Back to Feed
Nation-stateApr 7, 2026

Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure

Iran-linked hackers sabotage US energy and water infrastructure via compromised industrial control devices.

Summary

US agencies including FBI, NSA, DOE, and CISA warned of Iranian government-affiliated hackers targeting programmable logic controllers (PLCs) in US critical infrastructure including energy, water, and wastewater utilities. The campaign, attributed to tactics similar to the CyberAv3ngers group (believed linked to the IRGC), has caused operational disruption and financial losses. The attacks escalate tensions as Iran appears to reciprocate US military and cyber threats with infrastructure sabotage.

Full text

CommentLoaderSave StorySave this storyCommentLoaderSave StorySave this storyAs US President Donald Trump threatens wholesale demolition of Iran's infrastructure in the midst of an escalating war, Iran now appears to have already reciprocated with its own form of infrastructure sabotage: A hacking campaign hitting industrial control systems across the United States, including energy and water utilities, that US agencies say has had disruptive and costly effects.In a joint advisory published Tuesday, a group of US agencies including the FBI, the National Security Agency, the Department of Energy, and the Cybersecurity and Infrastructure Security Agency warned that a group of hackers affiliated with the Iranian government has targeted industrial control devices used in a series of critical infrastructure targets including in the energy sector, water and wastewater utilities, and unspecified “government facilities.” According to the agencies, the hackers have targeted programmable logic controllers (PLCs)—a type of device designed to allow digital control of physical machinery—in those facilities, including those sold by industrial tech firm Rockwell Automation, with the apparent intention of sabotaging their systems.By compromising those PLCs, the advisory warns, the hackers sought to change information on the displays of industrial control systems, which can in some scenarios cause system downtime, damage, or even dangerous conditions. “In a few cases, this activity has resulted in operational disruption and financial loss,” it reads, though it offers no details about the severity of those effects.“It’s well documented that Iranian actors target industrial control systems and see them as a nexus to apply pressure,” says Rob Lee, the co-founder and CEO of Dragos, a cybersecurity firm that focuses on industrial control systems, who says that his firm has responded to multiple incidents targeting industrial systems since the war against Iran began last month. “We have seen both state and non-state actors in Iran pose real risk and show willingness to hurt people through compromising these systems. I fully expect them to keep up the pressure and target those sites they can get access to.”When WIRED reached out to Rockwell Automation, a company spokesperson responded in a statement that it “takes seriously the security of its products and solutions and has been closely coordinating with government agencies in connection with” Tuesday's advisory, and pointed to documents it has published for customers on how to better secure their PLCs.Though the advisory doesn’t specify a particular group responsible for the hacking campaign, it notes that the attacks are similar to those carried out in by the Iran-linked group known as CyberAv3ngers, or the Shahid Kaveh Group, starting in late 2023. That team of hackers, believed to work in the service of the Iranian Revolutionary Guard Corps, inflicted several waves of attacks against Israeli and US targets in recent years, including gaining access to more than a hundred devices sold by industrial control system technology firm Unitronics and most commonly used in water and wastewater utilities.In that hacking campaign, CyberAv3ngers set the names of the Unitronics devices to read “Gaza”—in a reference to Israel’s invasion of the territory in retaliation for Hamas’s October 7 attacks—and changed the devices’ displays to show an image of the CyberAv3ngers logo. Despite the initial appearance of mere vandalism, industrial cybersecurity firms that tracked the attacks, including Dragos and Claroty, told WIRED that the hackers corrupted the Unitronics’ devices’ code deeply enough to disrupt services in water utility networks from Israel to Ireland to a Pittsburgh, Pennsylvania, facility in the US.“The Unitronics attacks demonstrated the IRGC does have industrial control systems hacking capabilities,” says Grant Geyer, Claroty’s chief strategy officer. “If you look at the IRGC playbook, they know they can't compete on the traditional military field. So they attempt to cause disruption within the cyber domain using asymmetric warfare techniques.”Despite the US State Department putting a $10 million bounty on the group and the US Treasury sanctioning six IRGC officials with links to it, CyberAv3ngers went on to breach a US oil and gas company in 2024, according to Dragos, and to infect industrial control and internet-of-things devices with a piece of malware known as IOControl. The group appeared to be transitioning from “opportunistic attackers where their whole goal was spreading a message into the realm of a persistent threat,” Claroty researcher Noam Moshe told WIRED last year. In that IOControl malware campaign, he said, “they wanted to be able to infect all kinds of assets that they identify as critical and just leave their malware there as an option for the future.”The news that Iranian hackers have disrupted US infrastructure targets may signal that disruptive hacking operations from Iran are intensifying as the war extends into its second month. Ahead of the initial air strikes that the US and Israel carried out against Iran, US Cyber Command publicly took credit for disabling Iranian defenses through cyberattacks.Iran's counterattacks have since largely been carried out by a group known as Handala—a “hacktivist” group widely believed to work on behalf of Iran's ministry of intelligence—which has launched scattershot attacks including a crippling breach of medical technology firm Stryker and a hack-and-leak operation targeting an older, personal Gmail account of FBI director Kash Patel.Following Trump's hyper-aggressive message Tuesday morning that an “entire civilization will die tonight,” posted to his social media platform Truth Social in an apparent threat to indiscriminately destroy Iranian civilian infrastructure, Handala seemed to respond with threats of its own.“Tonight, cyber and missile soldiers will fight side by side for one nation,” a message on Handala's Telegram posted Tuesday afternoon reads. “We have a spectacular night ahead!”Updated at 5:09 pm ET, April 7, 2026: Added additional contextual information about Iran-linked cyberattacks and groups.Updated at 5:45 pm ET, April 7, 2026: Added comment from Claroty's Grant Geyer.

Indicators of Compromise

  • malware — IOControl

Entities

CyberAv3ngers (Shahid Kaveh Group) (threat_actor)Handala (threat_actor)Rockwell Automation (vendor)Unitronics (vendor)Programmable Logic Controllers (PLCs) (product)Stryker (vendor)