In recent weeks, U.S. security and intelligence agencies have opened an alarm that deserves attention: groups linked to Iran are focusing their efforts on operational technology (OT) devices that are exposed to the Internet, in particular programmable logical controllers (PLC) of manufacturers widely used in critical infrastructure. It is a pattern that not only seeks digital espionage, but the direct manipulation of industrial processes with effects ranging from screen alteration to operational interruptions and economic losses.
The notice, spread by agencies such as the FBI and shared by other sector entities, describes a consistent technique: attackers establish legitimate connections with PLC using industrial configuration software - in some cases using platforms such as Rockwell Automation Studio 5000 - to then extract project files and modify the information shown on the human-machine interfaces (HMI) and on SCADA systems. To keep the access remote, the intruders install SSH software (the use of Dropbear has been identified) at the compromised points, allowing them to operate through port 22 and exfilter data or inject changes.

Among the targets are specific devices of the Allen- Bradley family, such as CompactLogix and Micro850, deployed in government services, water plants and energy systems. The risk is that a discreet manipulation of readings or control logic will result in wrong human decisions or unplanned stops of critical equipment, a scenario that organizations must avoid at all costs.
These operations are part of a wider escalation of cyber-attacks attributed to Iranian actors, which according to several recent analyses include denial of service campaigns (DDoS), leaks and coordinated disinformation actions through public networks and messaging channels such as Telegram. Researchers and intelligence firms have pointed out that, in addition to operating with groups that are presented as hackers, there is a layer that functions as an ecosystem of influence and attack with links to state structures. In order to deepen this ecosystem and its integration between technical operations and media amplification, reports from companies specialized in threat intelligence can be consulted. DomainTools and analysis published by groups such as Check Point Research and Recorded Future.
This is not the first time that intrusions on OT environments have been detected in the United States. At the end of last year, there was a campaign that compromised Unitonics devices at a water authority in Pennsylvania, where dozens of teams were found to be affected. The repetition of this pattern shows that attackers have tuned techniques and are willing to reuse tools and methodologies to hit sensitive points. Organizations such as FBI and CISA have been documenting the evolution of these threats and issuing recommendations for the protection of the OT environment.
Another disturbing aspect is the hybridization between state actors and criminal ecosystems: recent technical reports describe the use of malware frameworks and services originally developed in the criminal market as components in state-sponsored operations. Projects such as CastleLoader / CastleRAT, PowerShell loaders that trigger additional loads and even creative command and control address recovery mechanisms (C2) through public lockchain chains, exemplify how criminal avant-garde techniques are mixed with strategic objectives. Open research on these tool families can be found in sources such as JUMPSEC and various industry analyses.
What should the organizations that manage OT do? The recommendations of the agencies are clear and practical: do not directly expose the PLC to the public network and limit the possibility of remote modifications by physical or logical controls; place a network barrier - a firewall or proxy - between the controllers and the rest of the network; activate robust authentication, ideally with multifactor; keep firmware and configuration software up to date; disable authentication mechanisms that are not used and continuously monitor traffic in search of unusual connections. These measures do not guarantee total immunity, but they significantly increase the cost and complexity of an attacker.
In addition to technical measures, there is an organizational component: integrating OT protection into corporate cybersecurity programs, performing exercises that include process handling scenarios and improving communication channels between IT and OT equipment. Convergence between business networks and industrial control requires coordination and aligned response practices, because early IT detection can prevent a commitment to OT and vice versa.

The combination of proven tactics - use of third-party infrastructure, reuse of remote access tools and exploitation of legitimate industrial configuration software - together with a strategy of influence and amplification in social media and networks, defines a complex risk that mixes technical capacity and geostrategic objectives. In the face of this, the key is not only to park or segment networks, but to understand the threat as part of a larger picture where state, proxies and criminal actors feed back.
For those who want to deepen, it is advisable to review the communications and alerts of official agencies and the technical analyses published by cyber security intelligence companies. Pages like FBI, CISA and the industry reports available in Check Point Research, Recorded Future or DomainTools offer elements to better understand the observed tactics and recommended actions.
The lesson for operators and managers is clear: do not underestimate the capacity to damage in OT or the pace at which these campaigns evolve. The industrial control architecture was designed for availability and physical security, not to resist a sophisticated digital offensive; updating us on both fronts is, today more than ever, an inescapable priority.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...