How AI may have handed Iran’s proxies a map to US infra
BENGALURU: Within hours of US and Israeli strikes hitting Iran on Feb 28, over 50 hacktivist groups aligned with Iranian interests had activated on Telegram. Many possibly had no background in industrial control systems and no state direction.
What they had was an internet connection and an AI tool that could hand them a working map of vulnerable US infrastructure. That combination — motivated actors, accessible AI, and a growing attack surface — is the central argument of a new report from cybersecurity firm CloudSEK.
CloudSEK’s lead researcher Ibrahim Saify told TOI the team began by mapping threat actors targeting industrial control systems: the energy grids, water plants, and traffic infrastructure that underpin national ecosystems. One group kept surfacing.
“We came across CyberAv3ngers,” Saifi says, adding: “Not all threat actor groups have a very complex TTP or are technically sophisticated. And yet they were using AI Large Language Models (LLMs), ChatGPT, for their reconnaissance phase.”
Decade of Escalation
The report traces Iranian cyber operations to 2012, when the Shamoon wiper destroyed 30,000 endpoints at Saudi Aramco, an operation requiring nation-state resources and industrial expertise. In 2017, the TRITON malware targeted safety systems at a Saudi petrochemical plant, the only malware confirmed to attack industrial safety instrumented systems. Both reflected years of capability building.
By late 2023 the pattern shifted. The Iranian group CyberAv3ngers began targeting Israel’s Unitronics programmable logic controllers. On Nov 25, 2023, they breached the Municipal Water Authority of Aliquippa, Pennsylvania using the default password “1111”, listed in manuals and prior CISA (Cybersecurity and Infrastructure Security Agency) advisories. CISA later confirmed breaches in 75 or more US industrial control system devices.
What AI Changed
In Oct 2024, OpenAI disclosed that CyberAv3ngers accounts had used ChatGPT during reconnaissance. Queries in its threat intelligence report sought default credentials for industrial routers, ways to scan networks for ICS devices, guidance on Modbus scripts, and methods to obfuscate post-compromise tools. OpenAI said the responses offered little beyond a standard web search. CloudSEK researchers argue the point is different.
“The significance is not that AI created new attack capabilities,” the report notes. “It is that AI eliminated the research phase.” A single session can produce the right Shodan query (search for internet-connected devices, services, and vulnerabilities using filters), confirm default credentials, and explain unfamiliar protocols, compressing weeks of background work into minutes.
To illustrate this, CloudSEK replicated the CyberAv3ngers approach as a passive exercise. Using AI-generated Shodan queries, researchers located live industrial systems in the US. “Submitting one public URL to an AI system produced a threat profile: a Siemens SIMATIC CP 343-1 device, operating in RUN mode, not locked, with accessible management pages and a plain-language explanation of potential attacker actions,” as per the report. Another device found was a Schneider Electric power meter with an unauthenticated interface.
The Threat Pool
The current conflict has triggered the largest single activation of Iranian-aligned cyber actors on record, according to Palo Alto’s Unit 42, which assessed a Telegram mobilisation on March 2.
At the top are established state-linked groups such as APT33, known for password-spray attacks on US energy firms, MuddyWater, active with updated tools, and APT34, believed to be quietly pre-positioning in energy and finance networks.
“Below them are groups like Handala Hack Team, linked to Iran’s MOIS and known for wipers, ransomware, and supply-chain intrusions. At the bottom are more than 60 newly activated groups since Feb 28, often less skilled and more likely to rely on AI assistance,” the report said.
The Attack Surface
The report cites data from ReliaQuest showing that OT and ICS internet exposure rose 35% year-over-year in the first half of 2025. Unitronics port 20256 exposure specifically surged 160% over the same period — despite two years of CISA advisories explicitly naming that port and that vendor following the Aliquippa attack. The advisories exist. The exposure grew anyway.
The attack that hit Aliquippa can possibly be scripted in under 50 lines of Python: pull a list of Unitronics devices on port 20256 from a Shodan query, attempt the default credential, log results. One operator, no industrial knowledge, many simultaneous targets.
Israel Iran War
- US-Israel-Iran War News Live Updates: UAE embassy in Iraq attacked, Hezbollah drones target Israel
- Commercial LPG Supply Disruption: Hotels face shutdowns in major cities; govt forms panel
- How much has US-Iran war hit India’s oil, LPG, LNG supply? Top 10 points to know on petrol, diesel prices, LPG supply
CloudSEK’s lead researcher Ibrahim Saify told TOI the team began by mapping threat actors targeting industrial control systems: the energy grids, water plants, and traffic infrastructure that underpin national ecosystems. One group kept surfacing.
“We came across CyberAv3ngers,” Saifi says, adding: “Not all threat actor groups have a very complex TTP or are technically sophisticated. And yet they were using AI Large Language Models (LLMs), ChatGPT, for their reconnaissance phase.”
Decade of Escalation
The report traces Iranian cyber operations to 2012, when the Shamoon wiper destroyed 30,000 endpoints at Saudi Aramco, an operation requiring nation-state resources and industrial expertise. In 2017, the TRITON malware targeted safety systems at a Saudi petrochemical plant, the only malware confirmed to attack industrial safety instrumented systems. Both reflected years of capability building.
What AI Changed
In Oct 2024, OpenAI disclosed that CyberAv3ngers accounts had used ChatGPT during reconnaissance. Queries in its threat intelligence report sought default credentials for industrial routers, ways to scan networks for ICS devices, guidance on Modbus scripts, and methods to obfuscate post-compromise tools. OpenAI said the responses offered little beyond a standard web search. CloudSEK researchers argue the point is different.
“The significance is not that AI created new attack capabilities,” the report notes. “It is that AI eliminated the research phase.” A single session can produce the right Shodan query (search for internet-connected devices, services, and vulnerabilities using filters), confirm default credentials, and explain unfamiliar protocols, compressing weeks of background work into minutes.
To illustrate this, CloudSEK replicated the CyberAv3ngers approach as a passive exercise. Using AI-generated Shodan queries, researchers located live industrial systems in the US. “Submitting one public URL to an AI system produced a threat profile: a Siemens SIMATIC CP 343-1 device, operating in RUN mode, not locked, with accessible management pages and a plain-language explanation of potential attacker actions,” as per the report. Another device found was a Schneider Electric power meter with an unauthenticated interface.
The Threat Pool
The current conflict has triggered the largest single activation of Iranian-aligned cyber actors on record, according to Palo Alto’s Unit 42, which assessed a Telegram mobilisation on March 2.
At the top are established state-linked groups such as APT33, known for password-spray attacks on US energy firms, MuddyWater, active with updated tools, and APT34, believed to be quietly pre-positioning in energy and finance networks.
“Below them are groups like Handala Hack Team, linked to Iran’s MOIS and known for wipers, ransomware, and supply-chain intrusions. At the bottom are more than 60 newly activated groups since Feb 28, often less skilled and more likely to rely on AI assistance,” the report said.
The Attack Surface
The report cites data from ReliaQuest showing that OT and ICS internet exposure rose 35% year-over-year in the first half of 2025. Unitronics port 20256 exposure specifically surged 160% over the same period — despite two years of CISA advisories explicitly naming that port and that vendor following the Aliquippa attack. The advisories exist. The exposure grew anyway.
The attack that hit Aliquippa can possibly be scripted in under 50 lines of Python: pull a list of Unitronics devices on port 20256 from a Shodan query, attempt the default credential, log results. One operator, no industrial knowledge, many simultaneous targets.
Popular from World
- US sends B-1 Bombers to Iran as Hegseth warns of ‘most intense’ strikes
- Warmonger, Expansionist, Freedom Crusher: Donald Trump is just like other US presidents – except for one thing
- Fuel crisis: Major UAE oil refinery shut after drone attack; global energy body calls 'emergency meeting'
- 'He'll not live in peace': Trump on Iran new leader Mojtaba Khamenei, says willing to talk to Tehran
- Shots fired at US consulate in Toronto; Canada calls it 'national security incident'
end of article
Trending Stories
- US-Israel-Iran War News Live Updates: UAE embassy in Iraq attacked, Hezbollah drones target Israel
- 'Ispe mein kya bolun?': Ishan Kishan gets annoyed after winning T20 World Cup 2026 title - Watch
- Arshdeep Singh penalised by ICC following India's T20 World Cup triumph
- Youth Congress Shirtless Protest: BJP slams Rahul Gandhi for backing AI Summit demo; court reserves bail order
- How much has US-Iran war hit India’s oil, LPG, LNG supply? Top 10 points to know on petrol, diesel prices, LPG supply
- Natural Gas (Supply Regulation) Order, 2026: India invokes Essential Commodities Act; priority sectors get assured supply
- Gold, Silver Rate Today Live Updates: Gold prices rise as Trump indicates possible end to war; what's the outlook?
Featured in world
- US-Israel-Iran War News Live Updates: UAE embassy in Iraq attacked, Hezbollah drones target Israel
- NASA warns! 1,300-pound satellite set to fall toward Earth on March 10 after 14 years in orbit
- Sakura sparks controversy after breakup with Jason “Jasontheween” admits next relationship may not be public
- US Navy has not escorted a tanker through Strait of Hormuz but...: White House clarifies energy secretary's deleted post
- Police officer and suspect shot during active shooter incident in Baltimore
- Fuel crisis: Major UAE oil refinery shut; global energy body calls 'emergency meeting'
Photostories
- Meet Marta Ortega Pérez: The billionaire heiress redefining the Zara empire
- How to make Street-Style Chowmein at home
- 10 countries with the most cultural influence in the world
- LPG Gas Cylinder Shortage: 7 popular gas-stove dishes you can make in a microwave
- Rashmika Mandanna and Vijay Deverakonda’s Pradhanam-Mehendi festivities were a kaleidoscope of couture and tradition | See photos
- Fake turmeric powder in the market? How to check the purity of turmeric powder at home and 5 ways to consume it
- Interstellar, Einstein and the strange elasticity of time
- Rumoured couple Trisha Krishnan and Vijay Thalapathy step out in matching style – is this twinning intentional?
- Inside Mohammed Siraj’s Car Collection: 5 luxury cars owned by the Indian fast bowler
- Normal BP but frequent headaches? Cardiologist explains hidden hypertension warning signs and why regular monitoring is key to preventing heart disease
Videos
08:17 Iran Unleashes Kheybar Shekan Missiles On Tel Aviv As Sirens Wail Across Israel | Watch10:01 US Seeks Ukraine's Help To Tackle Iranian Shahed Drones After Bases Suffer Strikes in Middle East14:18 Hegseth Warns Iran, Then Fumbles When Asked About Russia's Entry | Watch09:06 Iran War: Putin Steps In As China Demands Ceasefire After Trump’s New Threat To Tehran10:25 US Patriot Missile Hits Bahrain Homes; Shocking Malfunction Embarrasses Trump? | Iran War08:01 Iran Says '10 US Radar Systems Destroyed' As War Intensifies | Trump Issues New Threat05:03 Desalination Plants: Water, Not Oil, Is the Key Strategic Commodity In the Iran War | EXPLAINED10:20 'Haifa Refinery Targeted': Iran Says Drones Fired Toward Israeli Energy Hub In Northern Israel09:26 Iran Rejects Ceasefire With Israel & U.S.? Tehran Says 'MISSILES WILL SPEAK' As Trump Signals Truce
Up Next
Start a Conversation
Post comment