On April 7, 2026, a coalition of U.S. federal agencies, including the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA), released joint cybersecurity advisory AA26-097A. The advisory warns of a concerted campaign by Iranian-affiliated Advanced Persistent Threat (APT) actors targeting U.S. critical infrastructure. The attackers are exploiting internet-exposed Operational Technology (OT) devices, specifically Rockwell Automation Allen-Bradley Programmable Logic Controllers (PLCs).
This activity has resulted in tangible operational disruptions at multiple facilities, primarily within the Water and Wastewater Systems (WWS) and energy sectors. The threat actors, tracked under various aliases including Hydro Kitten and Storm-0784, are known for their disruptive and destructive capabilities. The advisory serves as an urgent call to action for all critical infrastructure owners and operators to immediately assess their OT environments for internet exposure and apply recommended mitigations to prevent hostile takeover of industrial control systems.
The campaign represents a direct threat to the physical processes that underpin U.S. critical infrastructure. By targeting PLCs—the small, industrial computers that automate and control processes like water treatment, power distribution, and manufacturing—the attackers can cause physical disruption, equipment damage, and potential public safety risks. The actors are believed to be leveraging publicly available information and tools to identify and exploit Rockwell PLCs that are improperly connected to the internet.
The advisory connects this activity to previous campaigns by the same actors, such as the attacks on U.S.-based Unitronics PLCs in late 2025. The motivation appears to be geopolitical, with attacks escalating in response to regional hostilities. The actors are not just gaining access; they are actively manipulating the PLCs, which demonstrates an intent to cause disruptive or destructive effects rather than simply conduct espionage. The primary initial access vector is direct exploitation of these exposed OT devices, bypassing traditional IT security perimeters.
The TTPs associated with this campaign are focused on the direct manipulation of Industrial Control Systems (ICS).
T1595.002 - Active Scanning: Vulnerability Scanning.T1078 - Valid Accounts and T1190 - Exploit Public-Facing Application. In the context of ICS, this is also mapped to T0886 - Remote Services.T0831 - Manipulation of Control and T0829 - Loss of Control within the MITRE ATT&CK for ICS framework.The core vulnerability being exploited is not a specific software flaw, but an architectural one: the direct connection of sensitive OT devices to the public internet. These devices were not designed for such exposure and often lack robust security features.
The impact of this campaign extends beyond data theft to physical consequences. Successful attacks on WWS facilities could disrupt the supply of safe drinking water or the treatment of wastewater, posing a direct public health risk. In the energy sector, manipulation of PLCs could lead to power outages or damage to expensive equipment. While the advisory does not mention specific financial institutions as targets, widespread disruption to critical infrastructure would have cascading economic effects, impacting all sectors of the economy. The reported operational disruptions and financial losses at victim organizations are likely just the initial wave of a more significant threat if OT environments are not secured.
Detecting these attacks requires visibility into OT networks, which is often a blind spot for security teams.
| Type | Value | Description |
|---|---|---|
| Network Traffic Pattern | Inbound connections from untrusted IPs to PLC ports | Monitor for any internet-sourced traffic to common ICS ports (e.g., 44818/TCP for EtherNet/IP, 2222/TCP for Rockwell) on OT network segments. |
| Log Source | PLC/HMI Audit Logs | Review logs for unauthorized login attempts, configuration changes, or logic downloads. |
| Process Name | RSLinxNG.exe, Studio5000.exe |
Monitor for execution of Rockwell engineering software from unexpected sources or at unusual times. |
| Network Traffic Pattern | Outbound connections from OT network | Any outbound connection from a PLC to an external IP address is highly suspicious and could indicate compromise. |
Detection Strategies:
D3-NTA - Network Traffic Analysis to baseline normal traffic and alert on anomalies, such as connections from new external IPs or the use of programming protocols from untrusted sources.D3-SFA - System File Analysis applied to controller project files.Response:
The recommendations in advisory AA26-097A are clear and should be prioritized.
D3-NI - Network Isolation.D3-BDI - Broadcast Domain Isolation.D3-SU - Software Update.Isolate OT networks from IT networks and the internet to prevent unauthorized access to critical controllers like PLCs. This is the most effective defense.
Apply strict firewall rules to control all traffic entering and exiting the OT network, blocking all non-essential communication.
Keep PLC firmware and engineering software updated to the latest vendor-supplied versions to mitigate known vulnerabilities.
Enforce strong, unique passwords for all ICS devices and applications, and change all default credentials immediately upon deployment.
The primary mitigation against this threat is to enforce strict network isolation for all Operational Technology (OT) assets. Rockwell PLCs and other industrial controllers should never be directly connected to the internet. Organizations must conduct an immediate audit of their network architecture to identify and remove any public-facing OT devices. All remote access to the OT environment must be brokered through a secure gateway, such as a VPN concentrator within a properly configured Industrial DMZ. This access must be protected with Multi-Factor Authentication (MFA). This single measure effectively removes the initial access vector used by the Iranian APTs, forcing them to find a much more difficult path through the IT network, which is typically better monitored and defended.
At the boundary between the IT and OT networks, deploy a firewall capable of deep packet inspection for industrial protocols. Configure rules to strictly enforce a 'default deny' policy, only allowing explicitly authorized communication. For Rockwell PLCs, this means only allowing EtherNet/IP traffic (port 44818) from specific, authorized engineering workstations or HMIs. All other traffic from the IT network to the OT network should be blocked. This creates a strong defensive perimeter that prevents unauthorized actors who may have compromised the IT network from easily pivoting into the more sensitive OT environment. This technique hardens the environment against lateral movement and contains threats within the IT zone.
In addition to network controls, the PLCs themselves must be hardened. This involves several key steps outlined in Rockwell's advisories (PN1550, SD1771). First, change all default credentials on the devices to strong, unique passwords. Second, place the PLC's mode switch into the 'Run' position to prevent remote programming changes. Third, disable or block unnecessary services and ports on the device. Finally, utilize features like controller-based access control to restrict which users or devices can communicate with the PLC. These hardening steps increase the difficulty for an attacker to manipulate the device even if they manage to gain network access to it.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats