Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Iranian Hackers’ Preferred ICS Targets Left Open Amid Fresh US Attack Warning

Posted on July 1, 2025July 1, 2025 By CWS

A number of US authorities businesses on Monday issued a contemporary warning over Iranian menace actors focusing on essential infrastructure, and researchers warning that many situations of those hackers’ most popular targets stay uncovered on the web.

The Division of Homeland Safety warned on June 22 that Iran is prone to retaliate — each in the actual world and in our on-line world — after the US carried out air strikes on three necessary nuclear websites in Iran.

Iranian and pro-Iran menace actors might conduct a variety of assaults, together with ransomware assaults, DDoS assaults, phishing, brute power assaults, and espionage. Nonetheless, one main concern is expounded to Iran’s assaults on industrial management programs (ICS) and different operational expertise (OT).

A brand new reality sheet printed on Monday by CISA, the FBI, the NSA and the Division of Protection Cyber Crime Middle (DC3) warns of potential assaults focusing on US networks and entities of curiosity, comparable to protection industrial base organizations, “notably these possessing holdings or relationships with Israeli analysis and protection corporations”.

The doc reminds organizations of the menace posed by Iranian hackers to ICS/OT. Risk actors posing as hacktivists calling themselves Cyber Av3ngers are recognized for focusing on Unitronics Imaginative and prescient programmable logic controllers (PLCs) at water amenities. 

Nonetheless, in line with the federal government, the identical marketing campaign focused the vitality, meals and beverage manufacturing, and healthcare sectors as properly.

Risk intelligence and assault floor administration firm Censys has made an inventory of a few of the ICS merchandise generally focused by Iranian hackers and scanned the web to find out how widespread they’re and whether or not their homeowners and operators have taken steps to safe them in latest months. 

Along with the Unitronics PLCs that Cyber Av3ngers focused utilizing default credentials, Censys’ evaluation centered on Orpak SiteOmat gasoline station automation software program, which the hackers focused through default credentials in October 2023, Purple Lion units, which have been focused by the IOCONTROL IoT/OT malware developed by the hackers, and the Tridium Niagara framework.Commercial. Scroll to proceed studying.

Whereas there is no such thing as a proof that Iranian menace teams have focused Tridium Niagara of their assaults, OpenAI reported in October 2024 that Iranian hackers had used ChatGPT to acquire data on the framework used for constructing automation and management merchandise, together with default passwords.

Censys found a whole lot or hundreds of such programs immediately uncovered to the web and probably susceptible to assaults. An evaluation of the numbers seen in January 2025 in comparison with June 2025 confirmed that for many of them the variety of uncovered programs has elevated between 4% and 9% over the previous six months. The exception is Orpak SiteOmat, for which publicity dropped by almost 25%. 

The nation the place the best variety of the uncovered Unitronics units are situated is Australia, carefully adopted by the US. For the remainder of the analyzed merchandise, the best numbers are situated within the US. 

In lots of circumstances Iran’s assaults on ICS programs are unsophisticated, focusing on internet-exposed programs which can be left utterly unprotected or are protected by a weak default password. 

Censys urged producers to keep away from delivery units or software program with default passwords, and to offer steerage to prospects on avoiding direct publicity to the web.

“At the moment, we’ve not seen indications of a coordinated marketing campaign of malicious cyber exercise within the US that may be attributed to Iran,” CISA mentioned. “Nonetheless, CISA urges homeowners and operators of essential infrastructure organizations and different probably focused entities to assessment this reality sheet to be taught extra concerning the Iranian state-backed cyber menace and actionable mitigations to harden cyber defenses.”

Associated: Siemens Notifies Prospects of Microsoft Defender Antivirus Challenge

Associated: Misconfigured HMIs Expose US Water Programs to Anybody With a Browser

Security Week News Tags:Attack, Fresh, Hackers, ICS, Iranian, Left, Open, Preferred, Targets, Warning

Post navigation

Previous Post: Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation
Next Post: Thousands of Citrix NetScaler Instances Unpatched Against Exploited Vulnerabilities

Related Posts

MIND Raises $30 Million for Data Loss Prevention Security Week News
263,000 Impacted by Esse Health Data Breach Security Week News
In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed Security Week News
High-Severity Vulnerabilities Patched by Cisco, Atlassian Security Week News
Cisco Patches Critical ISE Vulnerability With Public PoC Security Week News
Cato Networks Raises $359 Million to Expand SASE Business Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News