In a marked escalation of hacktivist operations, ideologically driven “cyber rebels” are shifting focus from traditional website defacements and denial-of-service campaigns toward sophisticated attacks on industrial control systems (ICS).
Security firms report that nearly one-third of all hacktivist incidents in mid-2025 involve ICS intrusions, data breaches, and unauthorized system access, an increase from the previous quarter.
By weaponizing SCADA and HMI protocols, these groups are now capable of extracting sensitive process data and manipulating physical processes to disrupt operations.

Strategic Intrusions into Energy and Utilities
Recent incident analysis indicates that energy and utilities networks have borne the brunt of this trend.
The Russia-linked collective Z-Pentest alone carried out 38 ICS breaches in Q2 2025, more than doubling its prior quarter activity.
Leveraging weak authentication on remote terminal units (RTUs), attackers injected Modbus commands to alter pump speeds and valve positions in European power grids.
In several instances, the group recorded and later published videos showing technicians’ consoles cycling through anomalous setpoints, amplifying the psychological impact on infrastructure operators.
Two emerging Russia-affiliated entities, Dark Engine and Sector 16, have collectively executed over 40 additional ICS attacks, targeting both gas pipelines and electrical substations via exposed Ethernet/IP and DNP3 interfaces.
Data Exfiltration and Access-Based Campaigns
Beyond disrupting physical processes, hacktivists are increasingly conducting data theft operations against critical infrastructure providers.
Access-based attacks now represent a significant share of hacktivist intrusions, where adversaries exploit publicly exposed Bastion hosts or unpatched VPN appliances to gain footholds.
Once inside, they deploy custom Cobalt Strike loaders and bespoke ICS reconnaissance tools designed to map network topologies and identify OPC UA servers.
In one high-profile breach, Dark Engine exfiltrated design schematics and production logs from a Vietnamese metallurgical plant by compromising its SCADA HMI interface, stealing gigabytes of proprietary data before triggering an unauthorized furnace shutdown.
Regional Flashpoints and New Actors
The surge in ICS targeting often correlates with geopolitical flashpoints.
During the Thailand-Cambodia border conflict, the Cambodian collective BL4CK CYB3R launched DDoS and credential harvesting attacks against Thai grid operators, using phishing kits to capture operator logins.
Meanwhile, APT IRAN, aligned with Tehran’s strategic interests, executed precision strikes on U.S. energy vendors by exploiting zero-day vulnerabilities in popular ICS networking gear.
These operations demonstrate a growing alignment of hacktivist tactics with nation-state objectives, blurring the lines between politically motivated protest and state-sponsored cyberwarfare.
Heightened Risk and Defensive Imperatives
The evolving hacktivist playbook underscores the urgent need for critical infrastructure operators to adopt Zero Trust architectures and rigorous network segmentation.
Continuous monitoring of OT and IT environments for anomalous Modbus and OPC UA traffic, combined with multi-factor authentication on all remote access points, can mitigate unauthorized intrusions.
As hacktivist groups refine their technical prowess, the threat to national resilience sectors will likely persist, demanding sustained investment in vulnerability management and real-time threat intelligence.





