Connect with us

CyberSecurity

Iran-Backed Hackers Strike US Critical Infrastructure Through Internet-Connected OT Devices

Published

on

Iran-Backed Hackers Strike US Critical Infrastructure Through Internet-Connected OT Devices

Iranian-affiliated hackers have launched a series of attacks on US critical national infrastructure (CNI) providers, causing operational disruptions and significant financial losses, according to a recent advisory from the Cybersecurity and Infrastructure Security Agency (CISA). The campaign, which began last month, specifically targets internet-facing operational technology (OT) assets, including programmable logic controllers (PLCs) from Rockwell Automation and Allen-Bradley.

This coordinated effort by an advanced persistent threat (APT) group has already affected government services, local municipalities, water and wastewater systems (WWS), and the energy sector. The attackers are manipulating project files and tampering with data displayed on human-machine interfaces (HMI) and supervisory control and data acquisition (SCADA) displays, as reported by CISA. These PLCs are critical for managing a wide range of industrial processes, making them prime targets for disruption.

How Iran Hackers Target US CNI via Internet-Facing OT Systems

The threat actors are exploiting internet-connected OT devices, bypassing traditional security perimeters. They use configuration software like Rockwell Automation’s Studio 5000 Logix Designer to establish ‘accepted connections’ to targeted PLCs. These connections often originate from overseas IP addresses and third-party hosted infrastructure, making detection challenging.

Inbound malicious traffic typically appears on ports such as 44818, 2222, 102, 22, and 502. Particularly concerning are attacks on port 22, where the hackers deploy Dropbear Secure Shell (SSH) software on victim endpoints to maintain remote access. This method allows them to persist within networks and continue their malicious activities undetected.

As a result, CISA has urged all US CNI providers to urgently review their systems for indicators of compromise (IOCs) and apply the recommended mitigations. The advisory emphasizes that the widespread use of these PLCs across critical infrastructure increases the risk of further targeting of other OT devices.

Immediate Actions for Critical Infrastructure Firms

In response to this escalating threat, CISA has outlined several critical steps for CNI operators. First, organizations should use secure gateways and firewalls to protect PLCs from direct internet exposure. This is a fundamental measure to reduce the attack surface for threat actors.

Additionally, firms must query available logs for the IOCs provided in the advisory and check for suspicious traffic on the associated ports, especially if it originates from overseas. For Rockwell Automation devices, placing the physical mode switch on the controller into the ‘run’ position can help prevent unauthorized modifications. If an organization has already been targeted, it should immediately contact the FBI, CISA, NSA, or other authoring agencies for guidance.

This campaign follows a similar attack in March, when the Handala group targeted US medtech firm Stryker, wiping tens of thousands of devices. It also echoes a 2023 operation by Iran’s Islamic Revolutionary Guard Corps (IRGC) that struck US water plants running PLCs from Israeli manufacturer Unitronics. These patterns highlight a persistent and evolving threat to critical infrastructure.

Expert Insights on the Attack Campaign

Security experts warn that this campaign did not emerge in a vacuum. Ross Filipek, CISO at Corsica Technologies, points out that years of high-profile infrastructure incidents have revealed two critical truths. First, many OT environments still have internet-reachable interfaces and remote access paths that were never intended to be permanent. Second, even limited disruptions can create outsized chaos, from emergency response strain to financial loss and reputational damage.

Filipek adds, ‘Each successful or even partially successful campaign lowers the barrier for the next one, and emboldens actors to move from nuisance-level defacement into real operational interference.’ This sentiment underscores the urgency of proactive security measures.

Steve Povolny, VP of AI strategy and security research at Exabeam, emphasizes that CNI firms operating OT should assume increased reconnaissance, credential harvesting, and opportunistic attempts to exploit systems during the US campaign in Iran. He notes, ‘Visibility gaps between IT and OT telemetry remain one of the most persistent weaknesses I see across critical infrastructure operators.’

Povolny recommends prioritizing passive network monitoring for control protocols, enforcing strict segmentation between enterprise and control zones, validating remote access pathways, and ensuring that engineering workstations and vendor maintenance channels are tightly controlled and logged. He stresses that incident response plans must explicitly account for loss of control system integrity, not just loss of data confidentiality. However, he fears it may be too late for much of this to have short-term impact.

For more on protecting critical infrastructure, see our guide on OT security best practices and learn about building an industrial cybersecurity framework.

Strengthening Defenses Against Future Attacks

To mitigate the risk of similar attacks, CNI providers must adopt a multi-layered security approach. This includes implementing robust network segmentation, deploying intrusion detection systems, and conducting regular security audits. Employee training on phishing and social engineering is also crucial, as these attacks often serve as entry points for deeper intrusions.

Furthermore, organizations should collaborate with government agencies like CISA and the FBI to stay informed about emerging threats. Sharing threat intelligence within the industry can help build a collective defense against state-sponsored actors.

Ultimately, the recent campaign by Iran-backed threat actors serves as a stark reminder that internet-facing OT systems are vulnerable to exploitation. By taking immediate action and adopting long-term security strategies, US CNI providers can better protect their critical assets from future attacks.

CyberSecurity

FBI Takes Down Global Phishing Ring W3LL: What You Need to Know

Published

on

FBI Takes Down Global Phishing Ring W3LL: What You Need to Know

In a significant blow to cybercrime, the FBI announced on Monday that it has dismantled a global phishing operation known as W3LL. This sophisticated scheme allegedly targeted more than 17,000 victims across the world, causing millions in potential fraud. The bureau collaborated with Indonesian police to execute the takedown, which included the arrest of the suspected developer and the seizure of critical domains.

How the W3LL Phishing Operation Worked

The W3LL operation was built around a phishing kit sold for $500 on underground forums. Cybercriminals used this kit to create fake login pages that mimicked legitimate services, such as email providers and financial platforms. These pages were designed to steal passwords and multi-factor authentication codes from unsuspecting users.

According to the FBI, the kit enabled criminals to attempt over $20 million in fraud. The operation also featured an online marketplace where stolen credentials and access to hacked systems were bought and sold. This marketplace facilitated the sale of more than 25,000 compromised accounts, making it a lucrative hub for cybercriminals.

International Collaboration Led to the Takedown

The FBI worked closely with Indonesia’s national police to bring down the W3LL infrastructure. The alleged developer, identified only as G.L., was detained as part of the operation. The bureau also seized key domains, effectively crippling the phishing network. This joint effort highlights the importance of cross-border cooperation in combating cybercrime.

Building on this success, the FBI has not yet released additional details about the investigation. However, the takedown sends a clear message to cybercriminals: law enforcement is increasingly capable of dismantling even sophisticated operations.

Impact on Victims and Cybersecurity

The W3LL phishing operation targeted a wide range of individuals and organizations. Victims likely included employees at companies, small business owners, and everyday internet users. The stolen credentials could have been used for identity theft, financial fraud, or further cyberattacks.

As a result, this case underscores the ongoing threat of phishing attacks. Cybercriminals are constantly refining their tactics, making it essential for users to remain vigilant. For example, always verify website URLs before entering login credentials, and enable multi-factor authentication where possible. Additionally, consider using a password manager to generate and store complex passwords.

Lessons for Businesses and Individuals

For businesses, this takedown serves as a reminder to invest in employee training and advanced security tools. Regular phishing simulations can help staff identify suspicious emails. Meanwhile, individuals should avoid clicking on links in unsolicited messages and report any suspected phishing attempts to authorities.

Furthermore, law enforcement agencies are urging victims of the W3LL operation to come forward. If you believe your credentials were compromised, change your passwords immediately and monitor your accounts for unusual activity. You can also file a complaint with the Internet Crime Complaint Center (IC3).

What This Means for the Future of Cybercrime

The dismantling of W3LL is a major victory for cybersecurity, but it is not the end of the story. Phishing remains one of the most common and dangerous cyber threats. In fact, similar operations are likely already being developed by other criminal groups.

However, the FBI’s success demonstrates that international law enforcement can adapt to these challenges. By targeting the infrastructure behind phishing kits and marketplaces, authorities can disrupt the cybercriminal ecosystem. This approach may deter some attackers and make it harder for others to operate.

Ultimately, the W3LL takedown is a reminder that cybersecurity is a shared responsibility. Governments, businesses, and individuals must work together to stay ahead of evolving threats. For more insights, check out our guide on how to prevent phishing attacks and cybersecurity best practices.

Continue Reading

CyberSecurity

France Ditches Windows for Linux: A Bold Move Toward Digital Sovereignty

Published

on

France Ditches Windows for Linux: A Bold Move Toward Digital Sovereignty

In a significant shift, France has announced plans to replace Microsoft Windows with Linux on thousands of government computers. This decision, part of a broader push for digital sovereignty, aims to reduce the country’s dependence on American technology. The move reflects growing unease across Europe about relying on US-based tech giants amid geopolitical instability.

Why France Ditches Windows for Linux Now

The French government’s decision comes as a direct response to concerns over data control and infrastructure security. In a statement, French minister David Amiel emphasized the need to “regain control of our digital destiny.” He argued that France can no longer accept a situation where its data and digital systems are tied to US companies.

This shift is not sudden. It follows a pattern of increasing distrust toward American tech firms, especially after recent actions by the Trump administration. Sanctions and trade disruptions have made European leaders acutely aware of their vulnerabilities.

As a result, France ditches Windows for Linux not just as a technical upgrade, but as a strategic move to bolster national autonomy.

The Linux Migration Plan: What We Know So Far

The transition will begin with computers at the French government’s digital agency, DINUM. While no specific timeline or Linux distribution has been announced, the government is exploring various open source options tailored for enterprise use.

Linux, being free and highly customizable, offers France the flexibility to adapt its operating system to specific government needs. This contrasts sharply with proprietary software like Windows, which ties users to Microsoft’s ecosystem and licensing fees.

Building on this, the French government has also taken other steps to reduce US tech reliance. Earlier this year, it stopped using Microsoft Teams for video conferencing, switching to Visio, a French-developed tool based on the open source platform Jitsi.

Health Data Platform Migration

In addition to the operating system shift, France plans to migrate its health data platform to a new trusted system by the end of the year. This move underscores a broader commitment to securing sensitive citizen data within national borders.

Digital Sovereignty: A European Trend

France is not alone in this endeavor. Across Europe, lawmakers are waking up to the risks of over-reliance on US technology. In January, the European Parliament voted to adopt a report directing the European Commission to identify areas where the EU can reduce its dependence on foreign providers.

This trend, often called digital sovereignty, is gaining momentum. Countries like Germany and the Netherlands have also explored open source alternatives for government systems. However, France’s latest move is one of the most high-profile examples yet.

Therefore, when France ditches Windows for Linux, it sends a powerful signal to other nations: the era of unquestioned US tech dominance may be waning.

Challenges and Opportunities Ahead

Migrating an entire government infrastructure to Linux is no small feat. Compatibility issues, training costs, and software dependencies pose significant hurdles. However, the long-term benefits—including cost savings, enhanced security, and greater control—are compelling.

For more on how open source solutions are transforming government IT, check out our guide on open source adoption in public sector.

Additionally, the French government plans to invest in local tech ecosystems, fostering homegrown innovation. This aligns with the broader goal of reducing reliance on US tech giants like Microsoft, Amazon, and Google.

What This Means for the Future of Tech

France ditches Windows for Linux at a time when global tech alliances are shifting. As nations prioritize data sovereignty and cybersecurity, open source platforms are becoming increasingly attractive.

This move could inspire other countries to follow suit, accelerating the adoption of open source in government. It also puts pressure on US tech companies to adapt—or risk losing lucrative government contracts.

Interested in how this impacts the cloud computing landscape? Read our analysis on cloud sovereignty in Europe.

In conclusion, France’s decision is more than a technical switch—it’s a statement of intent. By prioritizing digital autonomy, the country is charting a new path for itself and potentially for the entire continent.

For a deeper dive into the geopolitical implications, explore our piece on tech geopolitics and European strategy.

Continue Reading

CyberSecurity

How Anthropic’s Claude AI Uncovered a Hidden Apache ActiveMQ Vulnerability After 13 Years

Published

on

How Anthropic’s Claude AI Uncovered a Hidden Apache ActiveMQ Vulnerability After 13 Years

For more than a decade, a critical security flaw lurked undetected within Apache ActiveMQ Classic, a widely used open-source message broker. The bug, recently identified as CVE-2026-34197, was finally exposed with the help of Anthropic’s AI assistant, Claude. This discovery highlights the growing role of artificial intelligence in cybersecurity and vulnerability research.

The flaw, categorized as a remote code execution (RCE) vulnerability, allows attackers to execute arbitrary operating system commands on affected systems. Horizon3.ai chief architect Naveen Sunkavally detailed the discovery in an April 7 blog post, emphasizing that organizations running ActiveMQ should prioritize patching immediately.

According to Sunkavally, “An attacker can invoke a management operation through ActiveMQ’s Jolokia API to trick the broker into fetching a remote configuration file and running arbitrary OS commands.” The vulnerability requires credentials, but default credentials (admin:admin) are common in many environments. On versions 6.0.0 through 6.1.1, no credentials are required due to another issue, CVE-2024-32114, which exposes the Jolokia API without authentication. In those versions, CVE-2026-34197 becomes an unauthenticated RCE threat.

Understanding the Apache ActiveMQ Bug and Its Impact

This Apache ActiveMQ bug has remained hidden for 13 years because it involves multiple components developed independently over time. In isolation, each feature appeared safe, but when chained together, they created a dangerous exploit path. Sunkavally noted that this is exactly where Claude excelled—efficiently stitching together the attack path end to end with a clear head free of assumptions.

“Something that would have probably taken me a week manually took Claude 10 minutes,” he said. The AI’s ability to analyze source code and identify complex interactions between components made it an invaluable tool in this discovery.

How the Vulnerability Works

The exploit leverages ActiveMQ’s Jolokia API, a management interface that allows remote access to the broker’s internal operations. By sending a crafted POST request to /api/jolokia/ containing an addNetworkConnector command, an attacker can trick the broker into fetching a malicious remote configuration file. This file then triggers the execution of arbitrary OS commands, granting the attacker control over the system.

Organizations concerned about potential compromise should check ActiveMQ broker logs for network connector activity referencing vm:// URIs with brokerConfig=xbean:http. Additional indicators of compromise include:

  • POST requests to /api/jolokia/ containing addNetworkConnector in the request body
  • Outbound HTTP requests from the ActiveMQ broker process to unexpected hosts
  • Unexpected child processes spawned by the ActiveMQ Java process

Patches and Mitigation Steps for the ActiveMQ RCE Vulnerability

The ActiveMQ RCE vulnerability has been patched in ActiveMQ Classic versions 5.19.4 and 6.2.3. Users are strongly advised to update to these versions immediately. Additionally, ensure that no default credentials are in use. Changing the default admin:admin credentials is a critical step, as many environments still rely on these weak passwords.

For organizations unable to patch immediately, implementing network segmentation and restricting access to the Jolokia API can help reduce risk. Monitoring for the indicators of compromise listed above is also essential for early detection.

If you are using ActiveMQ, review your configuration and apply the latest updates. For more on securing message brokers, check out our guide on best practices for message broker security.

Claude AI: A New Tool for Vulnerability Hunting

Sunkavally described the discovery of CVE-2026-34197 as “80% Claude and 20% gift-wrapping by a human.” He regularly uses Claude to take a first pass at source code for vulnerability hunting, prompting it lightly and setting up a target on the network for it to validate findings.

“A lot of the time, Claude finds interesting stuff but it doesn’t quite rise to the level of a CVE I’d bother reporting. In this case, it did a great job, with nothing more than a couple of basic prompts,” he said.

This case demonstrates how AI can accelerate vulnerability research, especially for bugs that involve complex interactions across multiple components. Sunkavally urged appsec engineers and developers to adopt tools like Claude in their workflows, stating that “anyone with a security background can take advantage.”

As AI continues to evolve, its role in cybersecurity will likely expand. For more insights on AI-driven security research, explore our article on how artificial intelligence is transforming threat detection.

Final Thoughts on the 13-Year-Old Bug

The discovery of this Apache ActiveMQ bug serves as a stark reminder that vulnerabilities can remain hidden for years, especially when they involve multiple independent components. The use of AI tools like Claude can help uncover these hidden threats more efficiently than traditional manual methods.

Organizations running ActiveMQ should act quickly to patch and review their security posture. By combining AI-powered vulnerability hunting with robust security practices, the cybersecurity community can stay ahead of evolving threats. For more on securing open-source software, see our tips for open-source security.

Continue Reading

Trending