In recent weeks, U.S. water treatment facilities and other critical infrastructure have come under sustained digital assault attributed to Iranian-linked cyber units.
Security researchers have uncovered evidence that Intelligence Group 13, an advanced persistent threat cell operating within the IRGC’s Shahid Kaveh Cyber Group, is conducting targeted campaigns against industrial control systems (ICS) that govern water purification, electrical grids, and fuel distribution networks.
Analysts warn that these intrusions not only risk disrupting essential services but also signal a broader shift toward integrated cyber-kinetic retaliation following escalating regional tensions.
Cyber-Physical Intrusions Disrupt Water Treatment Facilities
Technical investigations reveal that attackers leveraged tailored spear-phishing lures to compromise employee workstations at multiple municipal water plants.
Once inside, operators believe the adversaries deployed a bespoke ICS malware variant dubbed “Project Binder” capable of issuing unauthorized commands to programmable logic controllers (PLCs) manufactured by Unitronics.
In one confirmed incident, attackers manipulated chlorine dosing parameters, driving levels outside safe thresholds and triggering automatic shutdown protocols designed to protect public health.
A second operation targeted Supervisory Control and Data Acquisition (SCADA) interfaces, injecting false telemetry data that masked attempts to open critical valves.
These malicious actions demonstrate deep familiarity with ICS architectures and safety interlocks, suggesting that Intelligence Group 13 conducted extensive reconnaissance before activation.
Behind the scenes, pre-positioned implants remained dormant for weeks, enabling the threat actors to observe normal operational rhythms, log credential exchanges, and map network segmentation.
Once confident in their foothold, they synchronized malware activation across multiple sites, creating the potential for simultaneous outages.
Incident responders detected anomalous Domain Name System (DNS) queries directed at command-and-control (C2) servers hosted on bullet-proof hosting services, confirming that data exfiltration channels had been established well in advance.
The complex choreography of these intrusions underscores a calculated approach to maximize both technical effect and public alarm.
Psychological Warfare Amplified Through Propaganda Fronts
In tandem with their technical incursions, Intelligence Group 13’s media arm, known as CyberAveng3rs, has waged an aggressive information campaign across Telegram, Instagram, and X.
Branded with martyrdom iconography and revolutionary slogans, CyberAveng3rs has published defacement screenshots of compromised Human-Machine Interface (HMI) panels alongside taunts threatening “Operation IV” against U.S. and Israeli targets.
These messages often quote IRGC martyrs and frame the attacks as retaliatory strikes for recent U.S. airstrikes on Iranian nuclear sites, thereby fusing tactical sabotage with ideological messaging.

CyberAveng3rs’ posts include purported CCTV snapshots from water facility control rooms, purportedly showing engineers scrambling to restore normal operations.
They have also shared intercepted SCADA logs highlighting anomalous chemical readings.
By publicly exposing these “victories,” the propaganda wing aims to amplify fear, sow distrust in public institutions, and pressure U.S. authorities to reconsider military actions in the Middle East.
This coordinated blend of cyber attack and narrative warfare exemplifies Iran’s evolving hybrid doctrine, where deniable technical aggression is leveraged for maximum psychological impact.
As investigations continue, federal agencies are racing to bolster defenses around ICS environments and counter the dual threat posed by sophisticated malware campaigns and high-profile disinformation.
Officials caution that without enhanced monitoring, network segmentation, and workforce training on phishing resiliency, U.S. critical infrastructure will remain vulnerable to further asymmetric cyber reprisals.





