As tensions escalate between the United States and Iran, Iranian cybersecurity activities appear to be intensifying. Following threats from U.S. President Donald Trump to target Iran’s infrastructure, the U.S. government has reported a series of Iranian-led cyberattacks disrupting critical infrastructure in the U.S., particularly in the energy and water sectors.
In a recent advisory disseminated by various U.S. agencies, including the FBI and the NSA, it was revealed that hackers associated with the Iranian government have been compromising industrial control systems across the country. These attacks predominantly target programmable logic controllers (PLCs), which are essential for managing various industrial processes in key utilities. The fallout from these cyberattacks has led to operational disruptions and financial losses for some affected entities.
Rob Lee, co-founder and CEO of Dragos—a firm focused on industrial cybersecurity—highlighted that Iran has historically targeted such systems as a method of applying pressure. The advisory indicated that this concerted effort to disrupt U.S. operations aligns with previous cyber campaigns attributed to Iranian groups, specifically those like CyberAv3ngers, which have a track record of similar activities against U.S. and Israeli infrastructure.
Rockwell Automation, a key provider of industrial control devices, has taken steps to address the vulnerabilities exploiting their products by collaborating with government bodies to bolster security measures.
The latest wave of cyberattacks bears similarities to earlier campaigns conducted by Iran-aligned groups such as CyberAv3ngers, which had previously infiltrated various Israeli and American systems, causing significant disruption across multiple countries. The group’s previous attacks included altering device identifiers and displays in a way that referenced geopolitical conflicts, demonstrating their use of cyber warfare not just for extraction of data but as a tool for political messaging.
Despite international pressure, including a bounty placed on members of CyberAv3ngers, their activities have not diminished. Reports indicate they successfully breached a U.S. oil company in 2024, signifying a shift in their operational strategy towards a more persistent and long-term threat model.
Moreover, Iranian hacking efforts seem to have escalated alongside military actions in the ongoing conflict, with a group named Handala also partaking in various cyber activities, including hacking medical firms and leaking sensitive information.
In response to Trump’s aggressive stance, Handala issued threats suggesting coordinated cyber operations alongside missile strikes against those threatening Iran’s sovereignty, hinting at a complex landscape where cyber and military operations are increasingly intertwined.
As the situation develops, the implications for both sides’ infrastructure security and international relationships remain profound, with each escalation likely leading to further retaliatory measures in both the physical and cyber domains.