Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical PHP SOAP Flaws Enable Remote Code Execution Attacks
May 12, 2026
Magecart Hackers Abuse GTM for Credit Card Sk Google Manager
May 12, 2026
TeamPCP Compromises Checkmarx Jenkins Compromised Plugin
May 12, 2026
Home/Threats/Iran-Linked CyberAv3ngers Sets Sights on Water Utilities and
Threats

Iran-Linked CyberAv3ngers Sets Sights on Water Utilities and

The <a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/41813a36-9557-4b7a-ac02-cb73d0ceb5b8/ The group, formally connected to Iran’s Islamic...

Marcus Rodriguez
Marcus Rodriguez
April 13, 2026 3 Min Read
6 0

The <a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/41813a36-9557-4b7a-ac02-cb73d0ceb5b8/

The group, formally connected to Iran’s Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC), has been operating since at least 2020 and has steadily sharpened its tools and techniques with each new campaign.

On April 7, 2026, a joint advisory signed by six U.S. agencies — including the FBI, CISA, NSA, EPA, Department of Energy, and Cyber Command — confirmed that Iranian-affiliated actors are actively exploiting internet-facing programmable logic controllers (PLCs) across water and wastewater systems, energy infrastructure, and government facilities.

The advisory, designated AA26-097A, documented real operational disruption and financial losses at multiple U.S. organizations.

The agencies directly linked this activity to CyberAv3ngers, also tracked as Storm-0784 by Microsoft, Bauxite by Dragos, and UNC5691 by Mandiant.

CyberAv3ngers’ formal attribution to Iran’s IRGC-CEC, illustrating the group’s state-directed operational structure and sanctioned leadership.

Tenable researchers noted that the group’s progression reflects a calculated, step-by-step capability build-up. In late 2023, CyberAv3ngers compromised at least 75 Unitronics Vision Series PLCs across the U.S., United Kingdom, and Ireland by exploiting factory-default passwords on internet-exposed devices.

The Municipal Water Authority of Aliquippa, Pennsylvania became one of the most visible victims — its PLC was reachable from the open internet with no authentication gateway protecting it. In Ireland, a separate attack left residents without running water for several days.

By mid-2024, the group introduced IOCONTROL, a custom-built malware platform designed for Linux-based IoT and operational technology environments.

Then in early 2026, CyberAv3ngers shifted to Rockwell Automation Logix controllers, exploiting CVE-2021-22681 — a critical authentication bypass flaw with a CVSS score of 9.8.

This vulnerability lets an attacker who intercepts a single cryptographic key connect to affected PLCs without valid credentials.

Rockwell Automation has confirmed that no software patch exists for it, and affected controller families include CompactLogix, ControlLogix, GuardLogix, DriveLogix, and SoftLogix.

In February 2024, the U.S. Treasury sanctioned six IRGC-CEC officials tied to CyberAv3ngers, and the State Department is offering up to ten million dollars for information on the group.

Despite this, the group keeps operating — a new channel called “Cyber4vengers” surfaced in January 2026 after a prior one was removed.

The group’s ICS exploitation techniques have since spread to roughly 60 affiliated hacktivist groups, creating a threat that no single takedown can neutralize.

IOCONTROL: Built to Hide Inside Industrial Networks

IOCONTROL is the most technically advanced tool in CyberAv3ngers’ current arsenal. The malware is modular and runs on a wide range of Linux-based devices — routers, HMIs, IP cameras, firewalls, and fuel management systems from vendors including D-Link, Hikvision, Red Lion, Orpak, Phoenix Contact, Teltonika, and Unitronics.

Claroty’s Team82 described it as a nation-state cyberweapon built to target civilian critical infrastructure. It was previously tracked as OrpraCab and QueueCat before being formally identified under the IOCONTROL designation in 2024.

IOCONTROL’s command-and-control architecture showing MQTT over TLS on port 8883 and DNS-over-HTTPS for domain resolution, enabling the malware to blend into legitimate IoT network traffic.

What makes IOCONTROL particularly hard to catch is how well it blends into normal network traffic. It uses the MQTT protocol over TLS on port 8883 — a standard IoT communication channel — to reach its command-and-control server.

It also uses DNS-over-HTTPS to resolve command-and-control domains, bypassing standard network monitoring tools entirely.

The malware stores its configuration data encrypted with AES-256-CBC, installs itself as a systemd boot script so it survives reboots, and can execute system commands, scan ports, or delete itself on demand.

Organizations running Rockwell Automation Logix or Unitronics PLCs should disconnect those devices from the public internet immediately. Since no patch exists for CVE-2021-22681, network segmentation and engineering workstation isolation are the primary defenses.

Physical mode switches should be set to “Run” to block remote logic changes. All PLC configurations must be backed up offline on secured media. Remote tools like TeamViewer or AnyDesk should be replaced with enterprise VPN solutions that enforce multifactor authentication.

Security teams should alert on MQTT over TLS traffic on port 8883 and DNS-over-HTTPS activity from OT network segments, and ingest all indicators of compromise from CISA Advisory AA26-097A into SIEM and firewall platforms without delay.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitMalwarePatchSecurityThreatVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

VIPERTUNNEL Python Backdoor Hidden in Fake DLL & Hackers Hide

Next Post

Hackers Abuse MSBuild LOLBin for File Evade Detection

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OpenAI Daybreak Automates Detects and Fix Vulnerabilities
May 12, 2026
BitUnlocker Downgrade Attacks on Windows Allows Access
May 12, 2026
Exploit: Hackers Take Over cPanel Abuse CVE-2026-41940
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us