Defending PLCs, Critical Infrastructure from Physical Cyberattacks
3:36
author photo
By Cam Sivesind
Wed | Apr 8, 2026 | 1:44 PM PDT

A new Cybersecurity Advisory (AA26-097a) from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has sent a clear message to the industrial world: the air gap is dead, and our literal "switches" are in the crosshairs.

The advisory details how Iranian-affiliated cyber actors have successfully exploited Programmable Logic Controllers (PLCs) across multiple U.S. critical infrastructure sectors. These intrusions amount to a direct assault on the hardware that manages our water, energy, and manufacturing.

So what does all this escalation mean for the professionals on the front lines and the public they protect?

To understand the gravity of this alert, we must define the target. PLCs are the "brains" of industrial automation. They are small, ruggedized computers that control physical processes—opening a water valve, regulating a turbine's speed, or managing a cooling system.

In the campaign, attackers targeted PLCs that were exposed to the internet, often using default passwords or known vulnerabilities in the administrative web interfaces. By gaining access, the actors were able to disrupt operations, in some cases displaying political messaging on the controller's screen while disabling the physical equipment.

For those charged with protecting the "internal frontier" of Operational Technology (OT), this advisory serves as a strategic blueprint for defense.

Attackers are no longer just looking for high-level IT credentials; they are performing automated reconnaissance for specific industrial hardware. If your PLC has an IP address, it is being scanned.

A recurring theme in this exploit was the use of default manufacturer passwords. Security teams must treat "factory settings" as an active vulnerability.

As we link industrial floors to corporate networks for data-driven insights, we create bridges for attackers to cross. The CISA advisory emphasizes that many compromised PLCs were accessible because of a lack of robust network segmentation.

While most cyberattacks feel invisible—a stolen credit card or a leaked email—attacks on PLCs have the potential for real physical impact.

In the short term, these attacks can cause localized service disruptions, such as water pressure drops or power fluctuations.

Even when physical damage is avoided, these attacks are designed to undermine public trust. Seeing a political message on a water utility's controller screen is a form of "digital graffiti" meant to signal that the basic pillars of society are vulnerable. Call it a psychological attack.

The public should view this as a reminder that cybersecurity is now a component of public safety. Just as we expect fire codes and clean water standards, we must demand that utilities treat cyber hygiene as a foundational safety requirement.

CISA isn't just raising the alarm; they are providing a roadmap for hardening these systems:

  1. Change every default password: This remains the most effective, low-cost defense against the current Iranian campaign.

  2. Implement robust MFA: Even for industrial interfaces, multi-factor authentication is the "gold standard" for stopping credential-based access.

  3. Disconnect from the public web: There is rarely a legitimate business reason for a PLC to be directly accessible from the open internet. Move these assets behind a VPN or a secure firewall with strict access controls.

  4. Audit your shadow OT: Use scanning tools to identify devices on your network that your security team might not even know exist.

Comments