.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0tuo1vvmfrsFq4shcTp_jjXGNvxXVEnR1x_d4aTJNtMeygZsQXt70ZybIrHWc1bzvP93jU-nw6N1e-6z1z3SgQpJLI-ZT9js4VDnepp4gmMN34S62otWKk2A2Jgl0znUD-Rd-DsGaKJGWRKwPqNTddTKCC7wctuJJRJbb_udCiU5hq5vbiHZ1ip3Md0Gl\/s1700-e365\/iran.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0tuo1vvmfrsFq4shcTp_jjXGNvxXVEnR1x_d4aTJNtMeygZsQXt70ZybIrHWc1bzvP93jU-nw6N1e-6z1z3SgQpJLI-ZT9js4VDnepp4gmMN34S62otWKk2A2Jgl0znUD-Rd-DsGaKJGWRKwPqNTddTKCC7wctuJJRJbb_udCiU5hq5vbiHZ1ip3Md0Gl\/s1700-e365\/iran.png\" alt=\"\" border=\"0\" data-original-height=\"880\" data-original-width=\"2560\"\/><\/a><\/div>\n<p>Some aspects of these connections between MOIS and the cybercrime ecosystem were\u00a0also flagged\u00a0by Ctrl-Alt-Intel, Broadcom,\u00a0and Check\u00a0Point, highlighting\u00a0the growing engagement as evidence\u00a0of\u00a0a growing reliance on off-the-shelf tools to support state objectives and complicate attribution\u00a0efforts.<\/p>\n<p>The same PowerShell loader has\u00a0also been\u00a0found to deliver a botnet malware referred to as Tsundere\u00a0(aka Dindoor). According to JUMPSEC, both ChainShell and Tsundere are separate TAG-150 platform components\u00a0that are\u00a0deployed along with CastleRAT.<\/p>\n<p>\u00abThe adoption of a Russian criminal MaaS by an Iranian state actor has direct implications for defenders,\u00bb JUMPSEC said in a report shared with The Hacker News. \u00abOrganizations targeted by MuddyWater, especially in the defence, aerospace, energy, and government sectors, now face threats that combine state-level targeting with commercially developed offensive\u00a0tools.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including programmable logic controllers (PLCs), cybersecurity and intelligence\u00a0agencies warned\u00a0Tuesday. \u00abThese attacks have led to&hellip;<\/p>\n","protected":false},"author":1,"featured_media":532,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[58,651,338,141,1113,491,1114,431,96],"class_list":["post-531","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-critical","tag-disrupt","tag-hackers","tag-infrastructure","tag-internetexposed","tag-iranlinked","tag-plcs","tag-targeting","tag-u-s"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=531"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/531\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/532"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}