Iranian APT Group Hacks PLCs Across US Critical Infrastructure

A joint advisory reveals how Iranian-affiliated hackers infiltrated U.S. industrial control systems. This post analyzes their methods, timeline, affected sectors, and provides known indicators and ATT&CK mappings.

Validate Critical Infrastructure Exposure
  • April 8, 2026

Recently, a joint alert was released by several agencies including FBI, CISA, and NSA, among others, concerning a number of cyber-attacks on control networks associated with Iran. The alert describes how these threat actors associated with the IRGC have attacked PLCs that were connected to the internet. In particular, they targeted Rockwell/Allen-Bradley and Unitronics PLCs.

According to the alert, these threat actors managed to access at least 75 PLCs in the U.S. since late 2023 through the use of configuration software provided by the manufacturer of these systems and overseas leased IP addresses. Two major results were realized from these attacks: stealing PLC projects and faking HMI/SCADA screens.

Iranian-Linked PLC Campaign Uncovered

This group is described as “IRGC CEC-affiliated” and operating under aliases like CyberAv3ngers, Hydro Kitten, or Storm-0784. From late 2023 through early 2026, this group was found to have attacked PLCs and HMIs based in the United States and affected at least 75 devices.

Targeted Systems

The campaign involved attacks on industrial control systems, such as Rockwell/Allen Bradley CompactLogix and Micro850 controllers, as well as Unitronics PLCs often deployed in water treatment plants.

Initial Access Vector

By taking advantage of internet-facing PLCs using engineering software tools, the actors obtained authorized access to targeted systems using leased infrastructure from other countries, with the help of Rockwell’s Studio 5000 application.

In this regard, the threat appears to have originated not from vulnerabilities in software applications but from operational weaknesses.

Network Exposure & Attack Surface

Malicious traffic targeted multiple industrial communication ports, including:

  • EtherNet/IP (44818)
  • OT configuration port (2222)
  • Siemens S7 (102)
  • SSH (22)
  • Modbus (502)

This broad targeting suggests a vendor-agnostic approach aimed at identifying any reachable industrial device.

Persistence Mechanism

Following the compromise, the attackers deployed a lightweight SSH server (Dropbear SSH) that could be installed on any compromised devices. It helped in keeping the remote access open, thereby allowing a backdoor connection to remain active even after a reboot of the device.

This attack did not involve any sophisticated exploitation techniques; instead, it involved exploiting the vulnerability and poor perimeter security of the targeted network.

Sophisticated Access and Manipulation Techniques

Once the hackers had gained access, their main targets included intelligence gathering and disruption of operations.

According to the advisory, project files (.ACD) of the PLC were stolen. These files include all the logical configurations of the controller and serve as a detailed blueprint for any industrial process.

On the other hand, by tampering with the information presented on the HMI screens and SCADAs, the hackers were able to trick operators into believing that everything was fine, even though changes were being made.

This combination of intelligence gathering and manipulation of information is an example of an espionage-sabotage hybrid attack.

Operational Insight

Notably, the attackers relied on legitimate tools and standard protocols rather than custom malware. This reinforces that the success of the campaign stemmed from weak security controls, not technical sophistication.

Rather than exploiting zero-day vulnerabilities, the threat actors capitalized on exposed infrastructure and poor cyber hygiene.

This highlights a recurring issue in OT environments: critical systems remain accessible and insufficiently segmented, allowing attackers to operate using legitimate tools with minimal resistance.

Operational Impacts

The most evident consequence of the campaign is significant. Access to PLC project files provides visibility into the operation of industrial processes. Thus, cybercriminals receive operational “blueprints” of the critical systems, which can be used against them in any way.

Moreover, tampering with data received from SCADA and HMI provides a deceptive factor. It means that false readings could be provided to operators, leading to the inability to identify real problems or making wrong decisions based on these readings.

Real-World Risk

There are numerous examples of Iranian campaigns demonstrating the risks involved in providing attackers with critical data about systems’ functioning. For instance, one should remember the recent campaigns associated with Agrius, which showed the trend towards initial data exfiltration and follow-up attacks using ransomware.

Thus, the risk scenario of today could be the basis of a far worse one in the near future.

Scale and Sector Exposure

The scale of the campaign under discussion is rather significant since it led to the compromising of at least 75 devices. At that, the primary sector targeted was WWS facilities, which indicates the importance of the attacked systems.

Furthermore, the advisory mentions that multiple critical infrastructure sectors suffered from this campaign.

Indicators and MITRE ATT&CK Techniques

Xcitium Intelligence
Active Campaign Advisory
Jan 2025 – Mar 2026
Threat Actor Aliases
CyberAv3ngers
Hydro Kitten
Storm-0784
APT Iran
Soldiers of Solomon
UNC5691
IP Infrastructure
185.82.73.0/24
135.136.1.133
Targeted Nodes:
.162, .164, .165, .167, .168, .170, .171
Critical Service Ports
44818EtherNet/IP
2222OT Config
102Siemens S7
502Modbus TCP
22Dropbear SSH
MITRE ATT&CK Mapping
T0883: Exploitation
Public-facing apps & Studio 5000 connectivity attacks.
T1565: Manipulation
PLC project data extraction and HMI falsification.
T1572: Tunneling
Persistent nonstandard port protocol encapsulation.
T1040: Sniffing
Internal OT network traffic and credential analysis.

Conclusion: When Internet-Facing PLCs Become National Security Exposure

This campaign proves that critical infrastructure attacks do not always begin with zero-days or custom malware. In this case, Iranian-affiliated operators reached at least 75 U.S. PLCs by abusing internet-facing industrial systems, legitimate engineering tools, and weak perimeter security. Once inside, they stole PLC project files and manipulated HMI and SCADA visibility, turning operational access into both espionage and disruption risk.

Why This Threat Matters

The real lesson is not technical sophistication. It is operational exposure.

  • Internet-facing PLCs created direct access paths into control environments
  • Legitimate protocols and standard tools reduced the need for malware
  • Stolen project files gave attackers detailed blueprints of industrial processes
  • False HMI and SCADA readings increased the risk of delayed or incorrect operator response
  • Water and wastewater facilities were among the primary targets, but multiple critical sectors were affected

Why Many OT Environments Stay Exposed

This campaign succeeded because critical systems remained reachable and insufficiently segmented.

  • Poor cyber hygiene left industrial ports exposed to the public internet
  • OT environments often inherit weak remote access practices
  • Legacy operational priorities delay hardening and segmentation
  • Visibility gaps make unauthorized engineering access harder to catch early

Where Xcitium Changes the Outcome

For organizations using Xcitium Vulnerability Assessment, this attack should have been visible before it became operational access.

  • Exposed industrial services can be identified and prioritized for remediation
  • Risky external reachability can be surfaced before attackers find it
  • Weak segmentation and insecure access paths become actionable findings, not hidden exposure

If you have Xcitium in place, this attack does not succeed the same way, because the reachable entry points are identified and closed before attackers can turn access into sabotage.

Secure OT Before Access Becomes Manipulation

Critical infrastructure does not fail only when systems go offline. It fails when operators can no longer trust what they see. Reduce exposed attack surface, harden remote access, and treat industrial visibility as a security control, not just an operations tool.

Like what you see? Share with a friend.

Move Away From Detection With Patented Threat Prevention Built For Today's Challenges.

No one can stop zero-day malware from entering your network, but Xcitium can prevent if from causing any damage. Zero infection. Zero damage.

Book a Demo