
Iran's PLC Campaign: Hybrid Warfare Enters a New Phase of Direct Physical Disruption
Iran-linked actors are targeting exposed U.S. PLCs not merely for espionage but to develop physical disruption capabilities as part of MOIS-directed hybrid warfare. This underreported shift, building on 2023 Unitronics attacks and parallel Israeli campaigns, reveals pre-positioning for crisis escalation that mainstream coverage has largely missed in favor of data-theft narratives.
The latest joint advisory from the FBI, CISA, and partner agencies reveals Iranian-linked actors systematically targeting internet-exposed Programmable Logic Controllers (PLCs) in U.S. critical infrastructure sectors including water, energy, and government facilities. While the original coverage from The Hacker News accurately reports the use of Rockwell Automation/Allen-Bradley CompactLogix and Micro850 devices, the deployment of Dropbear SSH for C2, and manipulation of project files, HMI, and SCADA displays, it underplays the strategic evolution this represents. This is not merely opportunistic probing but a calibrated escalation in hybrid warfare designed to create reversible physical effects without crossing the threshold into acknowledged armed conflict.
What the initial reporting missed is the pre-positioning logic. By extracting project files via Studio 5000 Logix Designer interactions, these actors (linked to groups like Cyber Av3ngers/UNC5691 and ultimately Iran's MOIS) are building digital twins of victim environments. This mirrors the reconnaissance phase that preceded the 2010 Stuxnet operation, only now the vector is reversed against the United States. The campaign builds directly on the late 2023 Unitronics PLC attacks against the Municipal Water Authority of Aliquippa, Pennsylvania, where the same ecosystem compromised over 75 devices. Check Point Research has documented near-identical TTPs against Israeli OT assets as recently as March 2026, revealing a synchronized global targeting pattern that most Western coverage treats as disconnected incidents.
Synthesizing the FBI advisory with DomainTools Investigations' April 2026 report on the 'Homeland Justice/Karma/Handala Hack' ecosystem and Flashpoint's analysis of surging DDoS and hack-and-leak operations, a clearer picture emerges: these are not independent hacktivist actions but interchangeable operational veneers managed by a consistent MOIS capability. The purpose is dual—strategic signaling to Washington and Jerusalem while developing muscle memory for rapid scaling during kinetic conflict. Unlike the dominant media narrative fixated on data theft and ransomware payouts, this campaign prioritizes operational disruption and financial loss through direct manipulation of physical processes. The potential extends far beyond the reported 'diminished functionality': altered PLC logic could trigger incorrect valve sequencing in water systems, desynchronize grid protection relays, or create hazardous conditions masked by falsified HMI data.
This represents a dangerous new phase of hybrid warfare. Iran's 'Axis of Resistance' strategy now seamlessly integrates kinetic proxies in the Red Sea and Levant with cyber effects against homeland infrastructure. The relative quiet in mainstream coverage compared to espionage-focused stories reflects a persistent cognitive bias that treats OT incidents as technical glitches rather than geopolitical instruments. Patterns observed by Dragos and Claroty over the past three years show Iranian actors shifting from destructive wipers (as seen in 2022 against Albanian government systems) toward subtler, persistent access that enables on-demand physical effects. The exposure of PLCs remains shockingly high; Shodan data consistently reveals thousands of Rockwell and Siemens devices with internet-facing ports.
The implications are profound. Each successful manipulation lowers the threshold for future attacks during a crisis over Iran's nuclear program or Israeli strikes. Organizations following the advisory's recommendations—removing PLCs from direct internet exposure, implementing hardware interlocks preventing remote modification, and deploying protocol-aware firewalls—address the symptoms but not the underlying power shift. This campaign signals that critical infrastructure can no longer be viewed as a domestic resilience issue but as a forward theater in great power competition. The underreporting of physical disruption potential compared to data theft narratives risks leaving decision-makers unprepared for the moment these capabilities transition from demonstration to decisive effect.
SENTINEL: Iran's MOIS is systematically mapping and manipulating U.S. OT environments to create scalable physical disruption options that can be activated during escalation with Israel or over its nuclear program. This represents a shift from nuisance attacks to pre-positioned hybrid capabilities that will likely expand rapidly if current Middle East tensions intensify.
Sources (3)
- [1]Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs(https://thehackernews.com/2026/04/iran-linked-hackers-disrupt-us-critical.html)
- [2]Iranian Cyber Activity Targeting OT: Insights on Coordinated Influence Operations(https://www.domaintools.com/resources/blog/iranian-coordinated-influence-ecosystem)
- [3]Check Point Research: Iranian Actors Target PLCs in Israel and Beyond(https://research.checkpoint.com/2026/03/iranian-actors-target-plcs)