Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsInfrastructure:Electric,Gas & WaterGovernment: Federal, State and Local

Iranian-Linked Cyber Actors Target US Critical Infrastructure, Security Leaders Respond

By Jordyn Alger, Managing Editor
Power lines
Yuan Yang via Unsplash
April 8, 2026

The Cybersecurity & Infrastructure Security Agency (CISA) has issued a warning that cyber actors connected with Iran are focusing cyberattacks on United States critical infrastructure. Sectors of focus include: 

  • Water and wastewater systems (WWS) 
  • Energy
  • Government facilities and services 

With the news that Iranian-associated cyber actors are targeting critical infrastructure in the U.S., security experts are sharing their insights. 

Security Leaders Weigh In

Bradley Smith, SVP, Deputy CISO at BeyondTrust:

The Iranian cyber proxy ecosystem is not waiting for an escalation trigger — it is already operating at a wartime tempo. BeyondTrust has been tracking this activity since the early hours of Operation Epic Fury and sharing threat intelligence with our customers to support defensive preparation. What we have assessed is that the operational preparation phase for multiple Iran-aligned actors was complete before the first strikes landed on February 28. Tools were staged, reconnaissance was reported, and targets were identified. The threat now is not that these groups will activate — it is that strikes against civilian infrastructure will remove any remaining restraint on target selection and destructive intent.

The effectiveness of these operations has increased in both quality and scale compared to previous Iranian cyber campaigns. A significant contributing factor is the documented use of AI-enhanced social engineering by groups such as APT42, which has degraded the reliability of traditional detection indicators. Phishing lures and credential harvesting operations are more convincing, more scalable, and harder to distinguish from legitimate communications than in any prior campaign cycle we have tracked. This is compounding an already elevated risk to identity infrastructure, where a single compromised credential can provide an adversary the foothold needed to move laterally into critical systems.

There has already been confirmed operational impact to global supply chain entities from attributed Iranian threat actor activity — including the wiper attack against medical technology firm Stryker — in the weeks since the conflict began. This includes disruptive and destructive operations targeting technology vendors, remote access infrastructure, and upstream service providers that organizations depend on but may not directly control. The elimination of Iran's senior leadership has not neutralized its cyber offensive capability — our assessment is that it has decentralized it, shifting execution authority to a pre-positioned proxy ecosystem that is now operating with both the motivation and the autonomy to escalate. If strikes expand to civilian infrastructure such as power plants, bridges, and water treatment facilities, organizations should expect the targeting aperture for cyber operations to widen correspondingly — critical infrastructure, financial systems, cloud providers, and identity platforms are all within the assessed target set.

Louis Eichenbaum, Federal CTO at ColorTokens:

Based on current U.S. military actions involving Iran, there is a high likelihood of continued retaliatory cyber activity from Iranian state actors and affiliated proxy groups aimed at causing widespread disruption and executing targeted intrusions. These operations will likely leverage proven, opportunistic techniques, including phishing campaigns that enable credential theft and account takeover, exploitation of unpatched edge devices such as VPNs and firewalls, distributed denial-of-service attacks against public-facing services, and hack-and-leak or extortion campaigns designed to drive both operational and reputational impact. There is also a credible risk of opportunistic compromise of exposed operational technology and industrial control systems, particularly where those systems remain accessible from the internet.

Based on prior activity, priority targets are expected to include critical infrastructure sectors such as energy, water, transportation, and telecommunications, along with the defense industrial base, federal contractors, and government mission-support systems. Organizations operating exposed OT environments or maintaining weak remote access controls are especially vulnerable, and executives’ and employees’ personal accounts are likely to be targeted as initial entry points to enable broader compromise.

These actors will continue to exploit well-known and frequently targeted weaknesses, including internet-exposed PLCs and OT management interfaces, weak or absent multi-factor authentication, particularly for privileged and remote access, unpatched known exploited vulnerabilities in edge infrastructure, and common identity risks such as credential reuse and password spraying. Limited visibility into east-west traffic and lateral movement within networks further increases the likelihood that a small initial foothold can escalate into significant operational impact.

In this environment, organizations must take immediate steps to reduce exposure and strengthen resilience. This includes removing or tightly restricting internet access to OT and ICS systems, enforcing phishing-resistant multi-factor authentication, and implementing granular microsegmentation within these environments to prevent an adversary from leveraging a compromised endpoint to move laterally and reach critical assets.

Shane Barney, Chief Information Security Officer at Keeper Security: 

The recent wave of cyber activity targeting critical infrastructure in Western democracies is part of a broader shift in how conflict is playing out in the modern world. Cyberattacks are no longer separate from geopolitical events, they are increasingly used alongside them to create pressure, disrupt essential services and influence outcomes without the need for physical confrontation.

Recent reports and warnings of nation state activity targeting Industrial Control Systems (ICS) highlight a structural reality that security teams have been grappling with for years: the convergence of IT and operational technology has eliminated any meaningful separation between digital access and physical impact.

These attacks are not defined by novel exploitation techniques, but by the systematic identification and abuse of exposed systems, weak identity controls and persistent access pathways. Internet-facing management tools, particularly those tied to legacy or poorly segmented environments, create a predictable attack surface. When combined with automated scanning and AI-assisted reconnaissance, threat actors can continuously probe global infrastructure at scale, identifying misconfigurations in minutes rather than months.

The more significant issue is what happens after gaining initial access. Once a foothold is established, lateral movement becomes the primary objective. Attackers harvest credentials, escalate privileges and move toward core systems where operational disruption becomes possible. In environments where privileged access is poorly governed or insufficiently monitored, this activity can remain undetected long enough to create material impact.

This reinforces a critical shift in defensive strategy, where identity is now the primary control plane. Hardware-level protections and network segmentation remain important, but they are insufficient if identity systems allow unauthorized or persistent access. If an attacker can authenticate, they can often operate as a legitimate user, bypassing traditional security controls entirely.

Organizations must respond by eliminating standing privilege and enforcing strict access governance across both IT and OT environments. Zero standing privilege models, where access is granted just-in-time and revoked immediately after use, significantly reduce the risk of credential reuse. Privileged access must be continuously verified, fully audited and tightly scoped to specific tasks.

Equally important is the ability to monitor and intervene in real time. Unified visibility across privileged sessions allows security teams to detect anomalous behavior and terminate sessions before changes are made to critical systems. Without this level of control, attackers can operate with persistence and precision inside trusted environments.

Organizations must adopt a mindset which assumes that compromise is inevitable. The focus must shift from prevention alone to containment. Enforcing least-privilege access, segmenting identity domains, rotating and vaulting credentials and applying continuous validation across all users and devices are essential steps in limiting the blast radius of any intrusion.

Threat actors will continue to test adjacent systems, vendors and supply chain partners to identify the most efficient path to access. Security strategies must therefore extend beyond the enterprise perimeter to include third-party identities — both machine and human — and access pathways. The organizations best positioned to withstand this evolving threat landscape will be those that treat identity as the modern perimeter, enforce disciplined access controls and design systems that can contain and recover from compromise without cascading operational impact.

Morey Haber, Chief Security Advisor at BeyondTrust: 

The moment kinetic threats target civilian infrastructure; cyber retaliation becomes not just probable, but an inevitable outcome. Cyber warfare is a vehicle for retaliation no matter how you perceive the conflict. Donald Trump signaling escalation against Iran shifts the battlefield into this asymmetric domain where Iran and their supporters have just as much experience in cyberattacks as any other group in the world. Groups aligned with Iran have consistently leveraged identity attack vectors, distributed denial of service, and destructive wiper campaigns to create disruption without direct attribution.

For organizations the risk from kinetic munitions and destructive cyberattacks. Ransomware and other financial attacks like double extortion will take a back seat while this life and death situation plays out. Unfortunately, if this conflict continues to escalate, the world should expect attacks, not only against critical infrastructure, but also financial systems, supply chains, and cloud providers both electronically and physically. Cyberattacks will not mirror military precision, however. They will exploit weakest links, especially identity, where one compromised credential can cascade into a systemic shock once the adversary has an electronic beach head into an environment.

In this security professionals opinion, I hope we can avoid the potential risks of full blown cyber warfare. 

KEYWORDS: CISA critical infrastructure critical infrastructure cybersecurity cyber warfare national security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

Police lights

Security Team Member Dies in Standoff with Dallas Police

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Iranian flag

    Iranian Cyber Actors May Target “Entities of Interest” in US, Warns CISA

    See More
  • Computer screen with coding in colored text

    Iranian cyber actors are targeting critical infrastructure entities

    See More
  • Laptop with green text

    Security Leaders Respond to Workday Cyber Incident

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing