Iran attempting cyberattacks against critical U.S. infrastructure, officials say

Iran attempting cyberattacks against critical U.S. infrastructure, officials say


U.S. intelligence agencies are “urgently warning” private-sector companies nationwide that Iranian actors are conducting cyber operations targeting critical U.S. infrastructure, a campaign that has already caused disruptions, according to a government notice.

The activity comes as President Trump threatened Iran’s infrastructure, particularly its bridges and power plants.

Iran’s attack targeted products by Rockwell Automation’s Allen-Bradley, one of the most widely used industrial automation brands, according to the notice, which was first reported Tuesday by The Times. The advisory said that cyber actors affiliated with Iran were exploiting “programmable logic controllers across U.S. critical infrastructure.”

Tehran’s targeting campaigns against U.S. organizations “have recently escalated, likely in response to hostilities between Iran and the United States and Israel,” the notice added.

The advisory was issued Tuesday jointly by the FBI, the Cybersecurity and Infrastructure Security Agency, the National Security Agency, the Environmental Protection Agency, the Department of Energy and Cyber Command.

In its own notice, the EPA warned that Iran’s cyberattack had already disrupted “commonly used operational technology at drinking water and wastewater systems,” and that the federal government is “diligently working to ensure that Americans can rely on clean and safe water.”

“Cyberattacks on drinking water and wastewater systems directly threaten public health and community resilience,” Jeffrey A. Hall, the EPA’s assistant administrator for enforcement and compliance assurance, said in a statement. “A single breach can disrupt treatment or introduce contaminants, damage equipment, and erode public trust.”

Top executives from companies at the core of the nation’s ability to function — those leading America’s largest energy, water, transportation and communications corporations — had already been taking it upon themselves to increase their vigilance over potential attacks, concerned that Trump’s willingness to target Iran’s critical infrastructure inadvertently put a mark on their backs.

Some fear Iran’s ability to conduct cyber operations that could take down transformers or power inverters, if not a wide-scale power system. Others are concerned about threats to brick-and-mortar sites from proxies of Tehran — physical attacks against facilities such as nuclear plants, or power management systems, the crown jewels of the sector.

Larger, even more capable actors, particularly Russia and China, may also take advantage of the fog of war to launch strikes themselves.

“There remains concern about Iranian cyber capabilities and retaliation if the U.S. carries through on threats to attack their infrastructure,” said Ernest Moniz, former U.S. secretary of Energy under President Obama who helped negotiate the 2015 nuclear deal with Iran. “There may already be backdoors, Trojan horses and malware hidden in our infrastructure.”

“I have to believe that the government cyber experts — or what’s left of them — are working closely and indeed overtime with the power companies and other infrastructure operators on cyber defense and intrusion detection and warning,” Moniz added.

Iran has demonstrated an ability to penetrate networks tied to critical U.S. infrastructure before.

In 2015, Iran-backed hackers accessed data associated with Calpine Corp., one of California’s largest power producers, obtaining detailed engineering diagrams and credentials related to power plant systems. Some were labeled “mission critical.” U.S. officials feared at the time that the breach would allow Tehran to initiate blackouts nationwide.

Since that time, companies at the center of the U.S. energy and telecommunications sectors have markedly improved their defenses. But Iran’s offensive capabilities have improved, as well.

Large players in the energy sector are operating with “a watchful eye and an elevated posture right now,” said Pedro J. Pizarro, president and chief executive of Edison International, the parent company of Southern California Edison, one of the nation’s largest electric utilities.

Companies such as Edison have been operating under persistent threat for over a decade. In 2024, a pair of devastating cyber espionage attacks targeting U.S. critical infrastructure attributed to Chinese hackers, Volt Typhoon and Salt Typhoon, were discovered after avoiding detection for at least three years.

The threat of a similarly latent attack — in which malware lies dormant in critical infrastructure systems, waiting for a signal to activate — is a real cause for concern in the sector, despite its best efforts and technological advances, experts and insiders said.

“The threat of cyber and physical attacks targeting critical infrastructure is not new,” said Jennifer DeCesaro, senior vice president of industry operations at the Edison Electric Institute, “which is why we partner with the government through the Electricity Subsector Coordinating Council to share actionable intelligence and prepare to respond to incidents that could affect our ability to provide electricity safely and reliably.”

The ESCC works closely with the National Security Council and its intelligence arms, particularly the intelligence agencies and Cybersecurity and Infrastructure Security Agency, or CISA, to coordinate regular briefings on safety standards, best practices and intelligence tips.

The CIA declined to comment. A spokesperson with CISA, listed as out of office due to the ongoing federal funding hiatus for the Department of Homeland Security, could not be reached for comment.

Last summer, announcing a 40% cut to the workforce of her office, Director of National Intelligence Tulsi Gabbard eliminated the Cyber Threat Intelligence Integration Center, previously seen as a critical fusion hub of information by private sector partners.

Trump has threatened to destroy every bridge and power plant in Iran if it fails to come to an agreement that ends its control over the Strait of Hormuz.

Ultimately, corporate executives shoulder much of the burden as the first line of defense for the country’s critical infrastructure, roughly 85% of which is owned by private sector companies.

Tom Fanning, former chief executive of Southern Co. and now executive committee chair at the Alliance for Critical Infrastructure, said the threat from Iran is “credible.”

“I have not seen what I would describe as the existential threat, to take down a wide-ranging power system,” Fanning said. “Could those things be turned on? Sure. Is the United States critical infrastructure prepared to act? I think so.”

Last month, early on in the war, the Los Angeles Metro transit system was forced to shut down a portion of its network due to a hack. Authorities say it is still unclear who was behind the breach, but a source told The Times that Iran-backed hackers are being investigated as potential culprits.

The transportation agency said its security team had “discovered unauthorized activity,” and were making sure its roughly 1,400 servers were secure before bringing them back online. The agency has emphasized the hack did not affect passengers’ commute time.

The FBI said it was aware of the hack. Homeland Security is working with local partners “to address cyber threats to critical infrastructure,” an official said.

“The reality is that the threats are here and now,” Fanning added. “The truth is, the bad guys are already here.”

Times staff writers Kevin Rector, Richard Winton and Rebecca Ellis, in Los Angeles, contributed to this report.



Source link

Posted in

Swedan Margen

I focus on highlighting the latest in business and entrepreneurship. I enjoy bringing fresh perspectives to the table and sharing stories that inspire growth and innovation.

Leave a Comment