The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the FBI, Department of Defense Cyber Crime Center (DC3), and the National Security Agency (NSA), has issued a high-priority alert warning U.S. organizations about a significant uptick in cyber threats from Iranian-affiliated actors.
Despite a declared ceasefire and ongoing diplomatic negotiations in the Middle East, U.S. authorities caution that Iranian cyber groups and hacktivists remain highly active and are likely to target critical U.S. infrastructure in the near term.
According to the joint advisory released on June 30, 2025, Iranian-affiliated cyber actors and hacktivist groups are exploiting vulnerabilities in U.S. networks and internet-connected devices.
The threat is particularly acute for Defense Industrial Base (DIB) companies and organizations with ties to Israeli research and defense sectors.
Recent operations have targeted U.S. water and wastewater facilities, energy providers, food and beverage manufacturers, and healthcare organizations.
These attacks often leverage internet-exposed industrial control systems (ICS) with weak or default credentials, as well as default Transmission Control Protocol (TCP) ports.
Between November 2023 and January 2024, during the Israel-Hamas conflict, Iranian Islamic Revolutionary Guard Corps (IRGC)-affiliated actors compromised Israeli-made programmable logic controllers (PLCs) and human-machine interfaces (HMIs).
This global campaign included dozens of U.S. victims across multiple sectors. Hack-and-leak operations combined hacking, data theft, and information operations (such as online amplification and direct harassment), resulting in financial losses and reputational damage.
The primary objective of these campaigns has been to undermine public confidence in the security of victim networks and data, embarrass targeted companies and countries, and protest geopolitical events.
While Israeli companies have been the primary targets, U.S. entities, including an IPTV company, have also been affected.
CISA and its partners strongly urge critical infrastructure asset owners and operators to implement robust cyber defenses, including:
Federal agencies recommend reporting suspicious activity to CISA’s 24/7 Operations Center, the FBI, or the NSA.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…