CISA, the FBI, NSA, EPA, DOE, and U.S. Cyber Command published a joint advisory this week (AA26-097A) warning of active exploitation of internet-facing Programmable Logic Controllers (PLCs) by Iranian-affiliated advanced persistent threat (APT) actors. If your organization operates in the government services, energy, or water and wastewater sectors, this demands immediate attention.
Our Director of the RAID Team sat down to walk through the advisory and give you clear, actionable guidance. Watch the full breakdown here:
Since at least March 2026, Iranian-affiliated APT actors have been accessing internet-exposed PLCs, primarily Rockwell Automation/Allen-Bradley CompactLogix and Micro850 devices, with some targeting of Siemens S7 PLCs as well.
Once inside, they're doing two things:
Corrupting project files (.ACD files containing ladder logic and controller configuration)
Manipulating data displayed on HMI and SCADA screens.
The goal isn't espionage — it's disruption. Several victim organizations have already experienced operational downtime and financial loss. With ongoing U.S.-Iran tensions, the authoring agencies assess this activity is likely to continue and escalate.
The attack vector is straightforward: PLCs that are directly internet-exposed. Threat actors are using legitimate Rockwell configuration software (Studio 5000 Logix Designer) over standard OT ports to establish connections that look like normal engineering traffic. Key ports to watch in your telemetry include:
If you operate PLCs in any of the targeted sectors, take these steps immediately:
Due to recent world events, Iranian threat actors have significantly increased their operational tempo. As this situation continues to evolve, we'll keep publishing updates when new information becomes available.
Full advisory and downloadable IOCs: CISA AA26-097A