A recent Cybersecurity Advisory (CSA) has issued a warning regarding ongoing exploitation attempts by cyber actors affiliated with the Iranian Islamic Revolutionary Guard Corps (IRGC) utilizing the online alias “CyberAv3ngers.” These actors have been actively targeting and compromising Unitronics Vision Series programmable logic controllers (PLCs), specifically those manufactured by the Israeli company Unitronics.
One of the main areas of concern highlighted by the advisory is the targeting of Water and Wastewater Systems (WWS), which are crucial components of critical infrastructure sectors that have widely adopted these PLCs. Apart from WWS, these PLCs are also used in various other sectors, including the energy industry, food and beverage manufacturing, and healthcare facilities.
The nature of these PLCs being frequently exposed to the internet for remote control and monitoring purposes poses a significant risk. The primary focus of the reported compromise seems to be the user interface (UI) of the PLCs, which could potentially render them inoperable. By gaining unauthorized access to these controllers, the threat actors could disrupt critical processes overseen by the PLCs, leading to potentially severe consequences for the targeted infrastructure.
In response to these ongoing exploitation attempts, the CSA strongly advises organizations utilizing Unitronics Vision Series PLCs to implement a layered cybersecurity approach to mitigate the risks. This includes measures such as network segmentation to isolate PLCs from direct internet connectivity whenever possible. Additionally, if remote access is essential, organizations are urged to utilize secure remote access solutions with multi-factor authentication (MFA) and keep the firmware of PLCs associated with control systems up to date.
Prompt patching of known vulnerabilities is emphasized as a crucial step in reducing the attack surface, along with implementing network segmentation to restrict access to PLCs only to authorized personnel and devices. Strong password enforcement and regular password rotation policies for accounts with access to PLCs are also recommended. Organizations are further encouraged to monitor network activity for any anomalous behavior that may indicate unauthorized access attempts.
By adhering to these proactive defensive measures, organizations can significantly lower the risk of successful compromise by cyber actors affiliated with the IRGC, or any other malicious actors targeting critical infrastructure. It is imperative for businesses and entities relying on these PLCs to remain vigilant and stay ahead of evolving cyber threats to safeguard their operations and data integrity.
In conclusion, addressing cybersecurity vulnerabilities in critical infrastructure components like PLCs is crucial to maintaining operational resilience and protecting against potential cyber threats and disruptions. The collaborative efforts of organizations in adopting robust cybersecurity practices are essential in safeguarding the integrity of critical systems and infrastructure.

