Iran-linked CyberAv3ngers targets water utilities and industrial controllers across the US


Iranian-affiliated cyber actors tied to CyberAv3ngers are actively targeting internet-exposed programmable logic controllers across U.S. critical infrastructure, including water, wastewater, energy, food and beverage, and government facilities. In a joint advisory published on April 7, CISA, FBI, NSA, EPA, DOE, and U.S. Cyber Command said the activity has already caused operational disruption and financial loss.

The agencies identify the activity as linked to Iranian cyber actors associated with the Islamic Revolutionary Guard Corps Cyber-Electronic Command, or IRGC-CEC. They also note that the threat cluster is tracked by multiple vendors under different names, including CyberAv3ngers, Storm-0784, and UNC2428 or related reporting labels depending on the campaign.

This is not just another noisy hacktivist operation. The advisory says the actors have moved beyond website defacements and propaganda, and are now pursuing disruptive access to real industrial systems, especially exposed PLCs used in essential services.

Why Unitronics and Rockwell systems remain in focus

The most visible early wave involved Unitronics Vision Series PLCs in late 2023. CISA previously warned that IRGC-affiliated actors compromised Unitronics devices in the United States and elsewhere by abusing default passwords on internet-connected controllers.

That campaign included the well-known incident in Aliquippa, Pennsylvania, where a water authority was forced to switch to manual operations after a Unitronics device was targeted. U.S. officials have repeatedly used that case as a warning about internet-exposed OT devices with weak authentication.

The newer concern involves Rockwell Logix controllers. The April 2026 joint advisory says Iranian-affiliated actors are attempting to exploit CVE-2021-22681, an authentication bypass flaw that affects multiple Rockwell Logix families. Rockwell’s advisory says the issue can allow a remote, unauthenticated attacker to bypass a verification mechanism and authenticate with controllers if they have network access.

Rockwell’s flaw has mitigations, but not a normal software patch

One detail matters here. The sample article says no software patch exists for CVE-2021-22681, which is directionally true but incomplete. Rockwell says CIP Security, when properly deployed, remediates the risk by requiring authenticated controller connections with stronger cryptographic protections.

That means defenders should not read this as “nothing can be done.” Rockwell’s own guidance points admins toward CIP Security and other hardening measures, while CISA’s joint advisory urges operators to isolate exposed PLCs, remove public internet access, and enforce strong remote access controls.

The affected families listed by Rockwell include CompactLogix, ControlLogix, GuardLogix, DriveLogix, FlexLogix, and SoftLogix product lines. That gives the threat real reach across industrial environments that still rely on legacy connectivity and weak segmentation.

IOCONTROL shows the group has moved beyond simple defacement

CyberAv3ngers has also been tied to IOCONTROL, a custom malware platform for Linux-based IoT and OT devices. Claroty’s Team82 said IOCONTROL was built to target routers, PLCs, HMIs, cameras, firewalls, and fuel management systems from multiple vendors, including D-Link, Hikvision, Red Lion, Orpak, Phoenix Contact, Teltonika, and Unitronics.

Claroty described IOCONTROL as a nation-state cyberweapon used against civilian critical infrastructure. The researchers also said the malware uses MQTT over TLS and other techniques to blend into expected IoT traffic, making detection harder in poorly monitored OT environments.

That evolution matters because it shows CyberAv3ngers is no longer limited to opportunistic access on badly exposed controllers. The group, or the broader ecosystem around it, now appears capable of combining public device exposure, controller-specific weaknesses, and purpose-built malware for persistent access.

Sanctions have not stopped the activity

The U.S. Treasury sanctioned six IRGC-CEC officials in February 2024 for cyber activity linked to CyberAv3ngers. The State Department also announced a reward offer of up to $10 million for information on IRGC-linked malicious cyber actors targeting U.S. critical infrastructure.

Even so, U.S. agencies say the threat remains active in 2026. The latest advisory makes clear that operators should treat this as a live risk, not a historical campaign that faded after the Unitronics headlines.

For utilities and industrial operators, the message is blunt. If PLCs are reachable from the internet, protected by default credentials, or exposed through weak remote access paths, Iranian-affiliated actors may already be looking for them.

What organizations should do now

PriorityActionWhy it matters
ImmediateRemove PLCs and HMIs from direct internet exposureThe joint advisory says the actors actively target internet-facing controllers
ImmediateChange default passwords and review all controller authentication settingsEarlier Unitronics compromises relied on default credentials
HighDeploy CIP Security where supported on Rockwell environmentsRockwell says it mitigates CVE-2021-22681
HighRestrict remote access to enterprise VPNs with MFARemote access tools and weak exposure expand the attack surface
HighMonitor OT segments for unusual MQTT over TLS and suspicious outbound activityClaroty says IOCONTROL uses these channels to blend in
OngoingBack up controller logic and configurations offlineRecovery depends on trusted backups if devices are altered

The actions above reflect the joint U.S. advisory, Rockwell’s own guidance, and Claroty’s IOCONTROL research.

FAQ

Who is CyberAv3ngers?

CyberAv3ngers is an Iranian-affiliated threat group that U.S. agencies link to the IRGC-CEC. It has targeted industrial control systems and critical infrastructure, especially internet-exposed PLCs.

What systems are at highest risk?

Water and wastewater systems, energy organizations, government facilities, and other operators with exposed PLCs or weakly protected remote access face the highest risk, according to the April 2026 joint advisory.

Is there a patch for CVE-2021-22681?

Rockwell does not describe this as a normal software patch scenario. Instead, it points customers to CIP Security and hardening steps to prevent abuse of the authentication bypass.

What is IOCONTROL?

IOCONTROL is a modular malware platform tied to Iranian operators and designed for Linux-based IoT and OT devices. Claroty says it can target a wide range of industrial and edge systems.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages