Iranian Hackers Unleash IOCONTROL Malware: A Comedy of Errors in Cybersecurity
CyberAv3ngers are back at it, unleashing their IOCONTROL malware like a bad sequel. This Iranian hacking group is targeting IoT and operational technology (OT) devices in the US and Israel. Forget sophisticated hacking; they’re banking on default passwords and exposed systems. The US is offering a $10 million reward for their capture!

Hot Take:
Iran’s got a new cyber toy, and it’s playing rough! CyberAv3ngers, the not-so-heroic hacktivist group, is on a mission to disrupt IoT and OT devices in the US and Israel. With malware named IOCONTROL, they’re not just controlling the narrative but also the water supply, gas pumps, and more. Who knew hacking could be this much of a splash?
Key Points:
- CyberAv3ngers, linked to Iran’s IRGC, targets IoT and OT devices in the US and Israel using IOCONTROL malware.
- They exploit unsecured industrial control systems with default credentials, causing disruptions in critical infrastructure.
- The US government is offering a $10 million reward for information on CyberAv3ngers.
- IOCONTROL malware uses MQTT protocol for command and control, enabling remote device control and lateral movement.
- The malware has been tied to disruptions in gas pumps in Israel and water facilities in Ireland and the US.
Already a member? Log in here
