Nearly 4,000 US industrial devices exposed to Iranian cyberattacks
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读全文,抓住主要信息。 文章主要讲的是伊朗支持的黑客攻击美国的关键基础设施,特别是针对罗克韦尔自动化制造的PLC设备。这些设备有数千个暴露在互联网上,导致运营中断和财务损失。FBI发现黑客提取了设备的项目文件,并操控了HMI和SCADA显示的数据。 此外,网络安全公司Censys报告称,全球超过5200个暴露的工业控制系统中,74.6%在美国。建议防御措施包括使用防火墙保护PLC、扫描日志、检查可疑流量、启用多因素认证等。 还有提到之前的类似攻击事件,比如CyberAv3ngers和Handala组织的攻击。这些信息需要浓缩到100字以内。 现在我需要把这些要点组织成简洁的语言,确保涵盖主要攻击对象、影响、数据来源以及防御建议。同时避免使用“这篇文章”或“文章内容总结”这样的开头。 最终的总结应该清晰明了,涵盖伊朗黑客攻击美国关键基础设施、PLC设备暴露情况及防御措施。 </think> 伊朗支持的黑客针对美国关键基础设施网络中的罗克韦尔自动化PLC设备发起攻击,导致运营中断和财务损失。全球约5,200个此类工业控制系统暴露于互联网,其中74.6%位于美国。建议采取防火墙保护、日志扫描和多因素认证等措施防御此类攻击。 2026-4-10 16:1:32 Author: www.bleepingcomputer.com(查看原文) 阅读量:2 收藏

Hacker

The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of Internet-exposed programmable logic controllers (PLCs) manufactured by Rockwell Automation.

According to a joint advisory issued by multiple U.S. federal agencies on Tuesday, Iranian state-backed hacking groups have been targeting Rockwell Automation/Allen-Bradley PLC devices since March 2026, causing operational disruptions and financial losses.

"Iranian-affiliated APT targeting campaigns against U.S. organizations have recently escalated, likely in response to hostilities between Iran, and the United States and Israel," the authoring agencies warned.

Wiz

"The FBI identified that this activity resulted in the extraction of the device's project file and data manipulation on HMI and SCADA displays."

As cybersecurity firm Censys reported one day later, three-quarters of more than 5,200 such industrial control systems found exposed online globally are from the United States.

"Censys data identifies 5,219 internet-exposed hosts globally responding to EtherNet/IP (EIP) and self-identifying as Rockwell Automation/Allen-Bradley devices," Censys said.

"The United States accounts for 74.6% of global exposure (3,891 hosts), with a disproportionate share on cellular carrier ASNs indicative of field-deployed devices on cellular modems."

Internet exposed Rockwell/Allen Bradley PLCs
Internet-exposed Rockwell/Allen Bradley PLCs (Censys)

​To defend against these ongoing attacks, network defenders are advised to secure PLCs using a firewall or disconnect them from the Internet, scan logs for signs of malicious activity, and check for suspicious traffic on OT ports (especially when it originates from overseas hosting providers).

Admins should also enforce multifactor authentication (MFA) for access to OT networks, keep all PLC devices up to date, and disable unused services and authentication methods.

This ongoing campaign follows similar attacks from nearly three years ago, when a threat group affiliated with the Iranian Government's Islamic Revolutionary Guard Corps (IRGC) and tracked as CyberAv3ngers targeted vulnerabilities in U.S.-based Unitronics operational technology (OT) systems.

CyberAv3ngers hackers compromised at least 75 Unitronics PLC devices in multiple waves of cyberattacks between November 2023 and January 2024, with half of those in Water and Wastewater Systems critical infrastructure networks across the United States.

More recently, the Handala hacktivist group (linked to Iran's Ministry of Intelligence and Security) wiped approximately 80,000 devices from the network of U.S. medical giant Stryker, including employees' mobile devices and company-managed personal computers.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/nearly-4-000-us-industrial-devices-exposed-to-iranian-cyberattacks/
如有侵权请联系:admin#unsafe.sh