Malware Mayhem: IOCONTROL Targets IoT in Israel and US – A Cybersecurity Comedy of Errors!
Iran-affiliated threat actors are spicing up the cyber scene with a new malware called IOCONTROL, targeting IoT and OT devices in Israel and the US. This malware is like a Swiss Army knife, able to attack IP cameras, routers, and more. It’s basically the James Bond of malware, minus the tuxedo and British accent.

Hot Take:
Who knew Iran’s cyber villains had a flair for multitasking? While most of us are just trying to keep our Wi-Fi from crashing during Netflix binges, they’re crafting malware that turns your IoT devices into unwitting accomplices in their cyber escapades. IOCONTROL: the malware that says, “Why just hack when you can hack with style?”
Key Points:
- IOCONTROL is a new malware targeting IoT and OT environments, linked to Iran-affiliated threat actors.
- Designed to attack SCADA devices like IP cameras, routers, PLCs, and firewalls.
- Malware uses MQTT messaging protocol and Cloudflare’s DoH service to disguise its activities.
- Extracted from a compromised Gasboy fuel management system, allowing potential fuel service disruptions and credit card theft.
- IOCONTROL adds to a notorious list of ICS-targeting malwares, including Stuxnet and Havex.
Already a member? Log in here
