Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Did Iran Hack Tank Readers at US Gas Stations? Security Leaders Discuss

By Jordyn Alger, Managing Editor
Gas station
Hans Eiskonen via Unsplash
May 15, 2026

Earlier today, CNN reported that United States officials suspect Iranian actors to be behind the hacking of tank readers at gas stations. This breach impacted systems monitoring the amount of gas in storage tanks and servicing gas stations across the U.S. The automatic tank gauge (ATG) systems were online and without password protection, enabling the hackers to alter the tanks’ display readings, but not the levels of fuel stored inside. 

At this time, no damage or harm has been reported from this incident. However, the CNN report points out that theoretically, the hackers could’ve made a gas leak pass by undetected. 

A lack of forensic evidence may make it impossible to determine for certain who was behind the attack, but Iran’s history of targeting gas tank systems makes the nation a top suspect for U.S. officials. 

If this is the result of an Iranian actor, it serves as a warning for U.S. critical infrastructure operators to bolster their security systems. 

Below, security leaders share their thoughts on the attack, Iran’s potential involvement, and the broader implications. 

Security Leaders Weigh In 

Nick Tausek, Lead Security Automation Architect at Swimlane:

Iranian threat actors tend to look for pressure points, and this target fits that pattern. U.S. systems are appealing because so much of the critical infrastructure is connected, locally operated, and difficult to defend evenly across every site. Gas stations, tank readers, water systems, and industrial controllers may not sound high-profile, but they give attackers a way to turn a technical breach into public confusion and operational stress.

That is the throughline across many of these campaigns. Some are built for spying, while others are meant to disrupt services or shake confidence in the systems people rely on every day. The common thread is exposed operational technology and weak remote access. Security teams need to get ahead of that pattern with defenses that can spot abnormal activity, prioritize alerts, coordinate response, and contain threats quickly before a local incident becomes a wider infrastructure problem.

Kevin Kirkwood, CISO at Exabeam:

This is on the verge of a kinetic cyber attack.

This incident is not really about gas stations. It is a warning that cyberattacks are increasingly targeting real-world infrastructure and operational systems, not just data and applications. As organizations adopt more AI, agents, and digital workers to automate decisions and operations, the risk grows that compromised data or manipulated systems could trigger larger operational disruptions at machine speed. The companies that will be most resilient are those that combine AI governance, operational technology security, strong identity and cryptographic controls, and human oversight into a single integrated security strategy.

The solution is to build security around trust validation rather than assuming systems and data are always reliable. Organizations need better visibility into operational assets, stronger segmentation between IT and operational systems, verification of sensor and telemetry integrity, and governance controls for AI-driven automation. AI systems and digital workers should validate information from multiple sources before taking action, and critical operational decisions should still include human oversight. Over time, resilience will depend on combining cybersecurity, operational technology security, and AI governance into a unified framework designed for autonomous and highly connected environments.

Gabrielle Hempel, Security Operations Strategist at Exabeam:

The next war is going to have large portions that are waged online. You no longer need to “blow something up” kinetically to create instability. The gas station/tank reader angle is especially interesting because it sits in a gray area between nuisance and legitimate disruption. It is disruptive enough to shake civilians and affect public confidence, but falls below the threshold of conventional military escalation, which is exactly why these types of operations are becoming increasingly common. 

The broader trend here is that our geopolitical conflicts are increasingly targeting operational technology and the systems surrounding it. The “soft connective tissue” is often easier to hit than industrial hardware. 

From a defender perspective, this is why the old ways of separating IT and OT security are outdated. If your fuel availability depends on cloud-connected monitoring or remote management, then your attack surface has widened to IT systems as well.

Ross Filipek, CISO at Corsica Technologies:

Gas stations and tank storage systems may not sound like traditional cyber targets, but they sit right at the intersection of economic pressure and public disruption, which makes them very attractive for threat actors. You don’t need to knock out the entire energy sector to create panic. If fuel access slows, storage readings are manipulated, or operators are forced into manual processes, the impact can quickly move from technical inconvenience to real-world operational risk.

The bigger concern is what happens if this activity scales nationally. Fuel distribution depends on trust in automated readings, connected equipment, and timely logistics. If attackers can disrupt that visibility, they can create chaos across supply chains. Operators should be treating these systems as critical infrastructure, not back-office equipment. Around-the-clock monitoring, strong network segmentation, and having tested recovery plans in place is crucial for halting disruption before it becomes widespread.

KEYWORDS: critical infrastructure cybersecurity cyberattack geopolitical geopolitical risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Red laptop

    Cybersecurity leaders discuss Oracle’s second recent hack

    See More
  • International flags

    US declines international AI declaration, security leaders discuss

    See More
  • Monitors with keyboard

    2B Weekly Downloads at Risk: Supply Chain Attack Targets Popular npm Packages, Security Leaders Discuss

    See More

Events

View AllSubmit An Event
  • September 19, 2012

    Oil & Gas Critical Infrastructure & Asset Security Forum 2012

    The Forum will cover security issues related to both offshore and onshore oil and gas arising out of civil unrest, terrorist activities, and a competitive global market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing