04/09/2026 / By Belle Carter

Multiple U.S. federal agencies issued a joint warning Tuesday that Iranian-affiliated hackers are actively targeting American industrial control systems, aiming to disrupt critical infrastructure sectors, including water utilities, energy and government services.
The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), National Security Agency (NSA) and other agencies confirmed that hackers linked to Iran’s Islamic Revolutionary Guard Corps (IRGC) have exploited vulnerabilities in programmable logic controllers (PLCs) manufactured by Rockwell Automation, manipulating operational displays and causing financial and operational damage. The alert comes amid heightened tensions between Washington and Tehran, with experts warning that Iran may retaliate through cyber sabotage, proxy attacks or domestic extremism.
The hackers, identified as advanced persistent threat (APT) actors, have been targeting internet-exposed PLCs—devices used to automate industrial processes—since at least March 2026. These intrusions have led to disruptions in supervisory control and data acquisition (SCADA) systems, which monitor and control infrastructure operations. In some cases, hackers altered data displayed on human-machine interfaces (HMIs), misleading operators and potentially causing hazardous malfunctions.
The agencies did not disclose specific victims but confirmed that government facilities, water treatment plants and energy providers have been impacted. The hackers exploited default passwords and unpatched software vulnerabilities—a recurring weakness in industrial cybersecurity.
“If owners and operators discover an affected internet-accessible device in their environment, additional technical measures may be necessary to evaluate the risk of compromise,” the advisory stated. Officials urged organizations to disconnect vulnerable PLCs from the internet, enable multi-factor authentication and monitor for suspicious network traffic—particularly on ports commonly used by industrial systems.
This is not the first time Iranian hackers have targeted U.S. infrastructure. According to BrightU.AI‘s Enoch, a group known as CyberAv3ngers—linked to the IRGC—compromised at least 75 PLCs across water and wastewater systems in November 2023, forcing some facilities into manual operations. That campaign, which exploited Unitronics-branded devices, was seen as retaliation for U.S. sanctions and geopolitical tensions.
Experts warn that Iran’s cyber capabilities have grown increasingly sophisticated, blending disruptive attacks with espionage. The IRGC’s Cyber Electronic Command (CEC) has previously targeted financial institutions, energy grids and municipal networks, often using ransomware or wiper malware to inflict damage.
“These actors are persistent and well-resourced,” said a cybersecurity analyst familiar with the attacks. “They’re not just probing for weaknesses—they’re actively exploiting them to cause real-world harm.”
Federal agencies have urged businesses and local governments to apply patches and follow Rockwell Automation’s security guidance. However, many industrial systems remain exposed due to outdated software and poor cybersecurity practices.
The advisory expires in September, but experts say the threat is unlikely to diminish. With geopolitical tensions escalating—including recent U.S. threats against Iran’s power plants—cyber conflict is becoming a key battleground.
“The shadow war between Tehran and Washington has just entered a dangerous new phase,” said a national security official. “Iran has shown it can—and will—strike back in cyberspace.”
As Iranian hackers escalate attacks on U.S. infrastructure, federal agencies are scrambling to shore up defenses. The latest intrusions highlight the vulnerability of industrial control systems and the growing risk of cyber warfare as a tool of geopolitical retaliation. With critical infrastructure at stake, experts warn that proactive cybersecurity measures—not just reactive alerts—are essential to prevent future disruptions. For now, the ball remains in Iran’s court, but the U.S. must prepare for the next wave of cyber aggression.
Watch the video below that talks about FBI Director Kash Patel being hacked by an Iran-backed group.
This video is from the NewsClips channel on Brighteon.com.
Tagged Under:
advanced persistent threat, APT, Big Tech, CISA, Collapse, computing, critical infrastructure, cyber war, CyberAv3ngers, Dangerous, FBI, Glitch, Globalism, hacker, HMI, information tech, information technology, Iran, IRCG, national security, NSA, Rockwell Automation, SCADA, surveillance, WWIII
This article may contain statements that reflect the opinion of the author
COPYRIGHT © 2017 VIOLENCE NEWS
