Saturday, November 29, 2025
HomeCurrent NewsCyberattacks on US Infrastructure Between November 2023 and April 2024

Cyberattacks on US Infrastructure Between November 2023 and April 2024

As an Amazon Associate we earn from qualifying purchases.

Recent cyberattacks on U.S. infrastructure between November 2023 and April 2024 highlight vulnerabilities in critical systems, particularly in industrial control systems (ICS) used in the food and agriculture, healthcare, and water and wastewater sectors. These attacks, conducted primarily by Iran-affiliated and pro-Russia cyber actors, demonstrate the potential for disruption of essential services, physical damage, and threats to public safety. Many ICS devices remain vulnerable due to outdated software, poor password security, reliance on default credentials, and limited resources for system updates. The increasing connection of ICS to corporate IT networks and the internet further exacerbates these vulnerabilities. Additionally, operational challenges and competing priorities among system operators contribute to insufficient cybersecurity measures.

One of the most prominent cyberattacks involved the IRGC-affiliated group “Cyber Av3ngers,” which targeted Unitronics programmable logic controllers (PLCs). In November 2023, these attackers gained access to PLCs in multiple U.S. water and wastewater facilities, primarily defacing touch screens with anti-Israel messages. As a precaution, some victims shut down their systems and switched to manual operations. This attack illustrates how adversaries can exploit widely used ICS products to compromise multiple facilities simultaneously.

Another significant attack was carried out by a pro-Russia hacktivist group, which compromised multiple water plants and claimed responsibility for attacking two dairies. These cyber actors accessed ICS components via public-facing human-machine interfaces (HMIs), manipulating control settings remotely. In January 2024, the group infiltrated two Texas water facilities, altering water pump settings and alarm thresholds, causing storage tanks to overflow. In April 2024, the group released videos showing attackers remotely adjusting HMIs within wastewater treatment systems and an energy company. The hacktivist group also claimed attacks on U.S. dairy systems in November 2023. These incidents underscore the risks posed by public-facing ICS components and the need for improved security controls.

Between November 2023 and April 2024, at least 36 cyberattacks targeting ICS infrastructure were reported, with Cyber Av3ngers responsible for 29 and the pro-Russia hacktivist group responsible for seven. Attacks spanned multiple states, including California, Colorado, Georgia, Florida, Illinois, Indiana, Minnesota, Montana, New Jersey, New Mexico, North Carolina, Ohio, Oklahoma, Pennsylvania, South Carolina, Texas, West Virginia, and Wisconsin. Targeted sectors included water and wastewater management, agriculture, energy, healthcare, education, state and local government, telecommunications, and private-sector manufacturing. The widespread nature of these attacks highlights systemic vulnerabilities across multiple industries.

Industrial control systems, a subset of operational technology (OT), enable the automation and remote control of physical processes. Unlike information technology (IT), which primarily handles data manipulation and communication, ICS directly interacts with physical infrastructure. Common ICS components include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), human-machine interfaces (HMIs), and programmable logic controllers (PLCs). SCADA systems are large-scale monitoring and control systems used in utilities such as electricity, gas, oil, and water distribution. DCS systems manage processes in power generation, chemical processing, oil refining, and wastewater treatment. HMIs provide graphical interfaces for operators to monitor and control ICS functions, while PLCs execute automated control tasks.

Cyber actors exploit vulnerabilities in ICS infrastructure using various attack vectors. One common method is compromising HMIs, SCADA, and PLCs through public-facing internet access, weak authentication mechanisms, and unpatched vulnerabilities. Once inside, attackers can manipulate control parameters, disable safety mechanisms, or disrupt operations, leading to potential physical consequences. Given that many ICS environments share common configurations and vendors, successful attacks can be replicated across multiple facilities.

To mitigate cyber threats against ICS, cybersecurity agencies, including the Cybersecurity and Infrastructure Security Agency (CISA), Environmental Protection Agency (EPA), FBI, and the Water Information Sharing and Analysis Center (WaterISAC), recommend several best practices. Key measures include changing default passwords immediately, conducting asset inventories to identify vulnerable devices, enforcing user access controls with multifactor authentication, and performing cybersecurity risk assessments to reduce public-facing internet exposure. Additionally, organizations should install independent cyber-physical safety systems, conduct regular cybersecurity training, develop incident response plans, implement continuous threat detection, back up ICS configurations, and integrate cyber and physical incident response strategies. Participation in information-sharing communities is also encouraged to stay ahead of emerging threats.

The recent wave of cyberattacks demonstrates that U.S. critical infrastructure remains highly susceptible to cyber threats from state-affiliated and hacktivist groups. Vulnerabilities in ICS components, inadequate cybersecurity measures, and growing connectivity to corporate IT networks create an expanding attack surface for adversaries. Without significant improvements in cybersecurity policies, technical controls, and operational awareness, attacks on U.S. infrastructure are likely to persist. Strengthening defenses through coordinated security efforts, proactive threat mitigation, and investment in secure ICS technologies will be essential to safeguarding essential services and public safety.

Today’s 10 Most Popular Books About Critical Infrastructure

Last update on 2025-11-29 / Affiliate links / Images from Amazon Product Advertising API

YOU MIGHT LIKE

WEEKLY NEWSLETTER

Subscribe to our weekly newsletter. Sent every Monday morning. Quickly scan summaries of all articles published in the previous week.

Most Popular

Featured

FAST FACTS