u. s. organization

Iran attempting cyber attacks against U.S. critical infrastructure, officials say

U.S. intelligence agencies are “urgently warning” private sector companies throughout the nation that Iranian actors “are conducting exploitation activity” that has resulted in “disruptions across several U.S. critical infrastructure,” according to a government notice reviewed by The Times.

The Iranian cyberactivity comes as President Trump is threatening to target Iran’s critical infrastructure in the coming hours, particularly its bridges and power plants.

Iran’s attack targeted products by Rockwell Automation’s Allen-Bradley, one of the most widely used industrial automation brands, according to the notice, which said that cyber actors affiliated with Iran were exploiting “programmable logic controllers across U.S. critical infrastructure.”

Tehran’s targeting campaigns against U.S. organizations “have recently escalated, likely in response to hostilities between Iran,” the notice warned.

“Iran-affiliated advanced persistent threat (APT) actors are conducting exploitation activity targeting internet-facing operational technology (OT) devices, including programmable logic controllers (PLCs) manufactured by Rockwell Automation/Allen-Bradley,” the notice reads.

“U.S. organizations should urgently review the tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) in this advisory for indications of current or historical activity on their networks,” it continues.

The advisory was issued Tuesday jointly by the FBI, the Cybersecurity and Infrastructure Security Agency, the National Security Agency, the Environmental Protection Agency, the Department of Energy, and Cyber Command.

Top executives from companies at the core of the nation’s ability to function — those leading America’s largest energy, water, transportation, and communications corporations — had already been taking it upon themselves to increase their vigilence over potential attacks, concerned that Trump’s willingness to target Iran’s critical infrastructure inadvertently put a mark on their backs.

Some fear Iran’s ability to conduct cyber operations that could take down transformers or power inverters, if not a wide-scale power system. Others are concerned by threats to brick and mortar sites from proxies of Tehran — physical attacks against facilities such as nuclear plants, or power management systems, the crown jewels of the sector.

Larger, even more capable actors, particularly Russia and China, may also take advantage of the fog of war to launch strikes themselves.

“There remains concern about Iranian cyber capabilities and retaliation if the U.S. carries through on threats to attack their infrastructure,” said Ernest Moniz, former U.S. secretary of energy under President Obama who helped negotiate the 2015 nuclear deal with Iran. “There may already be backdoors, Trojan horses and malware hidden in our infrastructure.”

“I have to believe that the government cyber experts — or what’s left of them — are working closely and indeed overtime with the power companies and other infrastructure operators on cyber defense and intrusion detection and warning,” Moniz added.

Iran has demonstrated an ability to penetrate networks tied to critical U.S. infrastructure before.

In 2015, Iran-backed hackers accessed data associated with Calpine Corp., one of California’s largest power producers, obtaining detailed engineering diagrams and credentials related to power plant systems. Some were labeled “mission critical.” U.S. officials feared at the time that the breach would allow Tehran to initiate blackouts nationwide.

Since that time, companies at the center of the U.S. energy and telecommunications sectors have markedly improved their defenses. But Iran’s offensive capabilities have improved, as well.

Large players in the energy sector are operating with “a watchful eye and an elevated posture right now,” said Pedro J. Pizarro, president and chief executive officer of Edison International, the parent company of Southern California Edison, one of the nation’s largest electric utilities.

Companies like Edison have been operating under persistent threat for over a decade. In 2024, a pair of devastating cyberespionage attacks targeting U.S. critical infrastructure attributed to Chinese hackers, Volt Typhoon and Salt Typhoon, were discovered after avoiding detection for at least three years.

The threat of a similarly latent attack — where malware lies dormant in critical infrastructure systems, waiting for a signal to activate — is a real cause for concern in the sector, despite its best efforts and technological advances, experts and insiders said.

“The threat of cyber and physical attacks targeting critical infrastructure is not new,” said Jennifer DeCesaro, senior vice president of industry operations at the Edison Electric Institute, “which is why we partner with the government through the Electricity Subsector Coordinating Council to share actionable intelligence and prepare to respond to incidents that could affect our ability to provide electricity safely and reliably.”

The ESCC works closely with the National Security Council and its intelligence arms, particularly the intelligence agencies and CISA, to coordinate regular briefings on safety standards, best practices and intelligence tips.

The CIA declined to comment. A spokesperson with CISA, listed as out of office due to the ongoing federal funding hiatus for the Department of Homeland Security, could not be reached for comment.

Last summer, announcing a 40% cut to the workforce of her office, Director of National Intelligence Tulsi Gabbard eliminated the Cyber Threat Intelligence Integration Center, previously seen as a critical fusion hub of information by private sector partners.

Asked to respond to the potential of retaliatory attacks against U.S. infrastructure, Karoline Leavitt, the White House press secretary, repeated the president’s threats.

“The Iranian regime has until 8PM Eastern Time to meet the moment and make a deal with the United States,” she said. “Only the president knows where things stand and what he will do.”

Trump has threatened to destroy every bridge and power plant in Tehran if they fail to come to an agreement that ends its control over the Strait of Hormuz.

Ultimately, corporate executives shoulder much of the burden as the first line of defense for the country’s critical infrastructure, roughly 85% of which is owned by private sector companies.

Tom Fanning, former CEO of Southern Co. and now executive committee chairman at the Alliance for Critical Infrastructure, said the threat from Iran is “credible.”

“I have not seen what I would describe as the existential threat, to take down a wide-ranging power system,” Fanning said. “Could those things be turned on? Sure. Is the United States critical infrastructure prepared to act? I think so.”

Last month, early on in the war, the Los Angeles Metro transit system was forced to shut down a portion of its network due to a hack. Authorities say it is still unclear who was behind the breach, but a source told The Times that Iran-backed hackers are being investigated as the potential culprit.

The transportation agency said its security team had “discovered unauthorized activity,” and were making sure its roughly 1,400 servers were secure before bringing them back online. The agency has emphasized the hack did not impact passengers’ commute time.

The FBI said it was aware of the hack. DHS is working with local partners “to address cyber threats to critical infrastructure,” an official said.

“The reality is that the threats are here and now,” Fanning added. “The truth is, the bad guys are already here.”

Times staff writers Kevin Rector, Richard Winton and Rebecca Ellis, in Los Angeles, contributed to this report.

Source link