US Intelligence Warns of Iranian Cyberattacks on Critical Infrastructure

by Sofia Alvarez

U.S. Intelligence agencies have issued an urgent warning to private-sector companies nationwide, alerting them that Iranian actors are conducting cyber operations targeting critical U.S. Infrastructure. According to a joint government notice, this campaign has already resulted in disruptions to essential services, marking a significant escalation in the digital conflict between Tehran and Washington.

The warning comes amid heightening geopolitical tensions, following threats from President Trump to target Iran’s own critical infrastructure, specifically its power plants and bridges, if an agreement is not reached regarding Iranian control over the Strait of Hormuz. Officials suggest the recent surge in cyber activity is likely a retaliatory response to hostilities involving the United States and Israel.

The advisory was issued jointly by a coalition of federal agencies, including the FBI, the National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), the Department of Energy, the Environmental Protection Agency (EPA), and Cyber Command. The collective effort underscores the breadth of the threat, which spans from the electrical grid to the nation’s water supply.

At the center of these attacks is the exploitation of programmable logic controllers (PLCs)—the hardware that manages industrial processes. Specifically, the government notice identifies targets within products by Allen-Bradley, a brand under Rockwell Automation and one of the most widely used industrial automation providers in the U.S.

Threats to Public Health and Water Systems

While many cyberattacks focus on data theft, the current campaign has targeted operational technology (OT) that directly impacts physical safety. The EPA warned that Iranian actors have already disrupted technology used in drinking water and wastewater systems.

Jeffrey A. Hall, the EPA’s assistant administrator for enforcement and compliance assurance, emphasized the severity of these breaches in a statement, noting that “cyberattacks on drinking water and wastewater systems directly threaten public health and community resilience.” Hall warned that a single breach could allow attackers to introduce contaminants into the water supply, damage expensive equipment, or disrupt treatment processes entirely, thereby eroding public trust in basic utilities.

The vulnerability of these systems is a growing concern for local governments. In California, for example, officials have previously scrutinized the resilience of water infrastructure against foreign interference, highlighting the risk that a digital breach could lead to a physical crisis in community water access.

A Pattern of Latent Threats and ‘Backdoors’

For those managing the nation’s energy and communications sectors, Here’s not a new phenomenon, but the sophistication of the attacks is evolving. Experts warn of “latent” attacks, where malware is planted within a system and remains dormant for years, waiting for a specific signal to activate and cause a wide-scale failure.

Ernest Moniz, the former U.S. Secretary of Energy who helped negotiate the 2015 nuclear deal with Iran, expressed concern that the U.S. May already be compromised. “There may already be backdoors, Trojan horses and malware hidden in our infrastructure,” Moniz said, noting the risk of retaliation if the U.S. Follows through on threats to attack Iranian infrastructure.

This fear is rooted in historical precedent. In 2015, Iran-backed hackers successfully accessed data from Calpine Corp., one of California’s largest power producers. The attackers obtained “mission critical” engineering diagrams and credentials, leading U.S. Officials to fear that Tehran could potentially initiate nationwide blackouts.

The Vulnerability of Private Ownership

A complicating factor in the defense of the U.S. Grid is that approximately 85% of critical infrastructure is owned and operated by private companies. This places the primary burden of defense on corporate executives rather than government agencies.

The Vulnerability of Private Ownership

Pedro J. Pizarro, president and CEO of Edison International (the parent company of Southern California Edison), stated that large energy players are currently maintaining an “elevated posture.” His company, like many others, has faced a decade of persistent threats, including recent discoveries of Chinese espionage campaigns—such as Volt Typhoon and Salt Typhoon—which avoided detection for at least three years before being uncovered in 2024.

Eroding Defenses and the ‘Fog of War’

As the threat landscape expands, some officials are concerned that the U.S. Government’s internal capacity to respond is being diminished. Last summer, Director of National Intelligence Tulsi Gabbard announced a 40% cut to her office’s workforce and eliminated the Cyber Threat Intelligence Integration Center, a hub that private sector partners relied on for sharing actionable intelligence.

This reduction in federal oversight comes at a time when other global powers may be watching. Security experts suggest that Russia and China could utilize the “fog of war” created by U.S.-Iran tensions to launch their own strikes against American infrastructure while attention is diverted.

The real-world impact of these vulnerabilities was felt recently in Los Angeles. Last month, the LA Metro transit system was forced to shut down part of its network after discovering unauthorized activity across roughly 1,400 servers. While the agency stated that passenger commute times were not affected, sources indicate that Iran-backed hackers are being investigated as the potential culprits.

Infrastructure Defense Overview

Key Entities and Their Roles in Infrastructure Defense
Organization Primary Role Key Focus Area
CISA Coordination & Warning Private sector alerts and security standards
EPA Public Health Oversight Water and wastewater operational technology
ESCC Industry Collaboration Sharing intelligence between utilities and government
FBI/NSA Intelligence & Attribution Identifying and tracking foreign cyber actors

Despite these risks, some industry leaders remain cautiously optimistic. Tom Fanning, former CEO of Southern Co. And current executive committee chair at the Alliance for Critical Infrastructure, described the Iranian threat as “credible” but stopped short of calling it an existential threat to the entire power system. “Is the United States critical infrastructure prepared to act? I think so,” Fanning said, though he acknowledged the grim reality that “the disappointing guys are already here.”

The immediate next step for affected companies involves implementing the specific mitigation strategies outlined in the joint advisory, with federal agencies continuing to monitor for signs of active “Trojan horse” triggers within the grid. Further updates on the status of the LA Metro investigation and federal funding for CISA are expected as the Department of Homeland Security addresses its current funding hiatus.

We invite readers to share their thoughts and experiences regarding infrastructure security in the comments below.

You may also like

Leave a Comment