A joint advisory from the FBI and CISA has issued an urgent warning regarding an ongoing cyber campaign by Iran-affiliated threat actors targeting United States critical infrastructure. The attackers are exploiting internet-exposed Operational Technology (OT), specifically Rockwell Automation Allen-Bradley Programmable Logic Controllers (PLCs), to cause operational disruptions. The campaign has successfully impacted water and wastewater systems (WWS), energy facilities, and government services. Attackers are leveraging legitimate vendor software to connect to and manipulate these devices, leading to tangible physical consequences and financial losses. The widespread exposure of these devices—with an estimated 74.6% of vulnerable systems located in the US—presents a severe national security risk, prompting an immediate call to action for organizations to remove OT systems from public-facing networks.
What Happened: Since at least March 2026, threat actors linked to Iran have been systematically scanning for and exploiting internet-exposed PLCs. The primary targets are Rockwell Automation's Allen-Bradley CompactLogix and Micro850 controllers, which are prevalent in US industrial environments. The attackers gain initial access by connecting directly to these exposed devices from overseas-based IP addresses.
Attack Vector: The core of the attack lies in the exploitation of insecure, internet-facing PLCs. These devices are often deployed in remote locations (e.g., water pump stations, electrical substations) using cellular modems, and lack fundamental security controls like firewalls or VPNs. The attackers use legitimate, albeit unauthorized, instances of Rockwell's Studio 5000 Logix Designer software to establish a connection, download the existing project file from the PLC, manipulate it, and then upload the malicious version back to the device.
Who's Affected: The campaign explicitly targets US-based critical infrastructure. Confirmed sectors include:
Impact: The attacks have resulted in demonstrable physical and economic impact, including:
The attackers' methodology demonstrates a clear understanding of industrial control processes and the tools used to manage them. While not technically sophisticated in terms of vulnerability exploitation, the campaign is effective due to poor security hygiene in OT environments.
T1595.002 - Vulnerability Scanning): Attackers use internet-wide scanning tools like Shodan or Censys to identify exposed PLCs, specifically looking for services running on common OT ports.T1190 - Exploit Public-Facing Application): The primary initial access vector is direct connection to PLCs that are not protected by firewalls or access controls.T1219 - Remote Access Software): Attackers use Rockwell's own Studio 5000 Logix Designer software as a Remote Access Tool to connect to and program the PLCs. This use of legitimate software makes detection based on traffic patterns more challenging.T0829 - Control Device): The core of the attack involves altering the PLC's logic. This can include changing setpoints, disabling safety interlocks, or forcing the device into a fault state.T0886 - Manipulate View): By altering data on HMI displays, attackers can mislead operators, causing them to take incorrect actions or preventing them from seeing the true state of the physical process.The use of legitimate engineering software from foreign IP addresses is a key indicator. Monitoring for such connections is a critical detection strategy.
The business and operational impact of this campaign is severe. Compromising a PLC can lead to immediate and catastrophic physical consequences. In a water treatment facility, for example, manipulating a PLC could alter chemical dosages, leading to public health crises. In an energy substation, it could cause equipment damage or widespread power outages. The financial impact stems from emergency response costs, equipment replacement, regulatory fines, and loss of public trust. The fact that attackers are also scanning for other protocols like Siemens S7comm and Modbus indicates this is a broad, systemic threat to all OT asset owners, not just those using Rockwell products.
Security teams should proactively hunt for signs of compromise and exposure. These are not IOCs, but hunting indicators:
port44818/TCPport2222/TCPprocess_nameStudio5000.exenetwork_traffic_pattern* -> [Corporate IP Range]:44818log_sourceFirewall/IDS Logsurl_patternShodan/Censys search queries for RockwellDetection:
44818/TCP and 502/TCP. (D3FEND Technique: D3-NTA: Network Traffic Analysis)D3-ITF: Inbound Traffic Filtering)Response:
Immediate Actions:
Strategic Recommendations:
M1030 - Network Segmentation)M1047 - Audit)OT-ISAC warns that critical infrastructure cyber risks, including PLC exploitation, are expanding to distributed energy assets, signaling a deteriorating threat landscape.
The OT-ISAC advisory reveals that the threat to critical infrastructure, exemplified by the Iran-affiliated PLC exploitation, is now spreading to a wider range of distributed energy resources (DER), remote sites, and OT-adjacent systems. This expansion of the attack surface, coupled with recent destructive attacks in Poland, signifies a deteriorating threat landscape for the energy sector. Defenders must now address risks beyond central control rooms, as the overall impact and potential for disruption have increased due to the broader targeting of distributed assets.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.