Six U.S. government agencies β the FBI, CISA, NSA, EPA, Department of Energy, and U.S. Cyber Command β have issued an urgent joint advisory warning private-sector operators that Iranian cyber actors are actively exploiting programmable logic controllers (PLCs) embedded in Americaβs most critical infrastructure systems. The advisory names Rockwell Automationβs Allen-Bradley product line by name, a designation that should alarm every industrial control system engineer and CISO responsible for operational technology environments.
This is not a future threat. The EPA has confirmed that Iranβs cyberattacks have already disrupted βcommonly used operational technology at drinking water and wastewater systems.β The clock is not ticking β it has already gone off.
What the Advisory Actually Says
The joint advisory represents an unusually broad coalition of agencies, signaling that the intelligence community views this campaign as a cross-sector, escalating threat rather than an isolated incident targeting a single vertical. Iranian cyber actors are being described as exploiting PLCs βacross U.S. critical infrastructureβ β language deliberately left broad to encompass water utilities, energy generation, transportation networks, and communications infrastructure.
The focal point is Rockwell Automationβs Allen-Bradley platform. Allen-Bradley PLCs and distributed control systems are among the most widely deployed industrial automation products in the United States. They govern physical processes in water treatment plants, power substations, manufacturing lines, and transit systems. When a threat actor gains access to a PLC, they are not reading data β they are holding a physical process hostage.
The escalation is being explicitly linked to geopolitical context. Tehranβs targeting campaigns have βrecently escalated, likely in response to hostilities between Iran and the United States and Israel.β This framing matters operationally: the campaign is not opportunistic reconnaissance. It is deliberate, politically motivated sabotage infrastructure-building.
Why PLCs Are the Ideal Attack Surface
Programmable logic controllers are purpose-built computers that automate physical machinery β pumps, valves, circuit breakers, chemical dosing systems. They operate in real time, prioritizing process stability over cybersecurity. Most Allen-Bradley PLCs in active deployment across U.S. critical infrastructure were engineered for reliability and longevity, not for a threat environment that includes nation-state adversaries with persistent access ambitions.
The attack surface is substantial for several compounding reasons:
Legacy firmware and end-of-support hardware. Many Allen-Bradley units in water and wastewater facilities run firmware versions that Rockwell Automation no longer actively patches. Utilities running aging infrastructure on constrained capital budgets often cannot justify refresh cycles that a corporate IT department would treat as routine.
Flat OT networks. In many facilities, PLCs sit on networks with minimal segmentation from corporate IT infrastructure or, in the worst cases, from the public internet. Remote access capabilities added during the COVID-19 pandemic β meant to allow engineers to manage systems without physical presence β created persistent exposure that was never adequately hardened afterward.
Protocol weaknesses. Industrial protocols like EtherNet/IP (used natively by Allen-Bradley devices) were designed for trusted, closed environments. Authentication mechanisms are weak or absent by default. An adversary who reaches the OT network segment typically faces limited friction before issuing legitimate-looking commands to a PLC.
Limited monitoring. IT security operations centers equipped with SIEM tooling and EDR coverage rarely have equivalent visibility into OT environments. PLCs do not generate logs that feed into Splunk. Anomalous ladder logic modifications or unauthorized firmware flashes may go undetected for weeks or months.
This is not a theoretical attack chain. The EPAβs Jeffrey A. Hall stated plainly: βCyberattacks on drinking water and wastewater systems directly threaten public health and community resilience. A single breach can disrupt treatment or introduce contaminants, damage equipment, and erode public trust.β The American Water cyberattack and the broader rising threat against water systems documented by Breached.Company illustrate how real this attack surface has become.
The Calpine Breach: Iran Has Been Here Before
The current advisory did not emerge from a vacuum. In 2015, Iran-backed hackers penetrated Calpine Corporation, one of Californiaβs largest power producers. Attackers exfiltrated engineering diagrams and credentials for power plant systems labeled βmission critical.β U.S. officials assessed at the time that Tehran had obtained sufficient access to potentially initiate regional blackouts. The breach remained largely out of public view for years.
That 2015 operation was not an endpoint β it was reconnaissance at scale. The attackers were building a map: understanding network topologies, documenting physical process dependencies, identifying failure points. The credentials and engineering diagrams obtained from Calpine represented the kind of institutional knowledge that cannot be bought and takes years to develop internally. Iran has had over a decade to operationalize what they learned.
The pattern is consistent with what Breached.Company has documented in Iranβs broader cyber posture. As analyzed in our coverage of Iranβs Cyber Warfare Paradox, Tehran has simultaneously managed domestic digital suppression, responded to attacks on its own infrastructure, and maintained persistent offensive campaigns against Western targets. The MuddyWater threat groupβs documented backdoors into U.S. bank and airport networks demonstrates that Iranβs cyber program operates across multiple verticals with different toolsets and timelines.
Former Energy Secretary Ernest Moniz, who helped negotiate the 2015 Iran nuclear deal, offered a sobering assessment: βThere remains concern about Iranian cyber capabilitiesβ¦ There may already be backdoors, Trojan horses and malware hidden in our infrastructure.β Monizβs concern is not speculative β it is informed by the same intelligence picture that produced this weekβs joint advisory.
Escalation Context: Geopolitics Driving Cyber Operations
The advisoryβs language linking Iranβs escalation to βhostilities between Iran and the United States and Israelβ requires unpacking. The current geopolitical environment is markedly more volatile than the conditions that preceded Iranβs 2015 Calpine operation.
U.S.-backed strikes against Iranian military assets, combined with the Trump administrationβs explicit threat to destroy Iranian bridges and power plants if Tehran fails to relinquish control over the Strait of Hormuz, have created a threat environment in which Iranian leadership has both motive and political cover to authorize more aggressive cyber operations. For Tehran, disrupting a U.S. water treatment facility or causing localized power outages serves a dual purpose: it creates domestic political pressure on the U.S. government and signals capability without triggering the threshold for conventional military retaliation.
The 245% spike in Iranian cyber escalation that Breached.Company reported earlier this year foreshadowed exactly this kind of advisory. Iranian threat actors have not been idle during the diplomatic turbulence of 2026. They have been positioning.
The most concerning assessment from U.S. industry leaders focuses on transformers and power inverters. Tom Fanning, former CEO of Southern Company and now leading the Alliance for Critical Infrastructure, assessed Iranβs threat as βcredibleβ while stopping short of calling it an existential threat to wide-ranging power systems. The distinction matters β a targeted disruption of a regional grid segment or a contaminated municipal water supply does not need to be existential to cause serious public health harm and erode confidence in government institutions.
The Stryker cyberattack attributed to Iranian-linked hackers in March 2026 demonstrated Iranβs willingness to attack healthcare infrastructure through sophisticated MDM abuse β a reminder that Iranian cyber operations are not limited to OT environments and that the playbook continues to evolve.
The LA Metro Hack and the Escalation Pattern
Last monthβs hack of the LA Metro transit system added another data point to the escalating pattern. The attack forced Metro to shut down a portion of its network after discovering unauthorized activity across approximately 1,400 servers, all of which required security review before being returned to service. Investigators are examining Iranian-backed actors as potential culprits.
The LA Metro incident is operationally significant for what it reveals about target selection. Transit systems are soft infrastructure targets: they carry enormous public visibility, their disruption generates immediate political pressure, and they typically lag behind corporate enterprises in cybersecurity investment and staffing. The fact that passenger commute times were not materially affected may have been the result of luck as much as incident response discipline.
The broader pattern β water utilities, power producers, medical device manufacturers, transit systems β reflects a deliberate cross-sector targeting philosophy. Iranian actors are not searching for the single catastrophic vulnerability. They are building optionality: multiple footholds across multiple sectors that can be activated selectively as geopolitical conditions warrant.
This mirrors the coordinated nation-state attack patterns documented by Google across China, Iran, Russia, and North Korea. The convergence is not coincidental.
The Fog of War: Russia and China Opportunism
The joint advisory explicitly raises a concern that deserves independent analysis: Russia and China may βtake advantage of the fog of war to launch strikes themselves.β This is not a new concern, but the current environment makes it materially more dangerous.
In 2024, Volt Typhoon and Salt Typhoon β Chinese state-sponsored threat groups β breached U.S. critical infrastructure and communications systems, avoiding detection for at least three years. Their operations were characterized by extreme patience and stealth, prioritizing persistent access over immediate effect. Chinaβs calculus is different from Iranβs: where Iranian operators appear willing to accept some operational noise in exchange for disruption, Chinese actors have demonstrated a preference for long-term pre-positioning.
A geopolitical crisis centered on Iran creates exactly the kind of attention deficit that enables opportunistic operations. Security operations teams focused on Iranian IoCs and Iranian TTPs may be slower to detect a Chinese or Russian intrusion operating under different signatures. The fog of war is a resource that sophisticated adversaries exploit deliberately.
The CTIIC Elimination: A Self-Inflicted Intelligence Gap
Against this threat backdrop, the Trump administrationβs decision to eliminate the Cyber Threat Intelligence Integration Center (CTIIC) last summer β part of a 40% workforce reduction at the Office of the Director of National Intelligence under Tulsi Gabbard β has created a structural gap in the U.S. defense posture that the current crisis makes impossible to ignore.
The CTIIC served as a βcritical fusion hubβ between the intelligence community and private-sector partners, translating classified threat intelligence into actionable guidance that critical infrastructure operators could actually use. That function does not simply transfer elsewhere when the organization is dissolved. The institutional relationships, clearances, and processes that enabled rapid intelligence sharing take years to build.
The practical impact was visible in the response to the advisory itself: a CISA spokesperson could not be reached for comment because CISA staff are on furlough due to an ongoing federal funding hiatus for the Department of Homeland Security. The agency named in the advisory as a co-author of the warning to private industry is simultaneously unable to staff its communications function.
Private-sector operators receiving an urgent warning from six government agencies and finding the primary government point of contact unavailable are left in an unenviable position. With approximately 85% of U.S. critical infrastructure owned by private-sector companies, the gap between the threat environment and the governmentβs capacity to support defensive operations has rarely been wider.
What ICS/OT Operators Must Do Now
The advisory and its context demand immediate, concrete action. The following priorities apply to any organization operating Allen-Bradley equipment or other industrial control systems connected to U.S. critical infrastructure.
Immediate Actions (24-72 Hours)
Audit internet-facing OT assets. Identify every Allen-Bradley PLC, HMI, and engineering workstation with any form of external network connectivity. This includes VPN-accessible systems, remote access platforms, and any device reachable from corporate IT networks. Use a Device Risk Assessment to establish baseline visibility if your current asset inventory is incomplete.
Review active remote access sessions. Terminate all non-essential remote access to OT environments immediately. Require re-authentication with MFA for any session that resumes. Log and review all recent VPN and remote desktop connections to OT segments for anomalous patterns.
Check firmware integrity. Compare installed firmware versions against Rockwell Automationβs published baseline for all Allen-Bradley devices in scope. Unauthorized firmware modifications are a known technique for establishing persistence in PLC environments.
Hunt for unauthorized ladder logic modifications. Export and review current PLC programs against known-good backups. Look for additions or changes to control logic, timer overrides, or interlock bypasses that were not authorized through your change management process.
Near-Term Hardening (1-2 Weeks)
Implement network segmentation. OT networks must be isolated from corporate IT networks through properly configured industrial DMZs. The Purdue Model remains a valid architectural reference; the key is enforcement, not aspiration. Data historians, remote access jump servers, and engineering workstations must sit in properly segmented zones with controlled data flows.
Deploy protocol-aware monitoring. Passive OT network monitoring tools that understand EtherNet/IP, Modbus, DNP3, and related industrial protocols can detect anomalous command sequences that generic IT security tools miss entirely. If you do not have OT-specific network detection and response capability, this is the time to acquire it.
Harden authentication on Allen-Bradley systems. Enable ControlLogix security features including security authorities and permission-based access control. Disable legacy protocols that do not support authentication. Remove default credentials across all devices.
Assess your incident response readiness. If your IR plan treats OT environments the same as IT environments, it will fail under these conditions. OT incidents require understanding of physical process impacts, safe state achievement, and coordination with operations personnel who may not be security-trained. Conduct a IR Maturity Assessment to identify gaps before an incident forces the question.
Strategic Posture
Pedro J. Pizarro, CEO of Edison International and parent of Southern California Edison, described industry leaders operating with βa watchful eye and an elevated posture right now.β That posture is necessary but insufficient without the technical controls to back it up.
Top executives in energy, water, transportation, and communications are right to elevate their vigilance β but vigilance at the executive level must translate into funded, staffed, and exercised security programs at the operational level. The gap between boardroom awareness and plant-floor security control has cost organizations dearly in past ICS incidents.
Engage your sectorβs Information Sharing and Analysis Center (ISAC) β WaterISAC, E-ISAC, or the relevant equivalent β for sector-specific intelligence. With CTIIC dissolved, ISACs represent the most viable remaining channel for receiving threat intelligence relevant to your specific operational environment.
The Stakes
The joint advisory from six agencies targeting a single industrial automation platform is not routine. It reflects an intelligence picture in which Iranian actors have moved beyond reconnaissance and are operating in environments where they can cause physical harm to civilian infrastructure.
The intersection of geopolitical escalation, a structurally weakened domestic intelligence-sharing apparatus, and widely deployed legacy OT equipment creates conditions that demand immediate, serious operational response. Water treatment plants, power substations, and transit networks are not abstract policy concerns β they are the infrastructure on which public health, economic function, and social stability depend.
Iranian cyber actors understand this. The question now is whether the organizations responsible for defending these systems will respond with the urgency the situation requires.
Breached.Company monitors and analyzes cyber threats to critical infrastructure. For ongoing coverage of Iranian cyber operations, see our post-war asymmetric threat analysis and the 2026 Iranian escalation report.



