The hackers behind recent cyberattacks targeting industrial control systems at water facilities in the US are affiliated with the Iranian government, according to security agencies in the United States and Israel.
The FBI, CISA, the NSA, the EPA and Israel's National Cyber Directorate on Friday published a joint advisory focusing on the threat actor responsible for the recent attack on the Municipal Water Authority of Aliquippa in Pennsylvania.
The hackers, calling themselves Cyber Av3ngers, compromised an ICS associated with a booster station that monitors and regulates water pressure, but the water facility said there was no risk to the water supply or drinking water.
The threat actor targeted a Unitronics Vision series programmable logic controller with an integrated human-machine interface.
Unitronics is an Israel-based company and its products are used not only in the water and wastewater systems sector, but also in industries such as energy, healthcare, and food and beverage manufacturing.
In some cases, the PLCs may be rebranded and appear to have been made by other companies.
In the weeks prior to attacking the Aliquippa water utility, Cyber Av3ngers targeted ICS at water, energy, shipping, and distribution organizations in Israel.
Some of their claims turned out to be false.
Since the Israel-Hamas conflict escalated on October 7, they claimed to have breached the systems of many water treatment stations in Israel.
In the case of the Aliquippa facility attack, they claimed to have targeted the PLC because it was made by an Israeli company.
While Cyber Av3ngers claims to be a hacktivist group, CISA, the FBI and the other agencies said it's actually a persona used by cyber actors affiliated with the Iranian Government Islamic Revolutionary Guard Corps.
The Cyber Av3ngers persona, previously described as a pro-Iran threat group, has been used to target Israeli entities since 2020.
The agencies said IRGC-affiliated threat actors targeted multiple US water sector facilities that rely on Unitronics Vision PLCs since November 22.
Unitronics PLCs have been known to be affected by critical vulnerabilities that could expose them to attacks.
In the recent attacks, the devices were likely compromised because they were exposed to the internet on the default port and were protected by default passwords.
Once they compromised the devices, the hackers defaced their user interface, which could make the PLC inoperable.
A Shodan search shows that roughly 1,800 Unitronics PLCs located around the world are exposed to the internet, including a few hundred like the one targeted in the Aliquippa attack.
Regarding Cyber Av3ngers' recent public statements, John Hultquist, chief analyst at Google Cloud's Mandiant Intelligence, said the group has a long history of publicly exaggerating superficial intrusions, claiming significant access to critical infrastructure.
The advisory released by the security agencies provides indicators of compromise and tactics, techniques, and procedures associated with Iranian cyber operations, as well as recommendations for defenders and device manufacturers.
This Cyber News was published on www.securityweek.com. Publication date: Mon, 04 Dec 2023 13:43:04 +0000