Iran's Cyber Campaign Is Hitting Physical Infrastructure
Iranian-affiliated hackers are targeting PLCs in US water and energy systems. Here's what infrastructure operators need to know about the active campaign.

PLCs Under Attack
On April 7, 2026, CISA, the FBI, NSA, EPA, Department of Energy, and U.S. Cyber Command issued a joint advisory: Iranian-affiliated hackers are actively targeting programmable logic controllers across U.S. critical infrastructure (CISA Advisory AA26-097A). The attacks have already caused operational disruption and financial loss at multiple organizations.
This isn't theoretical. It's happening now.
What's Being Targeted
Since at least March 2026, an Iranian APT group has exploited internet-connected Rockwell Automation PLCs -- specifically CompactLogix and Micro850 models -- deployed in water treatment, energy, and government facilities (TechCrunch).
The attacks:
- Disrupt PLC functionality, taking devices offline or altering their behavior
- Manipulate display data on human-machine interfaces and SCADA systems, making operators think systems run normally when they don't
- Target facilities with internet-exposed PLCs, exploiting known vulnerabilities rather than advanced zero-days
The campaign links directly to the broader U.S.-Iran military conflict that began February 28, 2026. Iranian state-aligned groups operating under the "Electronic Operations Room" -- formed the same day as the initial U.S.-Israel strikes -- have claimed responsibility for multiple attacks (Palo Alto Unit 42).
Why This Matters Beyond Cyber
When a PLC goes down at a water treatment plant, the problem isn't digital -- it's physical. Untreated water, pressure failures, contamination risk. When attackers manipulate a PLC at an energy facility, the downstream effects hit hospitals, data centers, and manufacturing lines that depend on stable power.
NERC, the body responsible for North American grid reliability, confirmed it is "actively monitoring the grid" following this advisory (Utility Dive).
The pattern is clear: cyber attacks on operational technology create physical consequences. For infrastructure operators, the boundary between "cyber incident" and "operational disruption" no longer exists.
What to Do Now
- Audit internet exposure. The CISA advisory's top recommendation: remove PLCs from direct internet access immediately. Place them behind firewalls and secure gateways.
- Check your Rockwell Automation inventory. CompactLogix and Micro850 devices are specifically named. If you run them, patch and isolate now.
- Bridge cyber and physical risk monitoring. A cyber breach at a physical facility creates a compound event. Teams monitoring physical risk -- weather, civil unrest, supply disruption -- need to coordinate with IT and OT security teams. Orion provides the physical and geopolitical risk layer that complements cyber monitoring tools, giving infrastructure operators a fuller picture of compound threats.
- Watch for escalation. The U.S.-Iran conflict is not resolved. Expect continued cyber operations against Western-aligned infrastructure as long as hostilities persist.
Wrapping Up
This is a live campaign, not a forecast. If you operate critical infrastructure, treat this advisory as urgent. Request a demo to see how Orion monitors the geopolitical conditions that drive these campaigns.
See how Orion monitors these risks in real time
Get adaptive risk alerts across 190 countries, updated continuously from 100,000+ data sources.
Request a Demo →Related
Liberation Day Tariffs: One Year of Supply Chain Fallout
A year after Liberation Day tariffs hit, supply chains have shifted for good. 89,000 jobs lost, new supplier geographies, and new operational risk surfaces.
ArticleWorld Cup 2026 Security: What GSOC Teams Should Plan For
The 2026 FIFA World Cup spans 16 cities across three countries with over 6 million fans expected. Here's what GSOC and security teams should prepare for.