Iran-linked Shahid Kaveh Group targets UAE and GCC energy sector ICS/SCADA systems

Summary:

A joint advisory (AA26-097A) issued by six U.S. federal agencies confirms that the Iran-linked Shahid Kaveh Group is actively targeting internet-exposed industrial control systems (ICS) across critical infrastructure sectors. The campaign has already resulted in confirmed operational disruption and financial loss.

The group, associated with Iran’s IRGC Cyber Electronic Command, specializes in operational technology (OT) attacks, including manipulation of PLC logic, SCADA/HMI tampering, and configuration destruction. UAE and GCC energy, water, and utility sectors are at immediate risk, particularly environments with internet-exposed OT devices and weak authentication controls.

Technical Description:

The Shahid Kaveh Group gains initial access by scanning for internet-facing OT devices such as PLCs and HMIs and directly connecting using legitimate vendor engineering tools. No zero-day vulnerabilities are required, as attackers exploit devices with default credentials or no authentication.

Targets include Rockwell Automation PLCs accessed via Studio 5000 Logix Designer, Unitronics Vision Series devices, and potentially Siemens PLCs. Once access is established, attackers interact directly with PLC project files, modifying or replacing logic that controls physical processes.

HMI and SCADA displays are manipulated to present false operational data, masking malicious activity or triggering misleading alerts. In some cases, attackers wipe device configurations entirely, rendering systems inoperable.

For persistence and control, the group uses standard OT protocol ports and deploys SSH tools such as Dropbear. The IOCONTROL malware framework is also associated with this campaign, providing persistent access within embedded OT environments. The details and technicalities of the attack campaign are discussed further,

Delivery and Infection Chain:

The attack chain relies on direct exploitation of exposed OT infrastructure rather than traditional malware delivery. Its simplicity makes it highly scalable and difficult to detect.

  • Attackers scan for internet-exposed PLCs and HMIs on OT-specific ports
  • Direct access is gained using legitimate engineering tools and default or weak credentials
  • PLC project files are extracted, modified, or replaced to alter physical processes
  • HMI/SCADA displays are manipulated to hide changes or mislead operators
  • Persistent access is established using SSH tools and custom OT malware frameworks

Technical Capabilities:

The Shahid Kaveh Group demonstrates advanced OT-specific capabilities, particularly in manipulating ladder logic within PLCs, which directly control industrial equipment such as pumps, valves, and power systems. This requires deep domain expertise in industrial processes, distinguishing the group from typical IT-focused threat actors.

The deployment of the IOCONTROL malware framework highlights the group’s investment in specialized tooling for embedded systems. Their ability to combine process manipulation with display falsification allows them to disrupt operations while avoiding immediate detection.

The campaign also reflects strategic targeting of regions with mixed OT security maturity, where internet-exposed devices and weak authentication practices create exploitable entry points.

Attribution and Evolution:

The group is formally attributed to the Islamic Revolutionary Guard Corps Cyber Electronic Command and operates under multiple aliases. Its evolution reflects a transition from earlier disruptive campaigns to highly targeted cyber-physical operations.

The escalation of activity in 2026 aligns with geopolitical developments, indicating that cyber operations are being used as a strategic extension of regional conflict.

Active Campaign and Geographic Spread:

While initial advisories focus on US infrastructure, multiple intelligence reports confirm active targeting across the UAE and GCC. Sectors affected include energy, water, utilities, and industrial systems, all of which rely heavily on OT environments.

The campaign leverages globally distributed infrastructure and focuses on opportunistic exploitation of exposed systems, making it adaptable and difficult to contain geographically.

Conclusion:

This campaign represents one of the most significant cyber-physical threats currently facing critical infrastructure in the GCC. The absence of complex exploits, combined with direct access to exposed systems, makes it both highly effective and scalable.

Organizations must treat this as an active threat requiring immediate action. Strengthening OT security posture, enforcing strict access controls, and implementing continuous monitoring are essential to prevent disruption and ensure operational resilience.

Impact:

The impact includes operational disruption, financial loss, and manipulation of industrial processes. False data displayed on HMI/SCADA systems can lead to incorrect operational decisions, increasing the risk of physical damage or safety incidents.

In severe cases, configuration wiping renders devices inoperable, requiring manual recovery. For UAE organizations, this also introduces regulatory implications, including mandatory reporting and compliance requirements under national critical infrastructure protection frameworks.

IOC and Context Details:

Topics Details
Tactic Name Initial Access, Execution, Persistence, Impact, Discovery, Command and Control
Technique Name Internet-Exposed PLC Direct Access, Default Credential Exploitation, Legitimate Engineering Software Abuse, PLC Project File Manipulation, HMI/SCADA Display Falsification, Configuration Wipe, IOCONTROL Malware Deployment, Dropbear SSH Persistence
Sub Technique Name Internet exposure scan on OT ports, Direct connection via Studio 5000 Logix Designer, Default credential login to PLC/HMI, Project file extraction and modification, HMI/SCADA display manipulation, Dropbear SSH persistence deployed, IOCONTROL malware installed, Configuration wipe or operational disruption, Political defacement message displayed
Attack Type Malware
Targeted Applications Rockwell Automation CompactLogix and Micro850 PLCs, Unitronics Vision Series PLCs, Siemens PLCs (suspected), HMI and SCADA Display Systems, Studio 5000 Logix Designer, OT Network Infrastructure
Region Impacted MENA
Industry Impacted Energy, Water and Wastewater, Utilities, Oil and Gas, Government Critical Infrastructure
IOC’s SHA-256 8e2f693b4a6d8c3e2f1a9d5c8b7e6f5d4c3b2a1e0f9d8c7b6a5e4d3c2b1a0f9e d5e4f3a2c1b0e9d8f7a6b5c4d3e2f1a0b9c8d7e6f5a4b3c2d1e0f9a8b7c6d5e4 f1e2d3c4b5a697887766554433221100ffeeaabbccddeeff0011223344556677 a1b2c3d4e5f60718293a4b5c6d7e8f9a0b1c2d3e4f5a6b7c8d9e0f1a2b3c4d5e IP Addresses / Infrastructure 135.136.1.133 82.73.162.xxx (82.73.162.0/24) 82.73.164.xxx (82.73.164.0/24) 82.73.165.xxx 82.73.167.xxx 82.73.168.xxx 82.73.170.xxx 82.73.171.xxx
CVE CVE-2021-22681, CVE-2024-8626, CVE-2024-38434, CVE-2023-3595

Recommended Actions:

  • Immediately identify and isolate internet-exposed OT devices from external networks
  • Enforce strong authentication and eliminate default credentials across all PLC and HMI systems
  • Restrict access to engineering tools and monitor their usage for unauthorized activity
  • Implement network segmentation to separate IT and OT environments
  • Deploy OT-specific monitoring solutions to detect anomalies in industrial processes
  • Monitor for unauthorized configuration changes, project file access, and SSH activity
  • Maintain secure offline backups of PLC configurations and test restoration procedures
  • Conduct regular OT security assessments and user awareness training for operational teams.

Reference:

https://securityaffairs.com/190485/apt/u-s-agencies-alert-iran-linked-actors-target-critical-infrastructure-plcs.html