{"id":5723,"date":"2026-03-10T21:06:04","date_gmt":"2026-03-10T21:06:04","guid":{"rendered":"https:\/\/d.sheep-mine.ts.net\/?p=5723"},"modified":"2026-03-10T21:06:04","modified_gmt":"2026-03-10T21:06:04","slug":"129414081-cms","status":"publish","type":"post","link":"https:\/\/d.sheep-mine.ts.net\/?p=5723","title":{"rendered":"How AI may have handed Iran\u2019s proxies a map to US infra &#8211; The Times of India"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div>\n<div class=\"MwN2O\">\n<div class=\"vdo_embedd\">\n<div class=\"T22zO\">\n<section class=\"D3Wk1  clearfix id-r-component leadmedia undefined undefined  VtlfQ \" style=\"top:0px\">\n<div class=\"D3Wk1\" data-ua-type=\"1\" onclick=\"stpPgtnAndPrvntDefault(event)\">\n<div class=\"zPaFh\">\n<div class=\"wJnIp\"><img src=\"https:\/\/static.toiimg.com\/thumb\/msid-129414326,imgsize-454951,width-400,resizemode-4\/-.jpg\" alt=\"How AI may have handed Iran\u2019s proxies a map to US infra\" decoding=\"async\" fetchpriority=\"high\"\/><\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div><\/div>\n<\/div>\n<p>BENGALURU: Within hours of US and Israeli strikes hitting Iran on Feb 28, over 50 hacktivist groups aligned with Iranian interests had activated on Telegram. Many possibly had no background in industrial control systems and no state direction.<!-- --> <span class=\"id-r-component br\" data-pos=\"3\"\/>What they had was an internet connection and an AI tool that could hand them a working map of vulnerable US infrastructure. That combination \u2014 motivated actors, accessible AI, and a growing attack surface \u2014 is the central argument of a new report from cybersecurity firm CloudSEK.<span class=\"id-r-component br\" data-pos=\"5\"\/>CloudSEK\u2019s lead researcher Ibrahim Saify told TOI the team began by mapping threat actors targeting industrial control systems: the energy grids, water plants, and traffic infrastructure that underpin national ecosystems. One group kept surfacing.<span class=\"id-r-component br\" data-pos=\"10\"\/> <span class=\"id-r-component br\" data-pos=\"12\"\/><\/p>\n<div class=\"lOvcW vdo_embedd\">\n<div class=\"k7lcu\">\n<p>Iran War: Putin Steps In As China Demands Ceasefire After Trump\u2019s New Threat To Tehran<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"id-r-component br\" data-pos=\"15\"\/>\u201cWe came across CyberAv3ngers,\u201d Saifi says, adding: \u201cNot all threat actor groups have a very complex TTP or are technically sophisticated. And yet they were using AI Large Language Models (LLMs), ChatGPT, for their reconnaissance phase.\u201d<span class=\"id-r-component br\" data-pos=\"17\"\/>Decade of Escalation<span class=\"id-r-component br\" data-pos=\"19\"\/>The report traces Iranian cyber operations to 2012, when the Shamoon wiper destroyed 30,000 endpoints at Saudi Aramco, an operation requiring nation-state resources and industrial expertise. In 2017, the TRITON malware targeted safety systems at a Saudi petrochemical plant, the only malware confirmed to attack industrial safety instrumented systems. Both reflected years of capability building.<span class=\"id-r-component br\" data-pos=\"23\"\/>By late 2023 the pattern shifted. The Iranian group CyberAv3ngers began targeting Israel\u2019s Unitronics programmable logic controllers. On Nov 25, 2023, they breached the Municipal Water Authority of Aliquippa, Pennsylvania using the default password \u201c1111\u201d, listed in manuals and prior CISA (Cybersecurity and Infrastructure Security Agency) advisories. <!-- -->CISA later confirmed breaches in 75 or more US industrial control system devices.<span class=\"id-r-component br\" data-pos=\"27\"\/>What AI Changed<span class=\"id-r-component br\" data-pos=\"29\"\/>In Oct 2024, OpenAI disclosed that CyberAv3ngers accounts had used ChatGPT during reconnaissance. Queries in its threat intelligence report sought default credentials for industrial routers, ways to scan networks for ICS devices, guidance on Modbus scripts, and methods to obfuscate post-compromise tools. OpenAI said the responses offered little beyond a standard web search. <!-- -->CloudSEK researchers argue the point is different.<span class=\"id-r-component br\" data-pos=\"33\"\/>\u201cThe significance is not that AI created new attack capabilities,\u201d the report notes. \u201cIt is that AI eliminated the research phase.\u201d A single session can produce the right Shodan query (search for internet-connected devices, services, and vulnerabilities using filters), confirm default credentials, and explain unfamiliar protocols, compressing weeks of background work into minutes.<span class=\"id-r-component br\" data-pos=\"36\"\/>To illustrate this, CloudSEK replicated the CyberAv3ngers approach as a passive exercise. Using AI-generated Shodan queries, researchers located live industrial systems in the US. \u201cSubmitting one public URL to an AI system produced a threat profile: a Siemens SIMATIC CP 343-1 device, operating in RUN mode, not locked, with accessible management pages and a plain-language explanation of potential attacker actions,\u201d as per the report.<!-- --> Another device found was a Schneider Electric power meter with an unauthenticated interface.<span class=\"id-r-component br\" data-pos=\"40\"\/>The Threat Pool<span class=\"id-r-component br\" data-pos=\"42\"\/>The current conflict has triggered the largest single activation of Iranian-aligned cyber actors on record, according to Palo Alto\u2019s Unit 42, which assessed a Telegram mobilisation on March 2.<span class=\"id-r-component br\" data-pos=\"44\"\/>At the top are established state-linked groups such as APT33, known for password-spray attacks on US energy firms, MuddyWater, active with updated tools, and APT34, believed to be quietly pre-positioning in energy and finance networks.<span class=\"id-r-component br\" data-pos=\"47\"\/>\u201cBelow them are groups like Handala Hack Team, linked to Iran\u2019s MOIS and known for wipers, ransomware, and supply-chain intrusions. At the bottom are more than 60 newly activated groups since Feb 28, often less skilled and more likely to rely on AI assistance,\u201d the report said.<span class=\"id-r-component br\" data-pos=\"49\"\/>The Attack Surface<span class=\"id-r-component br\" data-pos=\"51\"\/>The report cites data from ReliaQuest showing that OT and ICS internet exposure rose 35% year-over-year in the first half of 2025. <!-- -->Unitronics port 20256 exposure specifically surged 160% over the same period \u2014 despite two years of CISA advisories explicitly naming that port and that vendor following the Aliquippa attack. The advisories exist. The exposure grew anyway.<span class=\"id-r-component br\" data-pos=\"55\"\/>The attack that hit Aliquippa can possibly be scripted in under 50 lines of Python: pull a list of Unitronics devices on port 20256 from a Shodan query, attempt the default credential, log results. One operator, no industrial knowledge, many simultaneous targets. <\/div>\n\n<p><a href=\"https:\/\/timesofindia.indiatimes.com\/world\/middle-east\/how-ai-may-have-handed-irans-proxies-a-map-to-us-infra\/articleshow\/129414081.cms\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BENGALURU: Within hours of US and Israeli strikes hitting Iran on Feb 28, over 50&#8230;<\/p>\n","protected":false},"author":1,"featured_media":5724,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[15172,15174,15175,15176,15173],"class_list":["post-5723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-ai-in-cyber-attacks","tag-chatgpt-reconnaissance","tag-cyberav3ngers","tag-industrial-control-systems","tag-iran-cyber-operations"],"_links":{"self":[{"href":"https:\/\/d.sheep-mine.ts.net\/index.php?rest_route=\/wp\/v2\/posts\/5723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d.sheep-mine.ts.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/d.sheep-mine.ts.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/d.sheep-mine.ts.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/d.sheep-mine.ts.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5723"}],"version-history":[{"count":0,"href":"https:\/\/d.sheep-mine.ts.net\/index.php?rest_route=\/wp\/v2\/posts\/5723\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d.sheep-mine.ts.net\/index.php?rest_route=\/wp\/v2\/media\/5724"}],"wp:attachment":[{"href":"https:\/\/d.sheep-mine.ts.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d.sheep-mine.ts.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/d.sheep-mine.ts.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}