TLP: CLEAR No restrictions. Share freely. first.org/tlp.
What OT/ICS Leaders Need to Know in March 2026
March 16, 2026 Coverage Period: March 1-16, 2026
The threat level to US critical infrastructure OT/ICS environments is ELEVATED and rising. Iranian state-sponsored actors pre-positioned backdoors inside US bank, airport, and defense supply chain networks before the March 1 conflict, and those implants remain active regardless of Iran's near-total internet blackout. Iran has explicitly designated Google, Amazon, Microsoft, Nvidia, IBM, Oracle, and Palantir as "legitimate targets," with Iranian media specifically citing their offices and cloud infrastructure in Israel and Gulf countries, while CISA has lost approximately one-third of its workforce. Operators should immediately audit internet-exposed OT devices, eliminate default credentials, and verify that remote access architectures isolate user sessions from OT protocol layers.
Drawing from CISA/FBI/NSA/DC3 Joint Fact Sheet (June 2025) and Iranian targeting patterns:
|
Group |
Sponsor |
OT Capability |
Current Status
|
|---|---|---|---|
|
CyberAv3ngers |
IRGC-CEC |
IOCONTROL malware, PLC exploitation, wiper malware |
Active. 6 officials sanctioned. $10M bounty. |
|
APT33 (Elfin) |
IRGC |
Energy sector pre-positioning, PLC password spraying |
Active. Assessed access to multiple US energy networks. |
|
MuddyWater |
MOIS |
IT-layer backdoors near OT networks (Dindoor, Fakeset) |
Active. Confirmed inside US bank, airport, defense firms. |
|
APT34 (OilRig) |
MOIS |
Long-dwell energy access, OT pivot via network adjacency |
Covert pre-positioning assessed. |
|
Handala / Void Manticore |
MOIS-affiliated |
IT-layer disruption. Stryker attack (March 11-12). SEC 8-K filed. |
Highly active. Routing via Starlink during blackout. |
|
Cotton Sandstorm / Altoufan |
IRGC |
WezRat infostealer, WhiteLock ransomware, influence ops |
Reactivated March 1, 2026. Pre-positioned payloads. |
|
FAD Team (Fatimiyoun) |
Pro-regime militia |
SCADA/PLC claims (Israel), municipal breaches (US) |
Active March 2026. SCADA claims unverified. |
|
Date |
Event
|
|---|---|
|
March 1 |
Military strikes against Iran. Iran leadership killed. Internet drops to 1-4%. 60+ hacktivist groups mobilize. Electronic Operations Room launched. |
|
March 1-3 |
IRGC strikes AWS data centers in UAE and Bahrain. First kinetic targeting of commercial cloud infrastructure. |
|
March 1 |
Cotton Sandstorm reactivates. WezRat and WhiteLock pre-positioned against Israeli targets. |
|
March 5-6 |
Symantec discloses MuddyWater pre-positioned backdoors in US bank, airport, defense firms. |
|
March 9-10 |
Peak OT/ICS claims. IP camera scanning campaign against Hikvision/Dahua in Israel and Gulf states. |
|
March 11 |
CIS MS-ISAC warns US state and local governments to prepare for DDoS attacks and defacements from Iran/Russia-aligned hacktivist coalitions (CyberWire Daily, March 11, 2026). |
|
March 11-12 |
Handala (Void Manticore) attacks Stryker via Microsoft Intune remote-wipe. Stryker files SEC 8-K. More than 5,000 workers sent home in Ireland as a result of the disruption (Fox News; SOCRadar, March 2026). |
|
March 12 |
Iran designates Google, Amazon, Microsoft, Nvidia, IBM, Oracle, and Palantir as "legitimate targets," citing their offices and cloud infrastructure in Israel and Gulf countries. CISA launches Stryker investigation. Clemson University researchers identify 62 IRGC-linked fake social media accounts that pivoted to anti-US messaging after the initial airstrikes (CyberWire Daily, March 12, 2026). |
|
March 13 |
313 Team takes down Romania's National Tax Agency website for approximately one hour in retaliation for Romanian president's statements on US military base access. First confirmed European government target of the conflict (SOCRadar, March 2026). |
|
March 13-14 |
Quds Day ops: MEGINIM DATA SERVICES breach claim, 313 Team DDoS on 20 UAE domains, Hebrew University claim (40TB, unverified). |
|
March 15 |
Iran internet still at approximately 1%. Handala routing via Starlink. Cloudflare: operators "sheltering." |
What it is: A custom Linux backdoor built by Iran's IRGC Cyber Electronic Command, characterized by researchers as "a cyberweapon used by a nation-state to attack civilian critical infrastructure."
What it targets: PLCs, fuel management systems, IP cameras, routers, firewalls, and industrial devices from multiple vendors including Phoenix Contact and Red Lion.
How it hides: Uses MQTT (a standard IoT protocol) for command-and-control, blending with legitimate device traffic. Resolves C2 domains via DNS-over-HTTPS, bypassing traditional DNS monitoring. AES-256-CBC encryption. Achieved 0/66 VirusTotal detection at disclosure (now 34/62).
Why it matters: IOCONTROL is not opportunistic tooling. It is a modular, persistent platform designed to maintain access across heterogeneous OT/IoT device landscapes. It has already compromised hundreds of fuel management systems and at least 34 US wastewater PLCs.
This bulletin is designed for distribution to OT/ICS leadership and board-level stakeholders. It draws exclusively from publicly available government advisories, vendor research, and vetted journalism.
Table of Contents
See Protocol Isolation in Action. Walk through the architecture with your own Wireshark capture.