Iranian APTs Target Exposed Industrial Control Systems
Cyber Threat Intelligence reports that Censys researchers have identified 5,219 Rockwell PLCs exposed online, making them vulnerable to attacks by Iranian APTs. A significant majority of these exposed devices are located within the United States. This discovery underscores a critical risk to industrial control systems (ICS), which, if compromised, could lead to severe operational disruptions or even physical damage.
The findings from Censys highlight the ongoing threat landscape where nation-state actors are actively probing and exploiting internet-exposed critical infrastructure. The vulnerability of these PLCs, which are foundational components in many industrial environments, means that defenders must prioritize their security. Disconnecting them from public internet access or implementing robust segmentation and access controls are paramount to mitigating these risks.
What This Means For You
- If your organization operates Rockwell PLCs, especially those managing critical infrastructure, you need to immediately audit their internet exposure. Disconnect any publicly accessible PLCs or implement strict network segmentation and strong access controls. This isn't theoretical; Iranian APTs are actively looking for these entry points.
๐ก๏ธ Detection Rules
1 rules ยท 5 SIEM formats1 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Exploitation Attempt โ Censys
Get this rule in your SIEM's native format โ copy, paste, detect. No manual conversion.
1 Sigma rules mapped to the ATT&CK techniques from this breach โ pick your SIEM and get a ready-to-paste query.
Get Detection Rules โ