Iran-linked hackers breached US water and energy sites by exploiting default passwords on Israeli-made industrial control systems, forcing facilities to run manually.
The campaign is a major escalation, as hackers tested critical safety systems designed to protect human life, a rare and dangerous line to cross.
Federal agencies have issued an urgent advisory for organizations to secure their systems by changing passwords, using MFA, and isolating controllers from the internet.

Atlas AI
US federal agencies have issued an urgent cyber alert after confirming that Iran-linked hackers successfully accessed multiple critical infrastructure sites in the United States, including facilities tied to water and energy. The warning was released jointly by the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the National Security Agency (NSA).
Officials said the activity is being linked to the wider Israel-Hamas conflict, underscoring how geopolitical tensions can spill into digital operations that support daily life and industrial activity.
According to the advisory, the intrusions involved industrial control systems (ICS), which are used to run and monitor physical processes. Investigators said the threat actors exploited vulnerabilities in specific ICS components to gain access and trigger operational disruptions. The advisory described the campaign as a notable escalation because it connects cyber intrusions to a live international conflict while targeting systems that underpin essential services.
Officials attributed the activity to a group identifying itself as “CyberAv3ngers.” The advisory said the hackers focused on Israeli-made Unitronics Vision series programmable logic controllers (PLCs). These PLCs are commonly deployed in water and wastewater environments to automate tasks such as tracking water pressure and flow, making them a practical target for attackers seeking to interrupt operations without needing to compromise broader corporate networks.
The advisory said the attackers took advantage of weak security practices, including the use of default passwords. In a widely reported incident dated November 25, a water utility in Aliquippa, Pennsylvania, was compromised, and an anti-Israel message appeared on the system interface. Officials said the breaches have not affected the safety of drinking water, but some impacted plants were forced to stop automated processes and move to manual operations.
Those operational shifts created downtime and financial losses for affected companies, according to the advisory. Investigators also said the campaign is especially concerning because the hackers directly tested industrial safety systems. These safeguards are designed to protect human life and prevent severe equipment damage, and officials framed any interference with them as a national security issue.
Sources familiar with the investigation said the hackers also attempted to deploy destructive malware known as “wipers,” which is designed to permanently erase data on infected systems. Officials said this indicated an intent to cause lasting damage beyond short-term disruption. The advisory urged organizations using the affected Unitronics PLCs to take immediate mitigation steps.


