No Malware, No Exploit, No Signatures to Catch: The Iranian PLC Campaign Targeting US Infrastructure
Jerrid Brown·OTPulseSix agencies confirmed it. Iranian-affiliated CyberAv3ngers used legitimate Rockwell engineering software to disrupt US water, energy, and government facilities. Here is what happened and what to do about it.
Six agencies signed this one. CISA, FBI, NSA, EPA, DOE, and Cyber Command don't put out joint advisories unless something is actively on fire. And it is.
CyberAv3ngers, the IRGC-linked group that hit Aliquippa's water authority in 2023, are back. This time they're going after Rockwell PLCs at US water utilities, energy facilities, and government sites. Not probing. Not scanning. Connecting to them with Studio 5000 and changing the control logic. CISA confirmed operational disruptions at multiple organizations. This isn't a warning about what could happen. It's a disclosure about what's happening right now.
IRGC Cyber Electronic Command group begins targeting critical infrastructure.
75 US water facilities compromised via default credentials on Israeli-made PLCs. Single-agency CISA advisory AA23-335A.
U.S.-Israel strikes on Iran trigger retaliatory cyber operations. Playbook proliferates to 60+ affiliated groups.
CyberAv3ngers shift targeting from Israeli to US-manufactured controllers. CompactLogix, Micro850, MicroLogix 1400.
Six-agency joint advisory confirms active disruptions in water, energy, and government facilities.
From Aliquippa to Everywhere
You might remember Aliquippa. November 2023, Municipal Water Authority in Pennsylvania. CyberAv3ngers popped 75 water facilities through Unitronics PLCs that still had default credentials. That was targeted at Israeli-made devices after October 7. CISA published an advisory, everyone changed their passwords, news cycle moved on.
That was a sideshow compared to this.
After the U.S. and Israel hit Iran on February 28, the retaliation started almost immediately. CyberAv3ngers and something like 60 affiliated groups launched coordinated operations across IT and OT environments. The playbook leaked or got handed around - point is, the people doing this aren't one team anymore.
And they switched targets. In 2023 it was Israeli-made Unitronics. Now it's CompactLogix, Micro850, MicroLogix 1400 - Rockwell's bread and butter. If you run water treatment, pump stations, or substation SCADA in the US, there's a real chance these are in your environment.
3,891 PLCs on the Open Internet
Censys scanned port 44818 and found 5,219 Rockwell/Allen-Bradley PLCs just sitting on the internet. Three quarters are in the US. And here's the part that should bother you: about half are on Verizon Business cellular ASNs. That's a modem in a junction box. Someone set it up for remote access, probably years ago, and it's been there ever since with no firewall between it and the rest of the world. Another 771 of those hosts are also running VNC. Some have Telnet open.
| Exposure metric | Value |
|---|---|
| Globally exposed Rockwell PLCs (port 44818) | 5,219 |
| Located in the United States | 3,891 (74.6%) |
| On Verizon Business cellular ASNs | 49.1% |
| Same hosts also exposing VNC | 771 |
| Same hosts also exposing Modbus (port 502) | 292 |
| CVE-2021-22681 (auth bypass, CVSS 9.8) | No patch available |
If you've ever inherited a site and found a cellular modem you didn't know about - this is what the other end of that looks like to an attacker.
Legitimate Software as the Weapon
Here's the part that keeps me up at night. There's no malware in this campaign. No exploit code. No zero-day. They're using Studio 5000 - Rockwell's own engineering software, the same one your guys use every day to program Logix controllers - to connect directly to exposed PLCs over port 44818.
Think about what that means for detection. A Studio 5000 session from an attacker looks identical to one from your engineering workstation down the hall. Your AV won't flag it because there's nothing to flag. Your SIEM won't alert because the protocol is legitimate. There's no IOC to hunt for - the tool IS the weapon.
Once they're connected, they pull down your project file, modify the logic, and push it back. They drop a Dropbear SSH backdoor on port 22 for persistence. And then - this is the part that matters operationally - they mess with the HMI data. Your operator is looking at normal readings on the SCADA screen while the actual process has already changed underneath them.
The root cause is CVE-2021-22681 - authentication bypass, CVSS 9.8. CISA added it to KEV in March. There's no patch. Let that sit for a second. The only fix is making sure these devices can't be reached from the internet.
What to Do This Week
If you run Rockwell Logix controllers, check port 44818 today. If any of your PLCs are directly reachable from the internet, that changes now. This is not a theoretical risk - six agencies confirmed active disruptions at US facilities running these exact devices.
Network-level actions:
- Verify no PLCs are directly reachable on port 44818 from the internet. If they are, firewall them immediately.
- Limit Studio 5000 connections to authorized engineering workstation IPs only.
- If remote access is operationally required, route through a jump host or VPN, not a direct cellular modem.
- Monitor EtherNet/IP (port 44818), SSH (port 22), and Modbus (port 502) traffic for unexpected connections.
Physical-side actions:
- Set the mode switch to RUN on CompactLogix and MicroLogix devices. This prevents remote project downloads even if Studio 5000 connects.
- Check for unexpected SSH (Dropbear) processes on connected hosts.
- Audit Studio 5000 connection logs for sessions from unrecognized source IPs.
Compliance: If your organization falls under EPA's AWIA, NERC CIP-005/CIP-007, CIRCIA, or FISMA, the advisory calls out all four by name. Document what you find and what you do about it.
The full advisory is on CISA's site.
Industry Intel
Reports & Research
74.6% of the 5,219 internet-exposed Rockwell/Allen-Bradley PLCs found globally are in the United States. - Censys, April 2026
Incidents
Regulatory & Standards
Events & Conferences
Community
Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.


