logo
CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide

CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide

WIRED14-04-2025

Apr 14, 2025 6:00 AM Despite their hacktivist front, CyberAv3ngers is a rare state-sponsored hacker group bent on putting industrial infrastructure at risk—and has already caused global disruption. ANIMATION: JAMES MARSHALL
The intermittent cyberwar between Israel and Iran, stretching back to Israel's role in the creation and deployment of the Stuxnet malware that sabotaged Iran's nuclear weapons program, has been perhaps the longest-running conflict in the era of state-sponsored hacking. But since Hamas' October 7 attack and Israel's retaliatory invasion of Gaza, a new player in that conflict threatens not just digital infrastructure in Israel but also critical systems in the US and around the world.
The group known as CyberAv3ngers has, in the last year and a half, proven to be the Iranian government's most active hackers focused on industrial control systems. Its targets include water, wastewater, oil and gas, and many other types of critical infrastructure. Despite being operated by members of Iran's Revolutionary Guard Corps, according to US officials who have offered a $10 million bounty for information leading to their arrest, the group initially took on the mantle of a 'hacktivist' campaign.
CyberAv3ngers has been vocal about their operations that targeted Israel and Israeli technology products. But they've also quietly expanded their target list to include a variety of other devices and networks, including a US oil and gas firm and a wide array of industrial control systems across the world.
All of that makes the hackers, despite their grassroots front, a rare example of state-sponsored cybersaboteurs who have crossed the line of targeting and disrupting critical infrastructure. And they haven't shown any signs of stopping.
'They pretend to be hacktivists, but they're really not. This is a state-sponsored group. They have funding and tooling,' says Kyle O'Meara, a threat intelligence researcher at industrial-control-system cybersecurity firm Dragos, which tracks the group under the name Bauxite. 'They definitely have the capability, they have the intent, and they have the interest in learning how to shut things off and potentially cause harm.'
Though CyberAv3ngers was active as early as 2020, it first came to prominence in November 2023, after Hamas launched its October 7 attack that killed more than 1,200 people and Israel responded with a ground invasion and bombing campaign that has since killed more than 50,000 Palestinians. A month into that ongoing war, the hackers gained access to more than 100 devices sold by the Israeli firm Unitronics—industrial control systems most commonly used in water utilities and wastewater plants. 'Every Equipment 'Made In Israel' Is Cyber Av3ngers Legal Target!' read a post from the group's X account.
In that hacking spree, CyberAv3ngers set the names of the devices to read 'Gaza' and changed their displays to show an image of the group's logo along with a star of David sinking into ones and zeros. 'You have been hacked,' the image read. 'Down with Israel.'
While CyberAv3ngers' initial foray may have appeared to be simple vandalism, The hackers actually rewrote the devices' so-called 'ladder logic,' the code that governs their functionality. As a result, the hackers' changes disrupted service on some victim networks, including a water utility and a brewery near Pittsburgh—distinct facilities that were both coincidentally in the same region—as well as multiple water utilities in Israel and Ireland, according to Dragos and another industrial cybersecurity firm, Claroty, that tracked the hacking campaign.
Around the same time, CyberAv3ngers also posted on Telegram that it had hacked into the digital systems of more than 200 Israeli and US gas stations—incidents which Claroty says did occur in some cases, but were largely limited to hacking their surveillance camera systems—and to have caused blackouts at Israeli electric utilities, a claim that cybersecurity firms say was false.
That initial wave of CyberAv3ngers hacking, both real and fabricated, appears to have been part of a tit-for-tat with another highly aggressive hacker group that is widely believed to work on behalf of Israeli military or intelligence agencies. That rival group, known as Predatory Sparrow, repeatedly targeted Iranian critical infrastructure systems while similarly hiding behind a hacktivist front. In 2021, it disabled more than 4,000 Iranian gas stations across the country. Then, in 2022, it set a steel mill on fire in perhaps the most destructive cyberattack in history. Following CyberAv3ngers' late 2023 hacking campaign, and missile launches against Israel by Iranian-backed Houthi rebels, Predatory Sparrow retaliated again by knocking out thousands of Iran's gas stations in December of that year.
'Khamenei!' Predatory Sparrow wrote on X, referring to the supreme leader of Iran in Farsi. 'We will react against your evil provocations in the region.'
Predatory Sparrow's attacks have been tightly focused on Iran. But CyberAv3ngers hasn't limited itself to Israeli targets, or even Israeli-made devices used in other countries. In April and May of last year, Dragos says, the group breached a US oil and gas firm—Dragos declined to name which one—by compromising the company's Sophos and Fortinet security appliances. Dragos found that in the months that followed, the group was scanning the internet for vulnerable industrial control system devices, as well as visiting the websites of those devices' manufacturers to read about them.
Following its late 2023 attacks, the US Treasury sanctioned six IRGC officials that it says were linked to the group, and the State Department put its $10 million bounty on their heads. But far from being deterred, CyberAv3ngers has instead shown signs of evolving into a more pervasive threat.
Last December, Claroty revealed that CyberAv3ngers had infected a wide variety of industrial control systems and internet-of-things (IOT) devices around the world using a piece of malware it developed. The tool, which Claroty calls IOControl, was a Linux-based backdoor that hid its communications in a protocol known as MQTT used by IOT devices. It had been planted on everything from routers to cameras to industrial control systems. Dragos says it found devices infected by the group worldwide, from the US to Europe to Australia.
According to Claroty and Dragos, the FBI took control of the command-and-control server for IOControl at the same time as Claroty's December report, neutralizing the malware. (The FBI didn't respond to WIRED's request for comment about the operation.) But CyberAv3ngers' hacking campaign nonetheless shows a dangerous evolution in the group's tactics and motives, according to Noam Moshe, who tracks the group for Claroty.
'We're seeing CyberAv3ngers moving from the world of opportunistic attackers where their whole goal was spreading a message into the realm of a persistent threat,' Moshe says. In the IOControl hacking campaign, he adds, 'they wanted to be able to infect all kinds of assets that they identify as critical and just leave their malware there as an option for the future.'
Exactly what the group might have been waiting for—possibly some strategic moment when the Iranian government could gain a geopolitical advantage from causing widespread digital disruption—is far from clear. But the group's actions suggest that it's no longer seeking to merely send a message of protest against Israeli military actions. Instead, Moshe argues, it's trying to gain the ability to disrupt foreign infrastructure at will.
'This is like a red button on their desk. At a moment's notice they want to be able to attack many different segments, many different industries, many different organizations, however they choose,' he says. 'And they're not going away.'

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Trump explains why Egypt was not part of travel ban after citing Boulder attack
Trump explains why Egypt was not part of travel ban after citing Boulder attack

USA Today

time31 minutes ago

  • USA Today

Trump explains why Egypt was not part of travel ban after citing Boulder attack

Trump explains why Egypt was not part of travel ban after citing Boulder attack 'Egypt has been a country that we deal with very closely. They have things under control,' Trump said of the nation's exemption from his travel ban. Show Caption Hide Caption Travelers react to the latest travel ban from President Trump "Pros and cons." Travelers in Los Angeles responded to the news of President Donald Trump's travel ban impacting nearly 20 countries. WASHINGTON — President Donald Trump says he did not include Egypt in a travel ban, which he tied to a terror attack allegedly carried out by an Egyptian national, because the United States works closely with the Arab nation. "Egypt has been a country that we deal with very closely. They have things under control. The countries that we have don't have things under control," Trump told reporters in the Oval Office on June 5. In introducing the partial or complete ban on travel from citizens of 19 nations on June 4, Trump cited the Boulder, Colorado, attack that took place at an event raising awareness about Israeli hostages. The suspect in the case, Mohamed Sabry Soliman, is an Egyptian man who entered the U.S. on a tourist visit that he overstayed after applying for asylum, federal officials say. More: Trump's travel ban is his fourth attempt. See how list compares to 2017 Yet, the travel ban that Trump unveiled days later did not include Egypt, raising questions about the timing and purpose of the ban, which the president's critics say unfairly targets African and Muslim-majority nations. Trump requested that the State Department and other national security officials put together a list of countries for potential visa restrictions in an executive order just after taking office. But nothing came of it for months, until the Boulder attack, which he blamed on the previous administration. "We want to keep bad people out of our country. The Biden administration allowed some horrendous people," Trump said in the Oval Office, as he touted his deportation policies. Egypt has acted as a central mediator alongside the United States and Qatar in the conflict between Israel and Hamas, helping to establish a ceasefire and secure the release of prisoners and hostages. The United States had conducted joint training exercises with Egypt since 1980 and considers the Arab nation that has been ruled by Abdel Fattah El-Sisi since 2014 a regional partner. The Egyptian embassy in Washington did not immediately respond to a request for comment.

Netanyahu says Israel has ‘activated' some Palestinian clans in the fight against Hamas
Netanyahu says Israel has ‘activated' some Palestinian clans in the fight against Hamas

Hamilton Spectator

time37 minutes ago

  • Hamilton Spectator

Netanyahu says Israel has ‘activated' some Palestinian clans in the fight against Hamas

JERUSALEM (AP) — Israeli Prime Minister Benjamin Netanyahu said Thursday that Israel has 'activated' some local clans of Palestinians in Gaza in the fight against Hamas. In a video posted to his X account, Netanyahu said the government made the move on the advice of 'security officials,' in order to save lives of Israeli soldiers. The announcement came hours after a political opponent criticized him for arming unofficial groups of Palestinians in Gaza. Some local Palestinian families in Gaza are known to have arms and often wield some control in parts of the territory. In the past, before and during the war, some have had clashes or tensions with Hamas. An Israeli official said that one of the groups that Netanyahu was referring to was the so-called Abu Shabab group. The official spoke on condition of anonymity because they were not authorized to talk to the media. In recent weeks, the Abu Shabab group announced online that its fighters were helping protect aid shipments to the new distribution mechanism backed by Israel in southern Gaza. Error! Sorry, there was an error processing your request. There was a problem with the recaptcha. Please try again. You may unsubscribe at any time. By signing up, you agree to our terms of use and privacy policy . This site is protected by reCAPTCHA and the Google privacy policy and terms of service apply. Want more of the latest from us? Sign up for more at our newsletter page .

Man, 28, charged in series of alleged hate-motivated graffiti incidents: York police
Man, 28, charged in series of alleged hate-motivated graffiti incidents: York police

Hamilton Spectator

time37 minutes ago

  • Hamilton Spectator

Man, 28, charged in series of alleged hate-motivated graffiti incidents: York police

Police north of Toronto say a man has been charged in an alleged series of hate-motivated graffiti incidents in Richmond Hill, Ont., last week. Police in York Region say they responded to a report of hate-related graffiti on the wall of a grocery store near Yonge Street and 16th Avenue on May 31. They say three more businesses reported similar graffiti containing 'anti-Iranian messages' that same day. Police say a fourth graffiti incident was later reported at a nearby bus terminal. The suspect, a 28-year-old man of no fixed address, has been charged with four counts of mischief under $5,000, among other offences. Police say that at the time of his arrest, the accused was on probation and under a court order for previous unrelated charges. This report by The Canadian Press was first published June 5, 2026. Error! Sorry, there was an error processing your request. There was a problem with the recaptcha. Please try again. You may unsubscribe at any time. By signing up, you agree to our terms of use and privacy policy . This site is protected by reCAPTCHA and the Google privacy policy and terms of service apply. Want more of the latest from us? Sign up for more at our newsletter page .

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store