Iran-Linked Hackers Disrupt U.S. Critical Infrastructure via PLC Attacks as FBI Dismantles Russian APT28 Espionage Network
1. Executive Summary
This week's intelligence landscape is dominated by significant nation-state threat activity targeting U.S. critical infrastructure, with Iranian-affiliated actors causing operational disruptions through attacks on internet-exposed programmable logic controllers (PLCs) and SCADA systems. Simultaneously, U.S. federal authorities successfully disrupted a widespread Russian espionage operation leveraging compromised routers across 18,000 devices.
Key Developments:
- Iranian OT Attacks: CISA and federal partners issued an urgent advisory warning that Iran-linked cyber actors are actively targeting internet-facing operational technology devices across multiple U.S. critical infrastructure sectors, with confirmed operational disruptions reported.
- Russian APT28 Disruption: The FBI dismantled a Forest Blizzard (APT28) espionage network that exploited vulnerable TP-Link and MikroTik routers to conduct adversary-in-the-middle attacks and DNS hijacking operations targeting Ukraine and NATO allies.
- Healthcare Sector Impact: Signature Healthcare in Massachusetts diverted ambulances and canceled services following a cyberattack, highlighting continued targeting of healthcare facilities.
- FBI Cybercrime Report: The FBI's annual Internet Crime Report reveals cybercrime losses approached $21 billion in 2025, with investment fraud, business email compromise, and tech support scams causing the highest financial impact.
- Critical Vulnerabilities: CISA issued an emergency directive requiring federal agencies to patch an actively exploited Ivanti EPMM vulnerability by April 13, 2026. Additionally, a 13-year-old RCE vulnerability was discovered in Apache ActiveMQ Classic.
- AI-Driven Vulnerability Discovery: Anthropic announced Project Glasswing, utilizing its Claude Mythos AI model to autonomously discover thousands of zero-day vulnerabilities across major systems, signaling a paradigm shift in vulnerability research.
2. Threat Landscape
Nation-State Threat Actor Activities
Iran-Linked Critical Infrastructure Targeting
Federal agencies including CISA have issued urgent warnings regarding Iranian-affiliated cyber actors actively targeting U.S. critical infrastructure through attacks on internet-exposed operational technology (OT) devices. The campaign specifically targets programmable logic controllers (PLCs) and SCADA systems across multiple sectors, with confirmed reports of operational disruptions and financial losses at affected facilities.
Key Observations:
- Attackers are exploiting default credentials and known vulnerabilities in internet-facing PLCs
- Multiple critical infrastructure sectors have reported real-world operational impacts
- The campaign demonstrates Iran's continued focus on OT/ICS environments
- Despite a shaky ceasefire, security researchers assess that Iran-linked hackers have vowed to revive efforts against America "when the time is right"
Sources: SecurityWeek, The Hacker News, CISA, Homeland Security Today
Russian APT28 (Forest Blizzard) Operations
U.S. authorities successfully disrupted a sophisticated Russian espionage operation attributed to APT28 (also known as Forest Blizzard and Pawn Storm), a threat group linked to Russia's GRU military intelligence agency. The operation compromised approximately 18,000 devices globally.
Technical Details:
- Exploited vulnerable TP-Link and MikroTik routers to build a malicious network
- Conducted adversary-in-the-middle (AitM) attacks to intercept network traffic
- Performed DNS hijacking to redirect victims to credential-harvesting infrastructure
- Targeted Microsoft account credentials and session tokens
- Deployed previously undocumented PRISMEX malware in spear-phishing campaigns targeting Ukraine and NATO allies
Sources: SecurityWeek, CyberScoop, Infosecurity Magazine
North Korean Supply Chain Attacks
The Contagious Interview campaign, attributed to North Korean threat actors, has expanded its malicious package distribution across multiple software ecosystems. Researchers identified approximately 1,700 malicious packages targeting npm, PyPI, Go, and Rust package repositories, representing a significant expansion of supply chain attack capabilities.
Source: The Hacker News
Ransomware and Cybercriminal Developments
FBI Internet Crime Report 2025
The FBI received over 1 million complaints of malicious cyber activity in 2025, with total losses approaching $21 billion. Key findings include:
- Investment Scams: Highest financial losses, often involving cryptocurrency
- Business Email Compromise (BEC): Continues to cause significant enterprise losses
- Tech Support Scams: Remain a persistent threat, particularly targeting elderly victims
Source: SecurityWeek
Hack-for-Hire Operations
A coordinated spyware campaign targeting journalists in the Middle East and North Africa has been attributed to the suspected Indian government-connected group known as Bitter. The campaign deployed ProSpy spyware and other surveillance tools against media professionals.
Source: CyberScoop
Emerging Botnets and DDoS Threats
Masjesu Botnet
Security researchers have identified a new DDoS-for-hire botnet called Masjesu, advertised via Telegram and targeting IoT devices globally. Notable characteristics include:
- Focuses on persistence rather than widespread infection
- Deliberately avoids blacklisted IPs and critical infrastructure entities
- Operates as a commercial DDoS-for-hire service
Sources: SecurityWeek, The Hacker News
Chaos Malware Variant
A new variant of the Chaos malware has been observed targeting misconfigured cloud deployments, adding SOCKS proxy capabilities. This expansion indicates threat actors are increasingly targeting cloud infrastructure misconfigurations.
Source: The Hacker News
Russia's Shadow War in Europe
A new report warns that Russia's "shadow war" is expanding across Europe, encompassing hybrid warfare tactics including cyber operations, sabotage, and influence campaigns targeting critical infrastructure and democratic institutions.
Source: Homeland Security Today
3. Sector-Specific Analysis
Energy Sector
Threat Level: ELEVATED
The energy sector remains a primary target of Iranian-linked cyber actors exploiting internet-exposed PLCs and SCADA systems. Organizations should immediately audit all internet-facing OT assets and implement network segmentation.
Key Concerns:
- Direct targeting of industrial control systems by nation-state actors
- Potential for cascading impacts across interconnected grid systems
- Supply chain vulnerabilities in Strait of Hormuz affecting energy logistics
Recommended Actions:
- Conduct immediate inventory of all internet-exposed OT/ICS devices
- Implement network segmentation between IT and OT environments
- Review and rotate default credentials on all PLC and SCADA systems
- Enable enhanced logging and monitoring for OT network traffic
Water and Wastewater Systems
Threat Level: ELEVATED
Water utilities are explicitly included in the Iranian PLC targeting campaign. The sector's historically limited cybersecurity resources make it particularly vulnerable to these attacks.
Recommended Actions:
- Immediately disconnect PLCs from direct internet access where operationally feasible
- Implement VPN or jump server requirements for remote access
- Review CISA's water sector-specific guidance and implement recommended controls
- Establish manual override procedures for critical treatment processes
Healthcare and Public Health
Threat Level: HIGH
Active Incident: Signature Healthcare Cyberattack
Signature Healthcare in Massachusetts experienced a significant cyberattack forcing the diversion of ambulances and cancellation of services. Pharmacies affiliated with the healthcare system are unable to fill prescriptions, directly impacting patient care.
Impact Assessment:
- Emergency services disrupted with ambulance diversions
- Pharmacy operations halted, affecting medication access
- Scheduled services and appointments canceled
- Potential patient data exposure under investigation
Sector-Wide Recommendations:
- Review and test incident response plans for ransomware scenarios
- Ensure offline backup systems for critical patient care functions
- Establish mutual aid agreements with neighboring healthcare facilities
- Conduct tabletop exercises focused on operational continuity during cyber incidents
Source: SecurityWeek
Communications and Information Technology
Threat Level: ELEVATED
Supply Chain Compromise Concerns
Multiple supply chain threats emerged this week:
- Python/LiteLLM Compromise: A malicious supply chain compromise was identified in the LiteLLM Python package, highlighting ongoing risks in open-source software dependencies
- North Korean Package Campaigns: 1,700 malicious packages distributed across npm, PyPI, Go, and Rust ecosystems
- WordPress Vulnerabilities: Critical Ninja Forms vulnerability enabling site takeover is being actively exploited
LEO Satellite Communications Risk
Analysis indicates that supply chain disruptions in the Strait of Hormuz could threaten Low Earth Orbit (LEO) satellite communications resilience, with potential implications for communications infrastructure globally.
Source: Homeland Security Today
Transportation Systems
Threat Level: MODERATE
Maritime Security Update
Iran continues to tighten control over the Strait of Hormuz, with shipping forced into controlled routes under Islamic Revolutionary Guard Corps oversight. While traffic volume remains steady, the geopolitical situation presents ongoing risks to maritime supply chains.
Aviation Sector:
ASRC Federal was selected for the FAA Second Level Engineering Services Contract, supporting continued modernization of aviation infrastructure systems.
Source: Homeland Security Today
Financial Services
Threat Level: MODERATE
The sector faces continued threats from BEC schemes and investment fraud, as highlighted in the FBI's 2025 Internet Crime Report. Additionally, the UNC6783 threat actor is compromising business process outsourcing (BPO) providers to gain access to high-value financial sector targets.
Cryptocurrency Concerns:
MEMRI's Cyber & Jihad Lab continues to monitor an uptick in ISIS-K use of cryptocurrency for financing operations, presenting potential compliance and security implications for financial institutions.
Sources: SecurityWeek, Homeland Security Today
Government Facilities
Threat Level: ELEVATED
LAPD Data Breach
A data breach has resulted in the exposure of sensitive Los Angeles Police Department records. The incident underscores the continued targeting of law enforcement and government databases by threat actors.
Source: Security Magazine
4. Vulnerability and Mitigation Updates
Critical Vulnerabilities Requiring Immediate Attention
CISA Emergency Directive: Ivanti EPMM (CVE-2026-XXXX)
Severity: CRITICAL | Deadline: April 13, 2026
CISA has issued an emergency directive requiring federal agencies to patch an actively exploited vulnerability in Ivanti Endpoint Manager Mobile (EPMM) within four days. The vulnerability has been exploited in attacks since January 2026.
Required Actions:
- Apply vendor patches immediately
- If patching is not possible, implement network isolation
- Review logs for indicators of compromise
- Report any suspected compromises to CISA
Source: Bleeping Computer
Apache ActiveMQ Classic RCE (13-Year-Old Vulnerability)
Severity: HIGH
Security researchers, assisted by Anthropic's Claude AI, discovered a remote code execution vulnerability in Apache ActiveMQ Classic that has existed undetected for 13 years. While the primary vulnerability requires authentication, a secondary flaw exposes the Jolokia API without authentication.
Affected Systems: Apache ActiveMQ Classic installations
Recommended Action: Apply patches immediately; audit systems for potential historical compromise
Sources: SecurityWeek, Bleeping Computer, Infosecurity Magazine
OpenSSL Data Leakage Vulnerability
Severity: MODERATE to HIGH
Seven vulnerabilities have been patched in OpenSSL, including a data leakage vulnerability. Most can be exploited for denial-of-service attacks.
Recommended Action: Update OpenSSL to the latest patched version
Source: SecurityWeek
Ninja Forms WordPress Plugin (CVE-2026-XXXX)
Severity: CRITICAL | Status: Actively Exploited
A critical vulnerability in the Ninja Forms WordPress plugin allows unauthenticated arbitrary file uploads, enabling remote code execution and complete site takeover.
Recommended Action: Update to version 3.3.27 immediately
Sources: SecurityWeek, Infosecurity Magazine
Flowise AI Workflow Vulnerability
Severity: CRITICAL | Status: Actively Exploited
Hackers are exploiting a critical flaw in Flowise affecting thousands of AI workflow deployments.
Recommended Action: Review Flowise deployments and apply available patches
Source: CSO Online
Google API Key Vulnerability
A flaw in Google API key handling exposes mobile applications to unauthorized Gemini AI access, private file exposure, and billing risks on Android devices.
Source: Infosecurity Magazine
Notable Security Tools and Frameworks
Microsoft Agent Governance Toolkit
Microsoft released a new Agent Governance Toolkit designed to address top OWASP risks for AI agents, providing organizations with tools to secure AI deployments.
Source: CSO Online
Anthropic Project Glasswing
Anthropic announced Project Glasswing, utilizing its Claude Mythos Preview AI model to autonomously identify and fix undiscovered vulnerabilities in critical software. The initiative has already discovered thousands of zero-day flaws across major systems, representing a significant advancement in AI-assisted vulnerability research.
Implications for Defenders:
- Accelerated vulnerability discovery may compress patch timelines
- Organizations should prepare for increased vulnerability disclosure volume
- AI-assisted security tools may become essential for keeping pace with threats
Sources: The Hacker News, Infosecurity Magazine, CSO Online
Defensive Recommendations
For OT/ICS Environments (Iranian Threat Response)
- Immediately audit all internet-exposed PLCs and SCADA systems
- Implement network segmentation between IT and OT networks
- Deploy monitoring solutions capable of detecting anomalous OT traffic
- Review and change default credentials on all industrial control systems
- Establish out-of-band communication channels for incident response
- Document manual override procedures for critical processes
For Network Infrastructure (APT28 Response)
- Audit TP-Link and MikroTik router configurations
- Update router firmware to latest versions
- Implement DNS security monitoring
- Review authentication logs for suspicious Microsoft account activity
- Consider implementing DNSSEC where feasible
5. Resilience and Continuity Planning
Lessons Learned: Healthcare Sector Incident Response
The Signature Healthcare cyberattack provides several lessons for healthcare organizations and other critical infrastructure operators:
- Ambulance Diversion Protocols: Pre-established mutual aid agreements enabled patient care continuity despite system outages
- Pharmacy Operations: Dependency on digital systems for prescription fulfillment created patient care gaps; manual backup procedures should be documented and tested
- Communication Plans: Clear public communication about service disruptions helps manage patient expectations and safety
Ransomware Response Best Practices
Security Magazine published guidance on ransomware response, emphasizing that while organizations cannot control when attacks occur, they can control their response. Key recommendations include:
- Maintain offline, tested backups of critical systems and data
- Establish clear decision-making authority for incident response
- Pre-negotiate relationships with incident response firms and legal counsel
- Document and regularly test recovery procedures
- Conduct tabletop exercises that include executive leadership
Source: Security Magazine
Tabletop Exercise Evolution
CSO Online reports on the evolution of tabletop exercises, noting that modern exercises are becoming more sophisticated and realistic. Organizations should consider:
- Incorporating real-world threat intelligence into scenarios
- Including cross-functional teams beyond IT security
- Testing communication and decision-making under pressure
- Evaluating third-party and supply chain dependencies
Source: CSO Online
Supply Chain Security Developments
Strait of Hormuz Implications
Iran's tightened control over the Strait of Hormuz presents supply chain risks extending beyond energy to include:
- Components for LEO satellite communications systems
- Industrial equipment and spare parts
- Technology hardware supply chains
Recommended Actions:
- Assess supply chain dependencies on Hormuz transit routes
- Identify alternative suppliers and logistics pathways
- Increase inventory buffers for critical components
- Monitor geopolitical developments affecting maritime shipping
Software Supply Chain
The Python/LiteLLM compromise and North Korean package campaigns highlight ongoing software supply chain risks:
- Implement software composition analysis (SCA) tools
- Establish approved package repositories
- Monitor for dependency confusion attacks
- Review third-party code before integration
Cross-Sector Dependencies
This week's Iranian OT attacks underscore the interconnected nature of critical infrastructure:
- Energy → Water: Power disruptions affect water treatment and distribution
- Communications → All Sectors: Network compromises can cascade across dependent systems
- Healthcare → Public Safety: Hospital disruptions affect emergency response capabilities
Organizations should map their dependencies on other critical infrastructure sectors and develop contingency plans for upstream disruptions.
6. Regulatory and Policy Developments
Federal Cybersecurity Initiatives
CISA Emergency Directive on Ivanti EPMM
CISA's emergency directive requiring federal agencies to patch Ivanti EPMM vulnerabilities by April 13, 2026, reflects the urgency of addressing actively exploited vulnerabilities. While binding only on federal agencies, private sector organizations should treat this as a strong signal to prioritize similar patching efforts.
FBI Cybercrime Statistics
The FBI's 2025 Internet Crime Report documenting nearly $21 billion in losses provides data supporting continued investment in cybersecurity programs and may influence future regulatory requirements.
International Developments
Russia's Shadow War
Reports of Russia's expanding "shadow war" across Europe may influence transatlantic cybersecurity cooperation and information sharing arrangements. Organizations with European operations should monitor for potential regulatory responses.
Iran Ceasefire Implications
Despite a reported ceasefire, Iranian-linked hackers have indicated intentions to resume operations against U.S. targets. This suggests that current threat levels should be maintained regardless of diplomatic developments.
Privacy and Data Protection
LinkedIn Data Practices
Questions have been raised about how LinkedIn uses the petabytes of data it collects, potentially signaling increased regulatory scrutiny of large-scale data collection practices.
Source: CSO Online
Compliance Considerations
Immediate Deadlines:
- April 13, 2026: Federal agencies must complete Ivanti EPMM patching per CISA emergency directive
Ongoing Requirements:
- Organizations in critical infrastructure sectors should review sector-specific cybersecurity requirements
- Healthcare entities should ensure HIPAA security rule compliance in light of continued sector targeting
- Financial institutions should review BSA/AML compliance regarding cryptocurrency-related threats
7. Training and Resource Spotlight
Upcoming Training and Events
NIST Workshop: Blockchain and Distributed Ledger Technologies
Date: April 16, 2026
NIST will host a workshop examining blockchain and DLT potential for supporting new forms of digital infrastructure and recordkeeping. Relevant for organizations exploring blockchain applications in critical infrastructure.
Source: NIST
Improving the Nation's Cybersecurity - Open Forum
Date: April 30, 2026
Red Hat, NIST, and the Office of Space Commerce are co-hosting the fifth annual Cybersecurity Open Forum. This event provides opportunities for public-private dialogue on national cybersecurity priorities.
Source: NIST
NICE Webinar: Beyond Technical Skills - The Human Element of a Cyber Career
Date: May 13, 2026
This NIST NICE webinar will address non-technical aspects of cybersecurity careers, moderated by Daniel Eliot, Lead for Small Business Engagement at NIST.
Source: NIST
MLXN: Machine Learning for X-ray and Neutron Scattering
Date: April 13, 2026
Building on previous workshops, this event continues exploration of machine learning applications in scientific research.
Source: NIST
Artificial Intelligence for Manufacturing Workshop
Date: May 27, 2026
NIST workshop addressing AI integration in manufacturing, including security considerations for AI-enabled production systems.
Source: NIST
Iris Experts Group Annual Meeting
Date: June 25, 2026
Forum for discussion of technical questions related to iris recognition for government agency missions.
Source: NIST
2026 Time and Frequency Seminar
Date: July 21, 2026
NIST Time and Frequency Division's annual seminar covering precision timing technologies relevant to critical infrastructure synchronization.
Source: NIST
New Tools and Frameworks
Microsoft Agent Governance Toolkit
Microsoft's new toolkit addresses OWASP top risks for AI agents, providing governance frameworks for organizations deploying AI systems.
Anthropic Project Glasswing
While primarily a research initiative, Project Glasswing's approach to AI-assisted vulnerability discovery may inform future defensive tools and methodologies.
Best Practices and Guidance
Post-Incident Review
CSO Online published guidance on conducting effective post-incident reviews, emphasizing the importance of learning from security events to improve future response capabilities.
Source: CSO Online
Zero-Day Response
Analysis from CSO Online addresses the collapsing zero-day timeline and provides guidance for security leaders on adapting response strategies to accelerated vulnerability disclosure cycles.
Source: CSO Online
Radiological Emergency Preparedness
Domestic Preparedness published guidance on integrating radiological emergency preparedness into all-hazards planning, advocating for broader application of REP training beyond fixed-facility scenarios.
Source: Domestic Preparedness
Hurricane Season Lessons
Pasco County Fire Rescue shared lessons learned from the 2024 hurricane season, providing insights applicable to emergency preparedness across critical infrastructure sectors.
Source: Domestic Preparedness
DDoS Protection Resources
Multiple reports this
This briefing is generated using AI analysis of public news sources. Always verify critical information through authoritative sources before taking action.