UAC-0001 Hackers Target ICS Devices on Windows Servers – Active IOCs
June 24, 2025Multiple GitLab Products Vulnerabilities
June 24, 2025UAC-0001 Hackers Target ICS Devices on Windows Servers – Active IOCs
June 24, 2025Multiple GitLab Products Vulnerabilities
June 24, 2025Severity
High
Analysis Summary
The Department of Homeland Security has issued a high-level cyber threat advisory warning of imminent attacks from pro-Iranian hacktivist groups targeting the United States' infrastructure. This follows a sharp escalation in U.S.-Iran tensions after missile strikes were exchanged between the two nations in late June 2025. The digital front has now become a critical battlefield, with Iranian-aligned cyber actors launching coordinated campaigns involving espionage, DDoS attacks, and exploitation of operational technology (OT) systems, particularly those supporting U.S. military and industrial operations or linked to Israel.
These threat actors, including Team 313 and CyberAv3ngers, are leveraging a mix of destructive and disruptive tactics. Team 313 claimed a DDoS attack on Truth Social, citing retaliation for U.S. strikes on Iranian nuclear sites. Other groups like Handala and Predatory Sparrow, aligned with pro-Palestine and pro-Israel interests, respectively, have escalated the regional cyber conflict by launching major data breaches and attacks on financial infrastructure. Intelligence agencies believe these groups operate under the influence or direction of the Iranian regime, using cyber operations as a tool for strategic retaliation and asymmetric warfare.
Analysts warn that upcoming cyberattacks may target U.S. entities using Israeli technology, especially in the OT sector. The convergence of IT and OT systems, where operational infrastructure like programmable logic controllers (PLCs) and human-machine interfaces (HMIs) are exposed online, has created a broad attack surface. These systems, often secured with default credentials and lacking network segmentation, are easily compromised using publicly available information and automated scanning tools, allowing attackers to gain control over critical infrastructure not built for internet exposure.
CyberAv3ngers’ previous attacks on U.S. water and wastewater systems in 2023 exemplify this threat. Their methods include scanning for internet-facing OT devices using industrial protocols, followed by brute-force logins. These attacks demonstrate the growing sophistication of Iranian cyber groups and highlight a critical vulnerability in U.S. infrastructure. With tensions still high, destructive cyber operations are expected to coincide with future military actions, raising the risk of serious economic and operational disruptions in the weeks ahead.
Impact
- Data Theft
- DDoS
- Gain Access
- Financial Loss
Remediation
- Segment operational technology (OT) networks from IT networks and the public internet to limit exposure and lateral movement opportunities.
- Immediately update all default usernames and passwords on programmable logic controllers (PLCs), human-machine interfaces (HMIs), and other OT devices.
- Enforce multi-factor authentication (MFA) for remote access to both IT and OT systems wherever possible.
- Conduct regular vulnerability scans to identify exposed OT devices and promptly remediate any discovered vulnerabilities.
- Use firewalls to strictly control traffic to and from OT networks, only allowing necessary communication through specific IPs and ports.
- Deploy intrusion detection and network monitoring systems to detect abnormal patterns, especially on ports associated with industrial protocols (e.g., Modbus, DNP3).
- Ensure all devices, especially those in critical infrastructure, are updated with the latest firmware and security patches from vendors.
- Create a comprehensive incident response plan tailored to OT attacks and regularly conduct drills simulating DDoS and intrusion scenarios.
- Ensure third-party access to OT environments is tightly controlled and monitored, with least privilege principles enforced.
- Train employees and administrators on phishing and other social engineering tactics used by state-sponsored groups.
- Maintain offline backups of OT systems and configurations to ensure rapid recovery in the event of sabotage or ransomware.
- Collaborate with federal agencies like CISA and DHS to report incidents and receive timely threat intelligence updates.