WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships DHS Advisory on Iranian Cyber Activity
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

DHS Advisory on Iranian Cyber Activity

Author: Charles Egli

Created: Tuesday, June 25, 2019 - 15:09

Categories: Cybersecurity

As discussed in an email WaterISAC sent to members on June 24, Chris Krebs, the director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), issued an advisory indicating his agency is aware of “a recent rise in malicious cyber activity directed at United States industries and government agencies by Iranian regime actors and proxies.” Krebs highlighted “destructive ‘wiper’ attacks” as a type of activity these threat actors are using increasingly. One of the most infamous wiper attacks, that against the energy company Saudi Aramco in 2012, is suspected to have been perpetrated by Iranian regime actors. That attack disabled 30,000 workstations and caused significant disruptions to Saudi Aramco’s operations. It is believed the attack began when an employee opened a malicious phishing email, allowing initial entry into the company’s IT network.

As demonstrated by the Shamoon attack, as well as countless other incidents, highly destructive and costly incidents can be enabled by something as simple as an employee clicking on a link or opening a file in an email. To assist organizations with protecting themselves against these tactics, as well as others that may be employed to facilitate attacks, DHS reminds its partners of the following tips and best practices:

  • Avoiding Social Engineering and Phishing Attacks
  • Password Spraying – Brute Force Attacks
  • Choosing and Protecting Passwords
  • Supplementing Passwords

For more best practices, WaterISAC encourages members to consult its recently published 15 Cybersecurity Fundamentals for Water and Wastewater Utilities.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar