On June 30, 2025, the Cybersecurity and Infrastructure Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Defense Cyber Crime Center (DC3), and the National Security Agency (NSA) warned U.S. critical infrastructure organizations and other companies that the threat of cyber attacks from Iran-affiliated cyber actors is heightened in the wake of the Iran conflict. The agencies cautioned that the risk is particularly high for Defense Industrial Base (DIB) companies with Israeli ties. This warning was issued shortly after the New York Department of Financial Services provided similar guidance to companies in the financial sector, which we discussed here.
In addition to distributed denial of service (DDoS) and ransomware attacks, the agencies explained that malicious actors may target operational technology (OT) connected to the public internet to perpetrate attacks. A variety of mitigation measures for critical infrastructure companies are listed, such as:
- Identifying and disconnecting OT and industrial control systems (ICS) assets from the public internet;
- Ensuring devices and accounts are protected with strong, unique passwords (if not using MFA) and replacing weak or default passwords;
- Implementing phishing-resistant MFA for OT network access;
- Applying the latest manufacturer patches for internet-facing systems;
- Prioritizing the monitoring of user access logs for remote access to OT networks and firmware or configuration changes; and
- Ensuring incident response and business continuity plans are in place, reviewing and rehearsing these plans, and updating them based on the results.
Click here to read the full guidance.