Iranian IOCONTROL Malware: The CyberAv3ngers’ New IoT Menace to Critical Infrastructure in Israel and the U.S.
Iranian threat actors are flexing their coding prowess with the malware IOCONTROL, targeting IoT devices and OT/SCADA systems in Israel and the U.S. CyberAv3ngers, the group behind this, is making waves in hacking industrial systems. Remember, this malware’s not just a glitch in the matrix; it’s the main act!

Hot Take:
Who needs a Marvel supervillain when you’ve got CyberAv3ngers causing chaos with their evil genius malware, IOCONTROL? Clearly not satisfied with leaving gas stations alone, these digital villains are playing a high-stakes game of ‘IoT roulette’ with targets in the U.S. and Israel. If only they could channel their talents into a nice, peaceful hobby like knitting…
Key Points:
– Iranian threat actors, CyberAv3ngers, are deploying a new malware, IOCONTROL, targeting IoT and OT/SCADA systems in the U.S. and Israel.
– The malware is highly adaptable, affecting devices from various manufacturers, and is linked to significant disruptions in critical infrastructure.
– Claroty’s Team82 discovered and analyzed IOCONTROL, highlighting its nation-state cyberweapon characteristics.
– IOCONTROL uses sophisticated techniques, including MQTT protocol and DNS over HTTPS, to communicate and evade detection.
– The malware is currently undetectable by major antivirus engines, making it a formidable threat.