Guides & Reviews
4/7/2026

Defending US Utilities From Iran‑Linked Hackers: A Buyer’s Guide for Energy and Water Operators

Iran‑aligned groups increasingly probe US energy and water systems. Here’s a prioritized, buyer‑focused guide to hardening OT/IT, what to purchase first, and how to scale security by budget.

If you run or secure a US energy or water utility, the shortest path to resilience is a focused 90‑day plan: remove internet exposure to OT, enforce MFA and vendor access controls, back up PLC logic offline, deploy passive OT monitoring, and segment IT from OT with a firewall DMZ. This article tells you what to buy first, how to stage deployment, and where to spend (or save) depending on your size and risk.

Iran‑linked actors and aligned hacktivists have repeatedly targeted critical infrastructure by exploiting exposed remote access, default PLC credentials, and unpatched edge appliances. The fastest risk reduction comes from a handful of purchases and configurations you can complete this quarter—no rip‑and‑replace required. Below is a buyer’s guide and decision framework tailored to municipal water systems, co‑ops, and energy operators.

Who this is for

  • Municipal water and wastewater authorities
  • Electric utilities: IOUs, co‑ops, munis, and independent power producers
  • Natural gas and pipeline operators
  • Regional transmission operators and generation asset owners with mixed IT/OT
  • System integrators and OEMs supporting the above

What changed—and why it matters

  • Adversary intent and targeting: Iran‑aligned groups and proxies have telegraphed an interest in US critical infrastructure, including smaller, lightly resourced utilities. They blend disruptive goals with messaging impact.
  • Exploit mix: They favor opportunistic entry—phishing for VPN creds, exploiting perimeter devices (e.g., VPN/SD‑WAN/Gateways), and abusing exposed HMIs and PLCs with default or shared passwords.
  • OT realities: Many plants still run flat networks, legacy gear, and vendor‑managed remote access. That combination makes setpoint tampering, nuisance shutdowns, and recovery delays more likely than Hollywood‑style destruction.

Bottom line: You don’t need perfect security. You need fast containment, credible monitoring in OT, and the ability to restore known‑good logic under pressure.

Threat model cheat sheet: How Iran‑linked actors commonly operate

  • Initial access
    • Phishing for VPN/RDP credentials; password spraying without MFA
    • Exploiting edge devices (e.g., VPN gateways, remote access appliances) for RCE
    • Scanning Shodan/Censys for exposed HMIs, VNC/RDP, and web‑managed PLCs
  • Lateral movement and persistence
    • Living‑off‑the‑land via PowerShell/WMI, abusing local admin and service accounts
    • Pivoting through poorly segmented IT→OT links or jump servers without MFA
  • Impact in OT
    • Changing setpoints (e.g., chemical dosing, pressure) or disabling alarms
    • Locking out operators by changing passwords
    • Wiping or corrupting engineering workstations to delay recovery

Your most effective countermeasures map directly: eliminate exposed services, enforce MFA and vendor session control, monitor OT protocols passively, and maintain clean offline PLC backups.

The 30/60/90‑day plan (with what to buy)

Days 0–30: Immediate risk knock‑down

  1. Remove internet exposure to OT/HMI/PLC
    • Use an external attack surface management (ASM) scan (many MSSPs or ASM vendors offer trials) to find exposed OT services; close them or put behind VPN with MFA.
  2. Enforce MFA on all remote access
    • Prioritize VPNs, jump hosts, engineering workstations used remotely, and vendor access. If your legacy systems can’t do MFA, front them with a modern gateway.
  3. Lock down vendor access
    • Require time‑bound approvals, session recording, and per‑ticket access. Disable always‑on connections.
  4. Change defaults and rotate shared passwords
    • PLCs, HMIs, historian accounts, and domain service accounts. Stop password reuse across sites.
  5. Create offline, tested backups
    • Export and verify PLC/RTU logic, HMI projects, historian configs; store offline and on write‑protected media.
  6. Turn on logging and centralize it
    • Forward firewall, VPN, Windows server logs to a SIEM or at least a syslog server; keep 90 days minimum.
  7. Get free help
    • Enroll with CISA services (vuln scanning, phishing assessments) and join WaterISAC/MS‑ISAC as applicable.

Recommended quick buys (starter kit)

  • MFA/identity: Duo, Okta, Microsoft Entra ID (for VPN/jump hosts)
  • Secure remote access for vendors: Xage, Cyolo, Tailscale/ZeroTier (with policy controls)
  • SIEM/logging: Microsoft Sentinel, Splunk, or Elastic (cloud or on‑prem, sized modestly)
  • IR retainer (SLA‑backed): Mandiant, CrowdStrike, or Dragos (OT‑savvy)

Days 31–60: Visibility and segmentation

  1. Deploy passive OT network monitoring at key sites
    • Sensor taps on core OT switches to discover assets and alert on unsafe commands. Avoid active scanning.
  2. Build an IT/OT DMZ
    • Insert a firewall between business IT and OT. Only allow required historian/data flows, inspected and logged.
  3. Establish privileged access management (PAM)
    • Vault shared OT passwords, enforce check‑in/out and session recording, and rotate creds automatically.
  4. Tabletop exercise
    • Practice a setpoint‑tampering scenario with operations, engineering, comms, and local emergency management.

Recommended buys

  • OT monitoring/asset discovery: Dragos Platform, Nozomi Networks Guardian, Claroty xDome/Edge, Tenable OT Security, Armis, Forescout
  • Firewalls/segmentation: Palo Alto, Fortinet, Check Point, or Cisco (with OT protocol awareness)
  • PAM: CyberArk, Delinea, or BeyondTrust (ensure support for jump hosts and engineering stations)

Days 61–90: Resilience and one‑way protections for crown jewels

  1. One‑way data flow for critical plants
    • Use a data diode/unidirectional gateway to send process data out without allowing inbound control.
  2. Secure remote engineering workstation pattern
    • Hardened jump server with MFA, per‑session approval, recording, and file transfer scanning.
  3. EDR for servers and HMIs (where safe)
    • Deploy endpoint detection on Windows servers and HMIs; exclude PLCs/RTUs from active agents.
  4. Patch and virtual patching program
    • Prioritize edge devices and remote access appliances; use IPS/WAAP where immediate patching isn’t possible.
  5. SOC visibility 24/7
    • Extend your SOC/MSSP to ingest OT alerts; tune with operations staff to reduce false positives.

Recommended buys

  • Unidirectional gateways: Waterfall Security Solutions, OPSWAT NetWall
  • EDR: CrowdStrike, Microsoft Defender for Endpoint, SentinelOne (validate HMI compatibility)
  • Managed detection and response (MDR) for OT: Dragos, Nozomi‑powered MSSPs, or major MDRs with ICS playbooks

Buyer’s guide by budget and scale

Under $100k/year (small municipal water, single plant)

  • Must‑haves
    • MFA for VPN/jump host + vendor access control (Duo/Okta + Cyolo/Xage Lite)
    • Single passive OT sensor at main plant (Nozomi/Claroty/Tenable OT small license)
    • Basic SIEM/logging (Sentinel or Elastic) and IR retainer
    • Offline PLC/HMI backups and a quarterly restore test
  • Free/low‑cost wins
    • CISA cyber hygiene scans; WaterISAC membership; MS‑ISAC if SLTT entity

$100k–$500k/year (regional water district, co‑op utility, multi‑site)

  • Additions
    • Multiple OT sensors across sites with centralized console
    • PAM for shared OT credentials + session recording
    • Firewall‑enforced IT/OT DMZ with inspected historian flows
    • MDR/SOC coverage nights/weekends
    • Annual red team/purple team with OT expertise

$500k+ (large IOU, generation fleet, major metro water)

  • Programmatic controls
    • Unidirectional gateways for high‑impact sites
    • Full micro‑segmentation of OT zones and conduits (IEC 62443‑aligned)
    • Vendor access brokerage at scale with per‑vendor policy sets
    • SIEM + SOAR with OT content packs, playbooks, and case management
    • Dedicated OT SOC function and testbed for patch validation

Reference architecture that works

  • Network segmentation
    • Purdue Model‑inspired zoning: L3.5 DMZ between IT and OT; OT zones by process cell.
  • One‑way for critical telemetry
    • Data diode from plant network to enterprise historian; no inbound control path.
  • Vendor access pattern
    • External vendor → MFA gateway → approval → OT jump server → session recording → engineering workstation.
  • Identity and secrets
    • Role‑based access, no shared admin accounts; PAM vault for device and application creds.
  • Monitoring
    • Passive sensors in each OT zone; logs/alerts to SIEM; EDR on IT and HMIs; tuned detections for unsafe OT commands.

Product categories explained (and how to choose)

  • OT visibility and anomaly detection
    • Purpose: Discover unmanaged assets, flag unsafe commands (e.g., Modbus writes), and detect lateral movement.
    • Decision points: Protocol coverage (Modbus, DNP3, IEC‑104, OPC UA, vendor‑specific), sensor licensing (by asset vs bandwidth), on‑prem vs SaaS, multi‑site management, and quality of ICS playbooks.
  • Secure remote access for OT
    • Purpose: Time‑bound vendor sessions with MFA, approval, brokering, and recording.
    • Decision points: Integration with your IdP, workflow for approvals, file transfer scanning, and offline site support.
  • PAM for OT
    • Purpose: Control shared creds and record sessions across Windows, PLC programming tools, and network gear.
    • Decision points: Protocol support (RDP/SSH/VNC), check‑out workflows, just‑in‑time accounts, and audit exports for compliance.
  • Data diodes/unidirectional gateways
    • Purpose: Strong physical enforcement of outbound‑only data from critical plants.
    • Trade‑off: Higher cost and vendor integration vs unmatched risk reduction for crown jewels.
  • SIEM/MDR with OT content
    • Purpose: Correlate IT + OT events, 24/7 triage, regulatory reporting.
    • Decision points: Parser maturity for OT logs, deployment model, retention costs, and MSSP track record in ICS.

Trade‑offs you should acknowledge

  • OT monitoring vs endpoint agents: Network‑based OT visibility is safer for legacy gear; use EDR primarily on Windows servers/HMIs.
  • Unidirectional gateways vs convenience: Diodes reduce risk but complicate vendor remote support; pair with on‑site escort or scheduled access windows.
  • Granular segmentation vs operational complexity: Start with a clean L3.5 DMZ and work toward zone‑conduit segmentation as you gain visibility.
  • Cloud SIEM vs on‑prem: Cloud speeds deployment but raises data sovereignty concerns; consider hybrid for sensitive OT logs.

Compliance and reporting, simplified

  • Electric: Align with NERC CIP (access controls, logging, incident response). Map purchases to CIP‑002/005/007/008.
  • Pipelines: TSA Security Directives require cybersecurity assessments, incident reporting, and mitigation plans.
  • Water: Complete AWIA risk and resilience assessments; follow sector guidance and state requirements. Even where mandates are limited, regulators expect reasonable cybersecurity controls.
  • Government guidance: Use NIST CSF 2.0 and NIST 800‑82 for ICS. Monitor CISA alerts for perimeter device vulnerabilities.
  • Public companies: Ensure incident materiality assessment and disclosure processes include OT events.

Incident response quick playbook (setpoint tampering scenario)

  • Detect: OT monitoring flags unauthorized write to chlorine dosing PLC; HMI alarms show drift.
  • Stabilize the process
    • Switch to manual/backup control per SOP. Verify physical readings with independent meters.
  • Contain IT/OT
    • Disable vendor access and block suspect accounts. Isolate affected OT subnet at the switch/firewall.
  • Eradicate/preserve
    • Capture volatile data and logs. Reimage compromised workstations; audit PLC user/passwords.
  • Restore
    • Load last known‑good PLC/HMI configs from offline backups. Validate with operations before returning to auto.
  • Notify and report
    • Escalate to leadership, public health where applicable, and coordinate with CISA/ISACs per policy.
  • Learn and harden
    • Close exposure that enabled the attack; rotate creds; tune detections.

Procurement checklist (RFP questions that flush out reality)

  • Asset discovery: Which ICS protocols are fully parsed? How many are roadmap only?
  • Safety detections: Can you alert on specific OT command types (writes, mode changes) and vendor‑specific hazards?
  • Architecture: Prove passive operation in OT. What are sensor hardware and span port needs per site?
  • Identity: How do you enforce MFA and time‑bound access for vendors? Is session recording searchable?
  • Integration: SIEM connectors, case management APIs, and export formats for compliance.
  • Deployment: Lead time, typical weeks to first value, and on‑site vs remote install options.
  • Licensing and TCO: By sensor, asset, or bandwidth? Data retention costs? Ongoing maintenance?
  • Security assurance: SBOM availability, patch cadence, and third‑party pen test results.

Common pitfalls to avoid

  • Scanning PLCs with IT tools: Active scans can crash fragile devices—use passive discovery in OT.
  • Rushing to buy before mapping data flows: A few hours of architecture review prevents expensive rework.
  • Leaving vendor tunnels always on: Move to brokering with approval and recording.
  • Assuming EDR alone protects OT: It helps on Windows hosts, not on PLCs and field devices.
  • Not testing backups: A backup you’ve never restored is a wish, not a control.

Key takeaways

  • Remove exposure, enforce MFA, and control vendor sessions—these three actions cut the majority of real‑world risk.
  • Passive OT monitoring is the single best purchase for small to mid‑size utilities after identity hardening.
  • For critical plants, a data diode is worth the cost. For the rest, a clean IT/OT DMZ and tuned firewall rules go far.
  • Practice the bad day: a one‑hour tabletop each quarter pays back more than another tool shelf‑ware.

FAQ

Q: We’re a small water utility with one plant. What’s the first purchase?

  • A small passive OT monitoring sensor and MFA on remote access. Pair with disciplined offline PLC backups.

Q: Can we use our existing EDR in the OT network?

  • Yes on Windows servers and HMIs after testing. Do not install agents on PLCs/RTUs; rely on network‑based OT monitoring there.

Q: We rely on vendors for remote maintenance. How do we secure that without breaking service?

  • Broker access through an MFA‑protected gateway with per‑session approval and recording. Keep tunnels closed by default.

Q: Are unidirectional gateways necessary for every site?

  • No. Reserve them for high‑impact plants where any inbound path is unacceptable. Use a standard IT/OT DMZ elsewhere.

Q: What free resources can we leverage now?

  • CISA cyber hygiene services, sector ISACs (WaterISAC/MS‑ISAC), and vendor hardening guides for your PLC/HMI brands.

Source & original reading: https://www.wired.com/story/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/