{"id":45199,"date":"2026-04-08T00:15:38","date_gmt":"2026-04-07T16:15:38","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/us-warns-of-iranian-hackers-targeting-critical-infrastructure\/"},"modified":"2026-04-08T00:15:38","modified_gmt":"2026-04-07T16:15:38","slug":"us-warns-of-iranian-hackers-targeting-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/us-warns-of-iranian-hackers-targeting-critical-infrastructure\/","title":{"rendered":"US warns of Iranian hackers targeting critical infrastructure"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/04\/07\/Iranian-hackers.jpg\" width=\"1600\" alt=\"US warns of Iranian hackers targeting critical infrastructure\"><\/p>\n<p>Iranian-linked hackers are targeting Internet-exposed Rockwell\/Allen-Bradley programmable logic controllers (PLCs) on the networks of U.S. critical infrastructure organizations.<\/p>\n<p>The warning came earlier today in the form of a joint advisory authored by the FBI, CISA, NSA, the Environmental Protection Agency (EPA), Department of Energy (DOE), and the United States Cyber Command &ndash; Cyber National Mission Force (CNMF).<\/p>\n<p>The authoring agencies said that these ongoing attacks have targeted organizations across multiple U.S. critical infrastructure sectors (including Government Services and Facilities, Water and Wastewater Systems, and Energy), and have resulted in financial losses and operational disruptions since March 2026.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"US warns of Iranian hackers targeting critical infrastructure\"><\/a> <\/div>\n<p>&#8220;The FBI assesses a group of Iranian-affiliated APT actors are targeting internet-exposed PLCs with the intent to cause disruptions&mdash;including maliciously interacting with project files, and manipulating data displayed on HMI and SCADA displays&mdash;to U.S. critical infrastructure organizations,&#8221; <a href=\"https:\/\/www.ic3.gov\/CSA\/2026\/260407.pdf\" target=\"_blank\" rel=\"nofollow noopener\">the advisory warns<\/a>.<\/p>\n<p>&#8220;Iranian-affiliated APT targeting campaigns against U.S. organizations have recently escalated, likely in response to hostilities between Iran, and the United States and Israel.&#8221;<\/p>\n<p>&#8220;The FBI identified that this activity resulted in the extraction of the device&#8217;s project file and data manipulation on HMI and SCADA displays,&#8221; the U.S. agencies added.<\/p>\n<p>A similar advisory <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-335a\" target=\"_blank\" rel=\"nofollow noopener\">issued in November 2023<\/a> warned that the CyberAv3ngers threat group, affiliated with the Iranian Government Islamic Revolutionary Guard Corps (IRGC), had been exploiting vulnerabilities in U.S.-based Unitronics operational technology (OT) systems.<\/p>\n<p>Between November 2023 and January 2024, CyberAv3ngers hackers compromised at least 75 Unitronics PLC devices across multiple waves of cyberattacks, half of which were in WWS critical infrastructure networks.<\/p>\n<p>To defend against such attacks, network defenders are advised to disconnect PLCs from the Internet or secure them using a firewall, scan logs for indicators of compromise shared in today&#8217;s joint advisory, and check for suspicious traffic on OT ports (especially traffic originating from overseas hosting providers).<\/p>\n<p>They should also implement multifactor authentication (MFA) for access to the OT network, keep PLCs up to date with the latest available firmware, disable all unused services and authentication methods (such as default authentication keys), and monitor network traffic for suspicious activity.<\/p>\n<p>Last month, the Iranian-linked and pro-Palestinian Handala hacktivist group <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed\/\" target=\"_blank\" rel=\"nofollow noopener\">wiped approximately 80,000 devices<\/a> on the network of U.S. medical giant Stryker, including employees&#8217; mobile devices and personal computers managed by the company.<\/p>\n<p>The FBI also warned that Iranian hackers linked to the country&#8217;s Ministry of Intelligence and Security (MOIS) are <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-warns-of-handala-hackers-using-telegram-in-malware-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">using Telegram in malware attacks<\/a>.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"US warns of Iranian hackers targeting critical infrastructure\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-warns-against-using-chinese-mobile-apps-over-to-data-security-risks\/\">FBI warns against using Chinese mobile apps due to privacy risks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-actively-exploited-citrix-flaw-by-thursday\/\">CISA orders feds to patch actively exploited Citrix flaw by Thursday<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-darksword-ios-flaws-exploited-attacks\/\">CISA orders feds to patch DarkSword iOS flaws exploited attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-warns-of-phishing-attacks-impersonating-us-city-county-officials\/\">FBI warns of phishing attacks impersonating US city, county officials<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-over-20-million-stolen-in-surge-of-atm-malware-attacks-in-2025\/\">FBI: Over $20 million stolen in surge of ATM malware attacks in 2025<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Iranian-linked hackers are targeting Internet-exposed R [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45199","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45199"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45199\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}