WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships OT/ICS Threat Awareness – IOCONTROL and Adroxgh0st Malware Target Critical Infrastructure
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

OT/ICS Threat Awareness – IOCONTROL and Adroxgh0st Malware Target Critical Infrastructure

Author: Chase Snow

Created: Thursday, December 12, 2024 - 12:44

Categories: Cybersecurity, OT-ICS Security, Security Preparedness

Researchers from Claroty’s Team82 have provided information about the custom-built IoT/OT malware called IOCONTROL which has been used by Iran-affiliated threat actors to attack Israel and U.S.-based OT/IoT devices. The same group, known as the CyberAv3ngers, was also believed to be responsible for the Unitronics attack last fall on water treatment facilities in the U.S. and Israel. Team82’s report includes an in-depth look at the malware’s capabilities and unique communication channels.

Additionally, cybersecurity firm Check Point recently released their Global Threat Index for November 2024, which highlights the rapid rise of Androxgh0st malware and its integration with the Mozi botnet – a botnet that commonly exploits vulnerabilities in consumer-grade IoT devices such as routers, security cameras, and other network devices. The combination poses a significant threat to critical infrastructure globally.

WaterISAC is sharing these threats for member awareness of current malware and threat actor capabilities that pose a significant threat to the water sector. Members are encouraged to familiarize themselves with the threats and to review the top exploited vulnerabilities related to Androxgh0st malware shared by Check Point, and the indicators of compromise (IOCs) shared by Team82. For more information visit Claroty and Check Point.

Additional Resource:

  • Androxgh0st Malware Continues Targeting IoT Devices and Critical Infrastructure | IT Security Guru

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar