Reports indicate that cyber groups affiliated with the Iranian regime have used the IOCONTROL malware to attack critical water and fuel systems in the U.S. and Israel.
This malware, designed to infiltrate internet-connected devices, can control systems such as fuel pumps, routers, and security cameras.
The Internet of Things (IoT) encompasses devices connected to the internet that send and receive data, such as cameras, sensors, and household appliances.
This technology is widely used across industries but can cause widespread disruptions in essential services if infiltrated by malware.
According to a report by the cybersecurity firm Claroty, this malware was discovered in a fuel management system targeted by a group linked to the IRGC. The attackers managed to disrupt fuel services and steal customers’ credit card information.
These attacks are part of the Iranian regime’s broader cyber activities targeting critical infrastructure in various countries over the past years.
Such activities include the 2012 cyberattack on Saudi Arabia’s Aramco oil company and attacks on water and power systems in the Middle East and Europe aimed at disrupting public services.
On December 2, Israel’s domestic intelligence agency, Shin Bet, announced it had identified more than 200 Iranian regime phishing cyberattacks aimed at obtaining personal information from senior Israeli officials.
According to Shin Bet, senior security, political, academic, and media figures in Israel were among the victims of these cyberattacks.
Shin Bet revealed that the hackers crafted personalized messages to avoid arousing suspicion among their targets. In one instance, a hacker posed as a cabinet minister and told the victim they were arranging a meeting between them and the Israeli prime minister.
Shin Bet stated that it had identified the victims of this cyber campaign and notified them accordingly.


