CyberAv3ngers: The IRGC Unit Operating Inside US Water and Energy Infrastructure Right Now
Iranian state hackers manipulated live process control logic at US water treatment and energy facilities in March 2026, flooding operators' SCADA screens with falsified sensor readings while adversarial code ran undetected in the background. CyberAv3ngers, the IRGC-CEC unit behind this campaign, is not a criminal extortion group seeking ransom. It is a state-directed sabotage capability embedded in networks that deliver drinking water and electricity to millions of Americans.
The CyberAv3ngers IRGC critical infrastructure attack escalated within 72 hours of Operation Epic Fury, the coordinated US-Israeli military campaign that struck Iranian nuclear facilities on February 28, 2026. On April 7, 2026, CISA issued joint advisory AA26-097A alongside the FBI, NSA, EPA, Department of Energy, and US Cyber Command, confirming active exploitation of internet-exposed Rockwell Automation programmable logic controllers across government, water, and energy sectors. Censys identified 5,219 Rockwell Automation/Allen-Bradley devices globally responding to EtherNet/IP protocols, with 74.6 percent located in the United States.
The threat is not theoretical. CyberAv3ngers previously disrupted the Municipal Water Authority of Aliquippa, Pennsylvania, and left Irish residents without running water for days. In 2026, the group shifted to Rockwell Automation Logix controllers, exploiting CVE-2021-22681, a CVSS 9.8 authentication bypass that lets attackers connect to PLCs without valid credentials by intercepting a single cryptographic key. Every OT team managing internet-facing industrial control systems in water, energy, or government sectors should treat advisory AA26-097A as an active incident requiring immediate response.
Who Is CyberAv3ngers? Origin, Attribution, and IRGC Command
CyberAv3ngers is a state-directed cyber threat group operated by the Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC), Iran's military cyber arm. Despite presenting publicly as a hacktivist collective motivated by anti-Israel ideology, CISA, the US Treasury Department, and Mandiant have all confirmed that named IRGC military officers direct its operations. The group is not an independent activist network. It is a formally commanded military unit.
The group is tracked across the security industry under multiple designations: Storm-0784 by Microsoft, Bauxite by Dragos, Hydro Kitten and UNC5691 by Mandiant, and G1027 by MITRE ATT&CK. This naming fragmentation reflects the group's deliberate operational security practices. It uses separate infrastructure and personas for different target categories, making cross-vendor attribution harder.
In February 2024, the US Treasury Department's Office of Foreign Assets Control sanctioned six named IRGC-CEC officials for directing CyberAv3ngers operations: Hamid Reza Lashgarian, the head of IRGC-CEC and an IRGC-Qods Force commander; Hamid Homayunfal; Mahdi Lashgarian; Milad Mansuri; Mohammad Amin Saberian; and Mohammad Bagher Shirinkar. The sanctions confirm that this is a formally structured military operation with identified command officers, not a loosely affiliated hacktivist collective.
Active since at least 2020, CyberAv3ngers spent its early years conducting DDoS campaigns and defacements against Israeli targets. By late 2023, the group pivoted to targeting operational technology assets, an escalation analysts attribute to deliberate capability building rather than opportunism. The CyberAv3ngers IRGC critical infrastructure attack pattern has continued to mature through 2026, with the group now demonstrating the ability to alter physical process control logic while keeping operators blind to the change.
How Does the CyberAv3ngers ICS Attack Work?
The CyberAv3ngers attack chain against Rockwell Automation PLCs follows a multi-stage process that begins with network reconnaissance and ends with manipulation of physical process control logic, all while feeding operators false readings on their SCADA displays.
Initial access relies on CVE-2021-22681 (CVSS 9.8), a critical authentication bypass affecting Rockwell Automation Studio 5000 Logix Designer and multiple Logix controller families including ControlLogix, CompactLogix, FlexLogix, DriveLogix, and SoftLogix. The vulnerability allows any attacker who intercepts a single EtherNet/IP session cryptographic key to authenticate to an affected PLC without valid credentials. Combined with the 5,219 internet-facing Rockwell devices identified by Censys, the access problem is solved by default misconfiguration, not novel exploitation.
Once connected, actors use Rockwell Automation's own engineering software, Studio 5000 Logix Designer, to extract and modify PLC project files. These files define how the controller manages physical equipment: pump speeds, valve positions, chemical dosing rates, and flow sensor thresholds. After modification, the altered project files are re-deployed to the PLC. The HMI and SCADA display layer is then separately manipulated to show operators normal readings while the adversarial logic runs beneath.
For persistence, CyberAv3ngers deploys Dropbear SSH software on port 22 of the compromised PLC endpoint, establishing a covert command-and-control channel. Ongoing communication leverages EtherNet/IP on ports 44818 and 2222, Modbus TCP on port 502, and in confirmed variants, MQTT over TLS on port 8883. The combination of a stealthy C2 channel, falsified display data, and modified control logic makes detection through operator observation alone impossible.
This technique, silently modifying control logic while masking the change from operators, is what distinguishes CyberAv3ngers from simpler hacktivist-grade disruption. It is the same class of capability previously associated only with Sandworm's attacks on Ukrainian electrical infrastructure.
External Reconnaissance
CyberAv3ngers enumerates internet-facing EtherNet/IP services on ports 44818 and 2222, identifying Rockwell Automation PLCs by their banner responses using Shodan-style scanning (MITRE T1590).
Initial Access via CVE-2021-22681
The group intercepts a single session cryptographic key from unprotected EtherNet/IP traffic, using the CVSS 9.8 authentication bypass to connect to the target PLC with Studio 5000 Logix Designer as an authorized engineer (T0819).
PLC Project File Modification
Actors extract the PLC project file defining all control logic, modify pump schedules, valve positions, dosing rates, and sensor thresholds, then re-deploy the altered file to the controller (T0889).
HMI and SCADA Display Manipulation
The group alters HMI display values to show operators normal readings while adversarial logic executes. Physical systems respond to the modified program; operators see falsified data (T0832).
Persistence via Dropbear SSH Backdoor
CyberAv3ngers deploys Dropbear SSH on port 22 of the compromised PLC, establishing a persistent C2 channel that survives controller restarts and power cycles (T1133).
Briefings like this, every morning before 9am.
Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.
Operation Epic Fury and the 2026 Infrastructure Campaign
On February 28, 2026, the United States and Israel launched Operation Epic Fury, a coordinated military campaign targeting Iranian nuclear facilities, IRGC leadership, and government infrastructure. US Cyber Command operated as first mover, with cyber operations preceding kinetic strikes. Israel simultaneously executed what analysts described as the largest cyberattack in history, collapsing Iran's internet connectivity to between 1 and 4 percent of normal levels.
CyberAv3ngers doubled its operational tempo within 72 hours of the first strikes, escalating attacks across all documented victim sectors simultaneously. This surge was not coincidental. Iranian state doctrine explicitly treats cyberattacks on critical infrastructure as an instrument of retaliation below the kinetic threshold, designed to impose costs on adversary societies without triggering direct military escalation.
"Iranian threat actor groups are actively conducting or preparing retaliatory cyber operations across all sectors documented in prior CISA advisories," reads joint advisory AA26-097A. "Organizations operating internet-exposed industrial control systems must treat this advisory as requiring immediate action, not scheduled remediation."
The April 7 advisory was joint-signed by six federal agencies: the FBI, CISA, NSA, EPA, Department of Energy, and US Cyber Command. Six-agency joint advisories are exceptionally rare and signal a confirmed, active, government-wide threat rather than a precautionary warning.
Beyond CyberAv3ngers, intelligence assessments confirm that APT34, APT35, APT42, MuddyWater, and Agrius are also conducting or preparing retaliatory operations following Operation Epic Fury. The threat to US critical infrastructure in this period is not a single-actor campaign. It is a coordinated multi-group response by Iran's entire cyber apparatus. Stay current on the latest CISA KEV additions through the weekly threat roundup covering Ivanti EPMM and other actively exploited vulnerabilities.
“Iranian threat actor groups are actively conducting or preparing retaliatory cyber operations across all sectors documented in prior CISA advisories. Organizations operating internet-exposed industrial control systems must treat this advisory as requiring immediate action, not scheduled remediation.”
CISA Joint Advisory AA26-097A, April 7, 2026 -- FBI, CISA, NSA, EPA, DOE, US Cyber Command
Which Sectors and Assets Does CyberAv3ngers Target?
CyberAv3ngers prioritizes three critical infrastructure sectors in its 2026 campaign: water and wastewater systems, energy generation and fuel distribution, and government facilities. These sectors were selected for their potential to cause visible service disruption and public anxiety, consistent with a strategy of imposing psychological costs alongside physical ones.
The targeting footprint extends internationally. Prior confirmed victims include the Municipal Water Authority of Aliquippa, Pennsylvania, where a CyberAv3ngers-compromised PLC was reachable from the open internet with no authentication gateway. A separate 2023 campaign disrupted water service to County Mayo, Ireland, for multiple days after the group compromised a treatment station. In 2026, confirmed victims experienced operational disruption and financial loss across all three target sectors.
The device exposure problem is structural. Of the 5,219 globally exposed Rockwell Automation/Allen-Bradley hosts identified by Censys, 74.6 percent are in the United States. Targeted device types include CompactLogix and Micro850 PLC families, both widely deployed in water treatment, chemical injection, and energy distribution applications. The Micro850 is common in smaller municipal water utilities that lack dedicated OT security teams, making them disproportionately vulnerable.
The group does not exclusively target large utilities. Small and medium municipal water systems, rural electric cooperatives, and government HVAC control systems have all appeared in the victim profile. Any organization running internet-reachable Rockwell Automation PLCs without authentication enforcement should treat itself as a current target.
Critical infrastructure operators should note that isolation does not guarantee safety if engineering workstations connect to both corporate and OT networks. The same IT/OT segmentation discipline that protects against ransomware operators targeting OT environments applies directly to CyberAv3ngers.
CyberAv3ngers TTPs Mapped to MITRE ATT&CK ICS Framework
CyberAv3ngers maps across multiple MITRE ATT&CK for ICS techniques. The group's documented TTP chain begins with external reconnaissance targeting internet-exposed EtherNet/IP services (T1590, Gather Victim Network Information) and moves to exploitation of public-facing ICS interfaces (T0819, Exploit Public-Facing Application).
Initial access is established through the CVE-2021-22681 session key interception technique, which maps to T1078 (Valid Accounts) and its ICS equivalent T0859. Persistence is maintained by deploying Dropbear SSH to OT endpoints (T1133, External Remote Services) and by modifying PLC project files to ensure malicious logic survives controller restarts (T0889, Modify Program).
Lateral movement within OT environments follows native communication protocols: EtherNet/IP for Logix controller communication and Modbus TCP for legacy devices (T0885, Commonly Used Port in ICS context). The primary impact techniques are data manipulation and confirmed modification of HMI display values to mask adversarial control logic from operators (T0832, Manipulation of View; T0831, Manipulation of Control).
The combination of T0832 and T0889, display manipulation paired with control logic modification, is what makes CyberAv3ngers technically distinct from most ICS threat actors. Many groups can disrupt operations through destructive wiper deployment or denial-of-service. CyberAv3ngers demonstrates sustained undetected modification while keeping operators blind, a level of OT tradecraft previously associated only with Sandworm's attacks on Ukrainian power grids rather than a group that originated as a hacktivist persona four years ago.
This capability escalation from hacktivist defacement to ICS manipulation in under four years should inform every OT security team's threat model for state-affiliated actors operating at the lower end of formal military hierarchy.
Indicators of Compromise from CISA Advisory AA26-097A
CISA advisory AA26-097A provides the authoritative IOC list for this campaign. Every organization operating Rockwell Automation PLCs should ingest those indicators into SIEM and firewall platforms without delay. The behavioral and network signatures below represent what defenders can detect and act on immediately.
Network-layer indicators: CyberAv3ngers communicates with targeted PLCs via EtherNet/IP on TCP ports 44818 and 2222, Modbus TCP on port 502, and SSH on port 22. Any SSH connection to a PLC or OT endpoint that should not have SSH enabled is a high-confidence indicator of compromise. MQTT over TLS on port 8883 from OT network segments is an additional C2 channel indicator confirmed in assessed campaign variants.
Host-level indicators: The presence of the Dropbear SSH binary on any PLC or OT controller constitutes a confirmed compromise indicator. Studio 5000 Logix Designer connections from unfamiliar or overseas IP address ranges, particularly during off-hours, warrant immediate investigation. Unexpected modification timestamps on PLC project files stored in backup repositories are a retrospective indicator that control logic may have been altered without authorization.
The group uses overseas-based leased hosting infrastructure rather than direct Iranian IP space. Geo-blocking alone will not stop these connections because upstream providers span multiple jurisdictions. Detection must rely on behavioral analysis: connections from IPs that have never previously authenticated to these PLCs, connection volumes inconsistent with normal engineering activity, and SSH process spawning from PLC firmware contexts where SSH was never installed.
Cross-reference the full IOC list from CISA AA26-097A at https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a against firewall logs, Zeek and Suricata alerts, and network flow data for the period from March 1, 2026 to present.
Subscribe to unlock Indicators of Compromise
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
How to Detect and Stop CyberAv3ngers in Your OT Environment
The CyberAv3ngers IRGC critical infrastructure attack succeeds primarily because of internet-exposed OT assets with no authentication enforcement, not because of sophisticated zero-day development. The largest exposure can be closed with configuration changes and network isolation before new tooling is required.
The steps below reflect CISA advisory AA26-097A recommendations, Dragos OT threat guidance, and network monitoring best practices for Rockwell Automation environments. The advisory was issued six weeks ago. Federal agency remediation deadlines have already passed. Private sector operators should treat these steps as overdue, not pending.
Subscribe to unlock Remediation & Mitigation steps
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
The bottom line
The CyberAv3ngers IRGC critical infrastructure attack is confirmed active, not a future scenario. A CISA joint advisory signed by six federal agencies in April 2026 documents exploitation of 5,219 exposed Rockwell PLCs, with US facilities representing 74.6 percent of the target pool. Three key takeaways: the group uses the operator's own engineering software to alter control logic while feeding false readings to SCADA displays, making operator visual inspection useless for detection; CVE-2021-22681 with a CVSS of 9.8 remains exploitable on thousands of unpatched devices; and the attack requires no credentials, only a reachable PLC endpoint. Firewall every internet-exposed PLC in your environment before end of day.
Frequently asked questions
Who is CyberAv3ngers?
CyberAv3ngers is an Iranian state-directed cyber threat group operated by the Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC). The group presents publicly as a hacktivist collective but is formally commanded by named IRGC military officers, six of whom were sanctioned by US Treasury OFAC in February 2024. The group is tracked as Storm-0784 by Microsoft, Bauxite by Dragos, Hydro Kitten and UNC5691 by Mandiant, and G1027 by MITRE ATT&CK. It has been active since at least 2020.
What TTPs does CyberAv3ngers use?
CyberAv3ngers gains initial access by exploiting CVE-2021-22681, a CVSS 9.8 authentication bypass in Rockwell Automation controllers that requires only a single intercepted session key. The group then uses Rockwell's own Studio 5000 Logix Designer to modify PLC project files, deploys Dropbear SSH for persistent C2 access, and separately manipulates HMI display values to mask adversarial control logic from operators. Communication channels include EtherNet/IP, Modbus TCP, SSH, and MQTT over TLS.
Which sectors does CyberAv3ngers target?
CyberAv3ngers targets water and wastewater systems, energy generation and fuel distribution, and government facilities. The 2026 campaign expanded to all three sectors simultaneously following Operation Epic Fury. Prior confirmed victims include the Municipal Water Authority of Aliquippa, Pennsylvania, and water treatment infrastructure in County Mayo, Ireland. The group targets both large utilities and small municipal water systems with internet-exposed PLCs.
How do I detect CyberAv3ngers activity in my OT environment?
Detection requires network monitoring at the OT boundary, not endpoint agents. Alert on any SSH traffic to PLC endpoints, EtherNet/IP connections from first-seen IP addresses, and MQTT over TLS traffic from OT network segments. Check every PLC host for the Dropbear SSH binary on port 22. Compare current PLC project files against verified offline backups to detect silent control logic modification. Operator visual inspection of SCADA displays cannot be trusted because the group manipulates HMI values to show false readings.
Has CyberAv3ngers been indicted or sanctioned?
Yes, sanctioned but not indicted with attached arrest warrants as of May 2026. The US Treasury Department's OFAC sanctioned six IRGC-CEC officials in February 2024: Hamid Reza Lashgarian (IRGC-CEC head and IRGC-Qods Force commander), Hamid Homayunfal, Mahdi Lashgarian, Milad Mansuri, Mohammad Amin Saberian, and Mohammad Bagher Shirinkar. Criminal indictments have not been publicly filed, reflecting the diplomatic complexity of pursuing active IRGC officers through the US justice system.
What is CVE-2021-22681 and is my Rockwell PLC vulnerable?
CVE-2021-22681 is a critical authentication bypass in Rockwell Automation Studio 5000 Logix Designer and multiple Logix controller families, rated CVSS 9.8. The flaw allows an attacker who intercepts a single EtherNet/IP session cryptographic key to authenticate to a targeted PLC without any valid credentials. Affected products include ControlLogix, CompactLogix, FlexLogix, DriveLogix, and SoftLogix. If your PLC runs an unpatched firmware version and is reachable from the internet or an untrusted network, it is vulnerable and should be treated as a priority remediation target.
How is CyberAv3ngers different from ransomware groups?
CyberAv3ngers does not deploy ransomware or seek financial payment. Its objective is operational disruption and infrastructure sabotage as an instrument of Iranian state retaliation policy. Unlike ransomware operators who announce their presence via encryption notifications, CyberAv3ngers modifies control logic silently while displaying false readings to operators, prioritizing undetected persistence over immediate impact. This makes detection significantly harder and incident response more complex than standard ransomware scenarios.
What should water utility operators do immediately?
Remove all internet exposure from PLC endpoints today by placing them behind a firewall with no inbound internet routing. Apply patches for CVE-2021-22681 to all Rockwell Automation Logix controllers. Check every OT endpoint for Dropbear SSH on port 22 and treat any positive result as a confirmed compromise. Download CISA advisory AA26-097A, ingest all listed IOCs into your SIEM, and compare current PLC project files against verified offline backups to confirm control logic integrity. Do not rely on SCADA display readings to verify system state.
Sources & references
- CISA Advisory AA26-097A — Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
- The Hacker News — Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks
- MITRE ATT&CK — CyberAv3ngers (G1027)
- Tenable — CyberAv3ngers FAQ: Iran-Linked Threat Group Targeting US Critical Infrastructure
- SecurityWeek — Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks
Free resources
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.
Ransomware Incident Response Playbook
Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
The Mythos Brief is free.
AI that finds 27-year-old zero-days. What it means for your security program.
