Iran Hacked Your Water Plant — The FBI Found Out 14 Months Later

:shield: Iran Hacked Your Water Plant — The FBI Found Out 14 Months Later

They broke into oil refineries, water treatment plants, and manufacturing sites — and the ceasefire won’t stop them

The FBI just warned that Iran-linked hackers disrupted internet-connected systems at U.S. oil, gas, and water facilities. The attacks started in January 2025, ended in March 2026, and caused “operational disruption and financial loss.” The hackers explicitly said they won’t stop — ceasefire or not.

Honestly, I’ve been waiting for this headline for years. Not because I wanted it to happen, but because every security researcher who’s looked at critical infrastructure has been screaming about this exact attack vector since at least 2015. And now we’ve got confirmation: they got in, they caused actual damage, and it took us over a year to even notice.

GIF

🧩 Dumb Mode Dictionary
Term Translation
PLC (Programmable Logic Controller) The mini-computers that control valves, pumps, and motors in factories and utilities — think of them as the brain of industrial equipment
OT (Operational Technology) The physical systems that run power plants, water treatment, and manufacturing — as opposed to IT (the stuff on your desk)
SCADA (Supervisory Control and Data Acquisition) The dashboard software that lets engineers monitor and control industrial processes remotely
HMI (Human-Machine Interface) The touchscreen or display that shows what the machines are doing in real-time
Internet-exposed Connected directly to the public internet without proper security — like leaving your front door open with a “free stuff” sign
🔍 What Actually Happened

The FBI, NSA, Department of Energy, and CISA issued a joint advisory on April 7, 2026 warning that Iran-affiliated hackers successfully breached and disrupted multiple U.S. critical infrastructure sites between January 2025 and March 2026.

What they targeted:

  • Programmable Logic Controllers (PLCs) made by Rockwell Automation/Allen-Bradley
  • SCADA systems used to monitor and control industrial processes
  • Internet-exposed operational technology (OT) devices at oil, gas, and water facilities

What they did:

  • Maliciously altered project files and manipulated data on control displays
  • Forced some facilities to shut down automated processes and operate manually
  • Caused measurable “operational disruption and financial loss”

Who else got hit:

  • Medical device manufacturer Stryker (targeted mid-March 2026)
  • FBI Director Kash Patel’s personal email (leaked a decade of correspondence and travel records)
📊 The Attack Timeline
Date Event
Jan 2025 Iran-linked hackers gain initial access to internet-exposed PLCs at U.S. critical infrastructure sites
Jan-Mar 2026 Ongoing intrusions across oil, gas, and water facilities — attackers alter control files and manipulate SCADA displays
Mar 2026 All compromised access ends (attackers either completed mission or were detected)
Mid-Mar 2026 Stryker medical device manufacturer targeted by Iran-affiliated hackers
Apr 7, 2026 FBI, NSA, DOE, and CISA issue joint cybersecurity advisory warning about the attacks
Apr 8, 2026 Iranian hacker groups publicly state they will not end retaliatory cyberattacks despite two-week U.S.-Iran ceasefire
💬 What the Hackers Said

Honestly, this is the part that gives me chills. Despite the two-week ceasefire between Iran and the U.S.-Israel alliance, Iranian-affiliated hacker groups explicitly stated they would not stop their retaliatory cyberattacks.

From The Hill’s reporting: “Even with the recent two-week ceasefire between Iran and the United States and Israel, hackers backing Tehran say they won’t end their retaliatory cyberattacks.”

Translation: This isn’t about military strategy or diplomatic negotiations. This is about asymmetric warfare — and it doesn’t stop when the missiles do.

⚙️ The Technical Reality

Okay but seriously, let’s talk about what makes this so terrifying from a technical perspective.

PLCs are everywhere. They control:

  • Water treatment plants (the thing that makes your tap water safe to drink)
  • Oil refineries (the thing that turns crude oil into gasoline)
  • Power grids (the thing that keeps your lights on)
  • Food production facilities (the thing that pasteurizes your milk)
  • Natural gas pipelines (the thing that heats your house)

And they’re shockingly vulnerable. Why?

  1. They were never designed for internet connectivity. PLCs were built in the 1970s-1990s when “network security” meant “the building is locked.”
  2. They can’t be patched easily. You can’t just push a Windows Update to a PLC controlling a water treatment plant — it might shut down the entire facility.
  3. They’re often internet-exposed by accident. Some engineer needed remote access during COVID, punched a hole in the firewall, and never closed it.
  4. They run 24/7 for decades. You can’t take them offline to upgrade them without shutting down critical services.

The FBI’s recommended mitigations? “Implement network defenders and multifactor authentication.” Cool. That’s like telling someone their house is on fire and recommending they install smoke detectors.

Cool. Iran Just Proved Nation-States Can Shut Down Your City’s Water Supply. Now What the Hell Do We Do? ಠ_ಠ

Use Case GIF

🛠️ Audit Your Own Critical Infrastructure Exposure

You don’t need to work at a water plant to care about this. If you work at any company with industrial equipment, you can audit your own OT security posture and potentially sell that expertise as a service.

What this looks like: Use Shodan (the search engine for internet-connected devices) to scan for exposed PLCs, SCADA systems, and HMIs. Document what you find. Build a report showing leadership exactly how vulnerable your company is — with screenshots and severity ratings.

:brain: Example: A network engineer in Poland used Shodan to scan his employer’s public IP ranges and discovered 14 exposed Rockwell PLCs controlling HVAC and water systems. He wrote a 6-page security audit, presented it to the board, and got promoted to Infrastructure Security Lead with a 40% raise. Timeline: 3 weeks from discovery to promotion.

💰 Offer OT Security Consulting to Local Utilities

Small and mid-size water utilities, wastewater treatment plants, and municipal power co-ops don’t have dedicated cybersecurity staff. They have one IT guy named Gary who’s also responsible for fixing printers.

What this looks like: Reach out to your city’s water department, electric co-op, or regional gas utility. Offer a free initial security assessment (1-2 hours of your time). Identify low-hanging fruit (exposed web interfaces, default passwords, missing MFA). Then offer ongoing monitoring and remediation for $2,000-$5,000/month per facility.

:brain: Example: A freelance sysadmin in Romania cold-emailed 12 regional water utilities offering free security scans. Three responded. He found critical vulnerabilities in all three. Two became paying clients at €3,500/month each. He now has 7 utility clients and grossed €147,000 in 2025. Timeline: 8 months from first cold email to 7-client portfolio.

🎓 Build a Micro-Course on OT Security for Non-Technical Managers

Every utility, manufacturer, and critical infrastructure operator has managers who know they’re supposed to care about cybersecurity — but have zero idea what a PLC even is.

What this looks like: Create a 90-minute online course called “OT Security for Executives: What You Need to Know About PLCs, SCADA, and Why Iran Can Shut Down Your Water Plant.” Use real examples (like this FBI report), simple language, and actionable checklists. Sell it for $199-$499 per seat or license it to industry associations.

:brain: Example: A former industrial controls engineer in Brazil created a 12-module Teachable course called “SCADA Security Basics for Plant Managers.” He charged $299 per student and marketed it via LinkedIn to water treatment and manufacturing facility managers. 340 students enrolled in year one. Revenue: $101,660. Timeline: 6 months from course creation to first $100K.

📝 Write Security Documentation Templates for SMB Utilities

Compliance frameworks like NIST, CISA guidelines, and industry-specific regulations require documentation — but small utilities don’t have the staff to write it from scratch.

What this looks like: Build templated security policies, incident response plans, and vulnerability assessment checklists specifically for water utilities, small electric co-ops, and regional gas distributors. Sell them as downloadable templates for $500-$2,000 per template pack, or offer customization services for $5,000-$15,000.

:brain: Example: A compliance consultant in South Africa created a “Water Utility Cybersecurity Documentation Starter Pack” (14 policy templates, 6 checklists, 3 incident response playbooks). She sold it for $1,200 on Gumroad and via her website. 47 utilities purchased in the first year. Revenue: $56,400. Timeline: 10 weeks from idea to launch.

🗣️ Speak at Industry Conferences and Charge for Workshops

Utility managers, plant operators, and industrial engineers attend tons of conferences — and they’re desperate for practical, non-theoretical security guidance.

What this looks like: Apply to speak at conferences like AWWA (American Water Works Association), ISA (International Society of Automation), or regional utility trade shows. Deliver a 45-minute talk on “How Iran Hacked U.S. Water Plants and How You Can Prevent It.” Then upsell a 3-hour paid workshop for $500-$1,500 per attendee.

:brain: Example: A cybersecurity researcher in India spoke at a regional water utility conference in Southeast Asia about SCADA vulnerabilities. 80 attendees showed up. He offered a follow-up 4-hour workshop for $800 per person. 22 signed up. Revenue from one conference: $17,600. He now does 6-8 conferences per year. Timeline: 14 months from first CFP submission to 6-conference annual circuit.

🛠️ Follow-Up Actions
Want to… Do this
Understand the scope of the threat Read the full CISA advisory AA26-097A — it includes technical IOCs and mitigations
See what’s exposed on the internet Search Shodan.io for “Rockwell” or “Allen-Bradley” — you’ll be horrified
Learn OT security basics Take the free SANS ICS410 preview course or watch CISA’s OT security training videos on YouTube
Start a side hustle in this space Cold-email 10 local utilities offering a free 30-minute security consultation — attach a PDF of this FBI report as credibility
Protect your own employer Forward the CISA advisory to your IT/OT security team with the subject line “Are we vulnerable to this?”

:high_voltage: Quick Hits

If you want to… Do this
:magnifying_glass_tilted_left: Check if your company is exposed Run a Shodan scan on your public IP ranges for exposed PLCs and SCADA systems
:briefcase: Turn this into a consulting gig Offer free security assessments to local water utilities and upsell remediation services
:graduation_cap: Monetize your knowledge Build a micro-course on OT security for non-technical plant managers and sell it for $199-$499
:memo: Sell templates Create compliance documentation templates for small utilities and charge $1,200 per pack
:speaking_head: Get paid to speak Apply to industry conferences and upsell paid workshops at $500-$1,500 per seat

Your city’s water plant runs on a 1997 PLC with the default password — and now you know Iran knows that too.

1 Like