WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP:CLEAR) Joint Cybersecurity Advisory Update – Nation-State Cyber Actors Exploit PLCs in Multiple Sectors, Including US Water and Wastewater Systems Facilities
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) Joint Cybersecurity Advisory Update – Nation-State Cyber Actors Exploit PLCs in Multiple Sectors, Including US Water and Wastewater Systems Facilities

Author: Chase Snow

Created: Thursday, December 19, 2024 - 14:40

Categories: Cybersecurity, General Security and Resilience, OT-ICS Security

Yesterday, CISA and other federal and international partners released notable updates to the Joint Cybersecurity Advisory (CSA) “IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including US Water and Wastewater Systems Facilities” originally published December 1, 2023. See WaterISACs original analysis of this joint CSA.

Due to the risk IRGC-affiliated actors pose to the water sector, members are urged to review the updated advisory and the newly observed TTPs employed by IRGC-affiliated actors. In November last year, the Municipal Water Authority of Aliquippa was attacked by the Iranian-backed cyber group known as CyberAv3ngers who exploited vulnerabilities in Israeli-made Unitronics PLCs and were reportedly able to gain control of a remote booster station serving two townships. Numerous other water and wastewater utilities were attacked as well, which WaterISAC tracked in its Quarterly Water Sector Incident Summary reports.

The joint agencies are releasing this updated joint advisory to warn network defenders of continued malicious cyber activity by IRGC-affiliated APT cyber actors. This joint advisory provides TTPs obtained from extensive FBI investigation on this activity.

Notable updates to the advisory include:

  • New information on the extent of the activity, including newly observed TTPs employed by IRGC-affiliated APT cyber actors targeting U.S. and global critical infrastructure.
  • Mapping of these newly observed TTPs to additional MITRE ATT&CK® Tactics and Techniques.
  • New recommended mitigations that organizations should take to protect their infrastructure, based on the new TTPs.

Access the full joint advisory at CISA.

Additional Resources:

  • WaterISAC Advisory: (TLP:CLEAR) CISA and Partners Confirm Additional Activity into Exploitation of Unitronics PLCs Across the U.S. Water and Wastewater Sector
  • Update to Unitronics PLC Targeting Activity
  • (TLP:CLEAR) Water Utility Control System Cyber Incident Advisory: ICS/SCADA Incident at Municipal Water Authority of Aliquippa (Updated November 30, 2023)

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar