Nearly 4,000 US industrial devices are exposed to Iranian cyberattacks

April 12, 20266 min read3 sources
Share:
Nearly 4,000 US industrial devices are exposed to Iranian cyberattacks

A single water plant hack reveals a nationwide vulnerability

In late November 2023, a cyberattack on a small municipal water authority in Aliquippa, Pennsylvania, sent a clear signal across the U.S. critical infrastructure landscape. A group calling itself "Cyber Av3ngers," believed to be a front for Iranian state-sponsored actors, breached the facility's systems, defacing a control screen with an anti-Israel message. The attack vector was alarmingly simple: an internet-exposed, Israeli-made Unitronics programmable logic controller (PLC) that was reportedly still using a default password. While the immediate impact was minimal, the incident prompted a deeper investigation by federal agencies and cybersecurity firms, uncovering a far more significant and systemic risk.

Research following the attack has revealed that the vulnerability exploited in Pennsylvania is not an isolated case. According to security firm Censys, nearly 4,000 industrial devices in the United States, specifically PLCs manufactured by the American company Rockwell Automation, are similarly exposed to the public internet. This discovery transforms a localized incident into a national security concern, highlighting a vast attack surface that opportunistic threat actors can exploit to disrupt essential services across the country.

Technical details: A problem of exposure, not exploitation

At the heart of this issue are Programmable Logic Controllers (PLCs). These are ruggedized industrial computers that act as the brains for automated processes in everything from water treatment plants and manufacturing lines to power grids and building management systems. They are the digital hands that turn valves, start motors, and mix chemicals. When these devices are compromised, attackers can directly manipulate the physical world.

The primary vulnerability is not a sophisticated zero-day exploit, but a fundamental failure in security architecture: direct internet exposure. Industrial control systems (ICS) and their operational technology (OT) networks are designed to be isolated from the outside world. Connecting them directly to the internet is a cardinal sin of OT security. Yet, researchers from Censys and Tenable found thousands of such devices readily discoverable through public scanning tools like Shodan.

These exposed Rockwell Automation devices, including popular models like the Allen-Bradley MicroLogix 1100, often communicate over unencrypted industrial protocols such as EtherNet/IP (TCP port 44818) and Modbus/TCP (TCP port 502). As the joint advisory from CISA and the FBI noted following the Aliquippa attack, threat actors actively scan for devices using these protocols. Once found, an attacker's job is simplified. They can attempt to log in using default credentials—which are often unchanged from the factory settings—or exploit known vulnerabilities.

While the "Cyber Av3ngers" attack on the Unitronics PLC relied on weak credentials, the exposed Rockwell devices are also susceptible to a range of documented flaws. For example, CVE-2023-3595 is a denial-of-service vulnerability in MicroLogix controllers that could allow an attacker to crash the device, halting industrial processes. This means that even if default passwords have been changed, the mere exposure of these devices presents a severe risk.

Impact assessment: A threat to public health and safety

The nearly 4,000 exposed Rockwell Automation PLCs are not concentrated in a single sector; they are spread across the fabric of American critical infrastructure. The potential targets include:

  • Water and Wastewater Systems: As seen in Aliquippa, attackers could manipulate water treatment processes, alter pressure levels to damage pipes, or shut down water distribution entirely.
  • Manufacturing: A compromised PLC could halt a factory production line, damage expensive equipment, or alter formulas, leading to significant economic losses and product safety issues.
  • Energy: While larger energy facilities typically have stronger security, smaller operations or distribution substations could be vulnerable, potentially leading to localized power disruptions.
  • Transportation and Logistics: Systems controlling traffic signals, rail switches, or port machinery could be targeted, causing chaos and supply chain disruptions.

The consequences of a successful, widespread campaign targeting these devices range from operational disruption and economic damage to direct threats to public health and safety. The Aliquippa incident was largely performative, designed to send a political message. However, the access gained by the attackers could have easily been used for more destructive purposes. A more capable adversary could leverage this same access to cause physical damage or endanger lives.

The CISA advisory confirmed that Iranian government-sponsored APT actors are actively targeting U.S. critical infrastructure. This is not a theoretical threat. It is an active campaign by a nation-state adversary that is capitalizing on the low-hanging fruit of insecurely configured industrial systems.

How to protect your organization

Securing industrial control systems from these threats requires a return to security fundamentals. Asset owners and operators must take immediate, concrete steps to reduce their exposure. The following actions are not optional suggestions; they are necessary requirements for operating critical systems safely.

  1. Eliminate Direct Internet Exposure: The first and most important step is to identify and disconnect any PLC or industrial controller that is directly accessible from the internet. Conduct a thorough audit of your network to find any device with a public IP address and remove it from the public-facing internet immediately.
  2. Implement Robust Network Segmentation: Your operational technology (OT) network should be strictly segregated from your corporate IT network and the internet. Use firewalls and a demilitarized zone (DMZ) to create a buffer, ensuring that no direct communication path exists between the internet and your critical control systems. This practice of encryption and isolation is foundational to OT security.
  3. Enforce Secure Remote Access: If remote access to the OT network is necessary for maintenance or monitoring, it must be done through a secure, audited channel. Implement a properly configured VPN with multi-factor authentication (MFA) to ensure that only authorized personnel can connect after verifying their identity.
  4. Change All Default Credentials: Immediately change the default passwords on all PLCs, routers, and other network devices. Enforce a policy of using strong, unique passwords for every component in the control system environment.
  5. Establish a Patch Management Program: While patching in OT environments can be challenging, it is essential. Develop a process to test and deploy firmware updates and security patches for PLCs and related software to mitigate known vulnerabilities.
  6. Develop and Test an Incident Response Plan: Your organization must have a specific, tested incident response plan for OT-related cyberattacks. This plan should outline procedures for isolating affected systems, preserving evidence, and restoring operations safely.

The attack in Pennsylvania was a warning. The discovery of thousands of similarly exposed devices is a call to action. The threat from Iranian-linked actors is persistent and opportunistic. They are not deploying sophisticated, novel techniques but are simply walking through unlocked digital doors. It is the responsibility of every critical infrastructure operator to ensure those doors are locked, bolted, and monitored.

Share:

// FAQ

What is a PLC and why is it a target?

A Programmable Logic Controller (PLC) is a specialized industrial computer that controls machinery and automated processes in factories, power plants, and utilities. They are targeted because compromising a PLC can allow an attacker to disrupt or damage physical equipment and critical infrastructure, potentially impacting public safety.

Who are the 'Cyber Av3ngers'?

The 'Cyber Av3ngers' is a hacktivist group that U.S. intelligence agencies, including CISA and the FBI, have linked to the Iranian Government's Islamic Revolutionary Guard Corps (IRGC). Their activities often align with Iran's geopolitical interests, such as targeting Israeli-made technology.

Was the attack on the Pennsylvania water facility sophisticated?

No, the attack was not sophisticated. It exploited two basic security failures: the device was directly connected to the internet, and it was still using its default password. This highlights how attackers often rely on simple misconfigurations rather than complex hacking tools.

Why are so many industrial devices connected to the internet?

Industrial devices are often connected to the internet for legitimate reasons like remote monitoring, maintenance, and data collection. However, this is frequently done without proper security controls like firewalls, VPNs, or network segmentation, inadvertently exposing them to attackers.

Are Rockwell Automation devices inherently insecure?

The issue is less about the devices being inherently insecure and more about their insecure implementation. Rockwell Automation, like other manufacturers, provides security guidelines. The problem arises when organizations connect these devices directly to the internet and fail to change default credentials or apply security patches, ignoring best practices.

// SOURCES

// RELATED

Russian state-linked APT28 exploits SOHO routers in global DNS hijacking campaign

Russian state-linked hackers APT28 are exploiting insecure home and office routers globally in a widespread DNS hijacking campaign for cyber espionage

7 min readApr 13

Russia's Forest Blizzard nabs rafts of logins via SOHO routers

Russia's APT28 spies on global organizations by modifying DNS settings in vulnerable SOHO routers, enabling widespread, 'malwareless' credential theft

6 min readApr 13

Iranian state hackers target US critical infrastructure using basic exploits

A joint US agency warning reveals Iranian APTs are targeting internet-exposed Rockwell PLCs, leveraging default credentials to threaten physical syste

5 min readApr 13

Feds dismantle sprawling Russian GRU botnet that hijacked 18,000 routers for espionage

A detailed analysis of Operation Moonglow, the FBI takedown of a Russian GRU botnet that used custom malware on SOHO routers to steal Microsoft creden

6 min readApr 13