Iran-linked hacking campaign exposes vulnerabilities in 4,000 industrial control devices

Iran-linked hacking campaign exposes vulnerabilities in 4,000 industrial control devices

Iranian hackers pose a significant risk to global infrastructure, targeting over 5,000 critical devices, with 3,900 in the U.S., raising alarms about cybersecurity vulnerabilities.

NeboAI I summarize the news with data, figures and context
IN 30 SECONDS

IN 1 SENTENCE

SENTIMENT
Neutral

𒀭
NeboAI is working, please wait...
Preparing detailed analysis
Quick summary completed
Extracting data, figures and quotes...
Identifying key players and context
DETAILED ANALYSIS
SHARE

NeboAI produces automated editions of journalistic texts in the form of summaries and analyses. Its experimental results are based on artificial intelligence. As an AI edition, texts may occasionally contain errors, omissions, incorrect data relationships and other unforeseen inaccuracies. We recommend verifying the content.

Over 5,000 industrial control devices are at risk globally due to Iranian hackers targeting critical infrastructure, with approximately 3,900 located in the United States. A new report by Censys highlights that U.S. government agencies have raised alarms over attempts to compromise infrastructure operators using vulnerabilities in Rockwell Automation's Allen-Bradley programmable logic controllers (PLCs).

According to Censys, the United States holds a staggering 74.6% of the global exposure to these devices, reflecting Rockwell's significant market share in North American industrial automation. Many of these PLCs are connected via cellular modems, indicating their deployment in remote areas, thus creating a vulnerable infrastructure network.

Recent activities by Iran-affiliated hackers have intensified, particularly in the wake of conflicts involving the U.S. and Israel. Some PLCs are also linked through Starlink satellite terminals, complicating monitoring and updates. Censys warns that numerous devices are accessible through standard services like HTTP and VNC, which broadens the attack surface and poses serious risks to operational integrity.

Want to read the full article? Access the original article with all the details.
Read Original Article
TL;DR

This article is an original summary for informational purposes. Image credits and full coverage at the original source. · View Content Policy

Editorial
Editorial Staff

Our editorial team works around the clock to bring you the latest tech news, trends, and insights from the industry. We cover everything from artificial intelligence breakthroughs to startup funding rounds, gadget launches, and cybersecurity threats. Our mission is to keep you informed with accurate, timely, and relevant technology coverage.

Press Enter to search or ESC to close