Critical Infrastructure Security
,
Cyberwarfare / Nation-State Attacks
,
Fraud Management & Cybercrime
Experts Cite Prepositioning Risk in Iranian Cyber Operations Amid Escalating War

Warnings from Iranian-linked hacking groups threatening “irreparable damages” to U.S. water systems are raising concerns across the federal cybersecurity community – as officials weigh both the credibility of the threat and the government’s ability to respond amid ongoing cyber resource strains.
See Also: Roundtable Wrap: Cybersecurity Over Next 4 Years
The reported threat involves a coalition of pro-Iranian hacking groups signaling potential retaliation against U.S. critical infrastructure – including water and wastewater systems – if geopolitical tensions continue to escalate.
“Recent geopolitical escalation involving Iran has elevated the cybersecurity risk and threat environment for U.S. organizations – particularly those operating critical infrastructure,” said Kevin Greene, former program manager at the Department of Homeland Security’s Science and Technology Directorate.
Greene, now public sector chief technology strategist at BeyondTrust, said similar periods have historically coincided with a rise in cyber intrusion activity from state-aligned actors and affiliated groups.
“The more immediate concern is whether Iranian-aligned actors may already be prepositioned to activate operations,” he said, warning that attackers often rely on existing access rather than new intrusions.
Iranian-linked attacks on critical infrastructure have become a central concern for federal defenders in recent weeks, who have increasingly warned that adversaries are shifting toward persistence and prepositioning inside networks, allowing them to move quickly when geopolitical conditions change.
“The tradecraft has not changed, but the timeline has,” Greene told ISMG. “Escalation increases the probability of activation – and privilege scope and exposure determine the scale of impact.”
Iranian cyber operations have long blended espionage, disruption and influence campaigns, often using a mix of state-directed teams and loosely affiliated proxy groups to expand operational reach.
Agnidipta Sarkar, chief evangelist at ColorTokens, said the ecosystem of Iranian cyber actors is both mature and highly aggressive – with groups including APT42, MuddyWater, CyberAv3ngers and Handala demonstrating a range of capabilities across espionage and destructive operations (see: Handala Hacks FBI Director Kash Patel’s Personal Email).
“Iranian cyber attackers constitute a mature, well-resourced and highly aggressive threat ecosystem,” Sarkar said, adding that many operate with ideological motivations tied to geopolitical developments.
He said groups such as CyberAv3ngers have already targeted operational technology and cyber-physical systems tied to critical infrastructure, including water and energy environments, and have shown a willingness to shift from stealthy access to disruptive or destructive attacks.
“They need to be considered a credible threat because they launch attacks for ideological reasons,” Sarkar said. “Most of these attackers are more focused on causing damage than on their own survival.”
The focus on disruption over financial gain distinguishes Iranian hackers from traditional cybercriminals, experts told ISMG, and raises the risk that attacks may prioritize operational impact or public fear over monetization. Additional insights from the industrial cybersecurity firm Dragos suggests that while the threat is credible, the current landscape is also being shaped by a surge in loosely coordinated activity and amplified claims.
Dawn Cappelli, director of OT-CERT at Dragos, told ISMG that her team has observed a significant increase in hacktivist claims tied to Iranian actors – though not all reflect new or independently verified compromises.
“The Dragos Intelligence team has seen a big increase in hacktivism claims associated with the Iranian threat. Some appear to be true cyberattacks but some are exaggerated or repeated claims of prior compromises,” Cappelli said.
Hacktivist groups tend to operate opportunistically, targeting exposed operational technology devices and infrastructure environments that lack basic security controls, she said.
“These groups tend to be opportunistic, using OT devices exposed to the internet with default or no credentials, or known vulnerabilities in firewalls, VPNs and remote monitoring management tools to gain access and disrupt operations,” Cappelli said.
The water sector is a particularly exposed target, due in part to its reliance on aging infrastructure, limited cybersecurity resources and increasing integration of digital systems with physical operations (see: Weak and Exposed: US Water Utilities a Chinese Hacker Target).
“Unfortunately, water and wastewater systems have been compromised in the past by these groups, as that sector lags most other sectors in OT cybersecurity and therefore often provides an easy target,” Cappelli said.
That assessment aligns with broader warnings from experts who say public water utilities face a combination of outdated systems, weak cybersecurity practices and limited funding for modernization.
Preparedness across the sector also remains uneven, with many smaller utilities lacking both the financial resources and technical expertise to defend against sophisticated threats. Efforts to close those gaps have been slow, even as industry groups and federal partners push for greater adoption of shared defense programs and baseline cybersecurity practices.
The challenge of combatting potential Iranian-linked cyberattacks has been compounded by broader constraints affecting federal cybersecurity efforts, including disruptions tied to the Department of Homeland Security, which oversees CISA’s engagement with critical infrastructure sectors. Experts say that while federal agencies continue to provide alerts and guidance, resource strain and reduced operational capacity may limit proactive outreach and support to smaller, more vulnerable utilities (see: Hacking the Floodgates: US Dams Face Growing Cyber Threats).
The White House did not immediately respond to a request for comment.
