Executive Summary
In March 2026, Iranian-affiliated Advanced Persistent Threat (APT) actors initiated cyberattacks targeting internet-exposed Rockwell/Allen-Bradley programmable logic controllers (PLCs) within U.S. critical infrastructure sectors, including Government Services, Water and Wastewater Systems, and Energy. These attacks involved unauthorized access to PLCs, manipulation of project files, and alteration of data displayed on Human-Machine Interface (HMI) and Supervisory Control and Data Acquisition (SCADA) systems, leading to operational disruptions and financial losses.
This incident underscores the escalating cyber threat landscape, particularly in the context of geopolitical tensions. Organizations must prioritize securing internet-facing operational technology assets to mitigate risks associated with state-sponsored cyber activities.
Why This Matters Now
The recent escalation in Iranian cyber activities targeting U.S. critical infrastructure highlights the urgent need for enhanced cybersecurity measures to protect essential services from state-sponsored threats.
Attack Path Analysis
Iranian-affiliated APT actors initiated attacks by exploiting internet-exposed Rockwell/Allen-Bradley PLCs in U.S. critical infrastructure sectors. Upon gaining access, they escalated privileges to manipulate project files and data on HMI and SCADA displays. The attackers moved laterally within the OT environment to compromise additional systems. They established command and control channels to maintain persistent access and exfiltrated sensitive operational data. The attacks culminated in operational disruptions and financial losses for the affected organizations.
Kill Chain Progression
Initial Compromise
Description
Attackers exploited internet-exposed Rockwell/Allen-Bradley PLCs to gain unauthorized access.
Related CVEs
CVE-2017-16740
CVSS 10A stack-based buffer overflow vulnerability in Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers allows remote attackers to execute arbitrary code.
Affected Products:
Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers – Series B and C Versions 21.002 and earlier
Exploit Status:
exploited in the wildCVE-2016-0868
CVSS 9.8A stack-based buffer overflow vulnerability in Rockwell Automation Allen-Bradley MicroLogix 1100 devices allows remote attackers to execute arbitrary code via a crafted web request.
Affected Products:
Rockwell Automation Allen-Bradley MicroLogix 1100 – Series A through 15.000 and Series B before 15.002
Exploit Status:
exploited in the wildCVE-2016-9338
CVSS 2.7An incorrect permission assignment for critical resource vulnerability in Rockwell Automation Allen-Bradley MicroLogix 1100 controllers allows users with administrator privileges to remove all administrative users, requiring a factory reset to restore functionality.
Affected Products:
Rockwell Automation Allen-Bradley MicroLogix 1100 – Series A and B, Version 14.000 and prior
Exploit Status:
exploited in the wildReferences:
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Internet Accessible Device
Remote System Discovery
Automated Collection
I/O Image
Indicator Removal on Host
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
NIST SP 800-53 – Boundary Protection
Control ID: SC-7
PCI DSS 4.0 – Restrict Inbound and Outbound Traffic
Control ID: 1.2.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
CISA ZTMM 2.0 – User Authentication and Authorization
Control ID: Pillar 1: Identity
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Utilities
Critical water, energy infrastructure faces Iranian APT attacks on internet-exposed PLCs causing operational disruptions, financial losses, and compromised SCADA systems requiring immediate segmentation.
Government Administration
Government facilities targeted by Iranian hackers exploiting Rockwell PLCs with data manipulation capabilities, requiring enhanced east-west traffic security and zero trust segmentation implementation.
Oil/Energy/Solar/Greentech
Energy sector PLCs vulnerable to Iranian-affiliated attacks enabling project file extraction and HMI display manipulation, necessitating encrypted traffic protection and egress security controls.
Health Care / Life Sciences
Medical infrastructure at risk from Iranian groups like Handala demonstrated by Stryker attack wiping 80,000 devices, requiring multicloud visibility and threat detection capabilities.
Sources
- US warns of Iranian hackers targeting critical infrastructurehttps://www.bleepingcomputer.com/news/security/us-warns-of-iranian-hackers-targeting-critical-infrastructure/Verified
- Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructurehttps://www.ic3.gov/CSA/2026/260407.pdfVerified
- FBI: Iran-Linked Attackers Targeting Critical Infrastructure OT Deviceshttps://www.crn.com/news/security/2026/fbi-iran-linked-attackers-targeting-critical-infrastructure-ot-devicesVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have constrained the attackers' ability to exploit internet-exposed PLCs, escalate privileges, move laterally within the OT environment, establish command and control channels, and exfiltrate sensitive operational data, thereby reducing the overall blast radius of the attack.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: Implementing Aviatrix CNSF would likely limit unauthorized access by enforcing strict identity-based policies, reducing the risk of exploiting internet-exposed PLCs.
Control: Zero Trust Segmentation
Mitigation: Zero Trust Segmentation would likely restrict privilege escalation by enforcing least-privilege access controls, limiting attackers' ability to manipulate critical files and data.
Control: East-West Traffic Security
Mitigation: East-West Traffic Security would likely limit lateral movement by monitoring and controlling internal traffic, reducing the risk of attackers compromising additional systems.
Control: Multicloud Visibility & Control
Mitigation: Multicloud Visibility & Control would likely detect and limit unauthorized command and control channels, reducing the risk of persistent attacker access.
Control: Egress Security & Policy Enforcement
Mitigation: Egress Security & Policy Enforcement would likely restrict unauthorized data exfiltration by monitoring and controlling outbound traffic, reducing the risk of sensitive data loss.
Implementing Aviatrix Zero Trust CNSF would likely reduce the overall impact by limiting the attacker's ability to escalate privileges, move laterally, and exfiltrate data, thereby minimizing operational disruptions and financial losses.
Impact at a Glance
Affected Business Functions
- Water Treatment Operations
- Power Generation Control
- Municipal Services Management
Estimated downtime: 7 days
Estimated loss: $500,000
Operational data related to critical infrastructure processes
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict lateral movement within OT environments.
- • Deploy Egress Security & Policy Enforcement to monitor and control outbound traffic, preventing unauthorized data exfiltration.
- • Utilize Multicloud Visibility & Control to detect and respond to anomalous activities across cloud and on-premises environments.
- • Apply Inline IPS (Suricata) to identify and block known exploit patterns targeting PLCs.
- • Ensure all PLCs are updated with the latest firmware and are not directly exposed to the internet.



