Iranian cyber operations this week moved from geopolitical signal to measurable industrial damage. CISA confirmed that PLC disruptions and financial losses have already occurred at U.S. water, energy, and government facilities, not as a warning of what might happen, but as an accounting of what did. A WordPress plugin update that was live for six hours reached 900,000 websites and deployed one of the more technically sophisticated persistence toolkits seen in a supply chain compromise this year. And the FBI formally told Congress that China got inside the system the bureau uses to manage its wiretaps.
The attack surface this week is not a vulnerability database entry. It is the industrial controller that’s been internet-accessible for four years because nobody prioritized moving it, the plugin auto-update your team enabled because it seemed like good hygiene, and the surveillance infrastructure that turned out to be reachable through a commercial ISP.
This week: three incidents with confirmed victim impact and a significant update on a story from last week that has new financial and operational dimensions.
1. Iranian APT Confirmed Disrupting U.S. Energy, Water, and Government PLCs
What happened:
A group of Iranian-affiliated APT actors has been conducting exploitation activity targeting internet-facing OT devices, including Rockwell Automation/Allen-Bradley PLCs, across multiple U.S. critical infrastructure sectors, including government services and facilities, water and wastewater systems, and the energy sector. The FBI, CISA, NSA, EPA, DOE, and U.S. Cyber Command issued a joint advisory on April 7 confirming this was not a theoretical warning: these attacks have led to diminished PLC functionality, manipulation of display data and, in some cases, operational disruption and financial loss.
Technical details that matter:
The actors used leased, third-party hosted infrastructure with configuration software, specifically Rockwell Automation’s Studio 5000 Logix Designer, to create an accepted connection to the victim’s PLC. Targeted devices include CompactLogix and Micro850 PLC devices. Upon obtaining initial access, the threat actors established command-and-control by deploying Dropbear SSH software on victim endpoints via port 22 to enable remote access and facilitate extraction of device project files and manipulation of data on HMI and SCADA displays.
The advisory portscope is the detail defenders are most likely to underweight. The IOCs include traffic on port 102 (S7comm, a Siemens protocol), alongside port 44818 for EtherNet/IP and port 502 for Modbus. Those protocols span multiple manufacturers, proving this is more than just a Rockwell problem. The TTP is elegant in its simplicity: no zero-days required. The attacker uses legitimate engineering software to connect to internet-exposed PLCs the same way an authorized technician would. Malicious activity is indistinguishable from normal OT workflow to any detection tool not specifically tuned to flag overseas IP addresses hitting industrial ports.
Why critical institutions should care:
When an adversary can manipulate a project file or an HMI, they effectively hijack the physical source of truth, causing physical consequences. Operational disruption at water and energy facilities is not an abstract risk this week; it is a confirmed outcome. The Siemens and Modbus protocol entries in the IOC list extend the exposure well beyond the Rockwell install base that’s getting headline attention. Any organization in water, energy, or government facilities needs to verify PLC internet exposure and validate firewall rules on OT ports before the next news cycle.
Key sources:
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a
- https://thehackernews.com/2026/04/iran-linked-hackers-disrupt-us-critical.html
- https://www.securityweek.com/iran-linked-hackers-disrupt-us-critical-infrastructure-via-plc-attacks/
- https://www.securityweek.com/industry-reactions-to-iran-hacking-ics-in-critical-infrastructure-feedback-friday/
2. Smart Slider 3 Pro: Weaponized Auto-Update Hits 900,000 Sites in Six Hours
What happened:
An unauthorized party gained access to Nextend’s update infrastructure and distributed a fully attacker-authored build through the official update channel. Any site that updated to 3.5.1.35 between its release on April 7, 2026 and its detection approximately 6 hours later received a fully weaponized remote access toolkit. Smart Slider 3 for WordPress is used on over 900,000 websites for responsive slider creation. The attack affected both WordPress and Joomla installations, with only the Pro edition compromised. The vendor advises that any site that auto-updated during the window should be treated as fully breached, not merely exposed.
Technical details that matter:
Patchstack’s analysis of the trojanized build reveals a professionally engineered multi-stage persistence toolkit, not a simple webshell:
The malicious kit allows a remote attacker to execute commands without authentication via crafted HTTP headers, includes a second authenticated backdoor with both PHP eval and OS command execution, and includes automated credential theft. The malware achieves persistence through multiple layers, including the creation of a hidden admin account and storing credentials in the database. It also creates a ‘mu-plugins’ directory with a must-use plugin filename pretending to be a legitimate caching component. Must-use plugins are loaded automatically, cannot be disabled from the WordPress dashboard, and are not visible in the plugins section.
The persistence architecture is specifically designed to survive partial remediation. Unlike the other persistence layers, this backdoor does not depend on the WordPress database but reads its authentication key from a .cache_key file stored in the same directory, meaning it continues to work even if WordPress fails to bootstrap fully. Changing database credentials leaves this layer intact. The malware exfiltrates the site URL, secret backdoor key, hostname, WordPress version, PHP version, WordPress admin email, database name, plaintext administrator credentials, and a full list of all installed persistence methods to the C2 domain “wpjs1[.]com.”
Why critical institutions should care:
This incident is a textbook supply chain compromise, the kind that renders traditional perimeter defenses irrelevant. Generic firewall rules, nonce verification, role-based access controls: none of them apply when the malicious code is delivered through the trusted update channel. The plugin is the malware. Any organization running WordPress with auto-updates enabled across internal portals, staff intranets, or healthcare-adjacent web properties needs to verify their Smart Slider install status immediately. The sophistication of the persistence toolkit, specifically its ability to survive database credential rotation, tells you the attacker expected defenders to do a partial remediation and walk away believing they were clean.
Key sources:
- https://patchstack.com/articles/critical-supply-chain-compromise-in-smart-slider-3-pro-full-malware-analysis/
- https://www.bleepingcomputer.com/news/security/smart-slider-updates-hijacked-to-push-malicious-wordpress-joomla-versions/
- https://thehackernews.com/2026/04/backdoored-smart-slider-3-pro-update.html
- https://smartslider.helpscoutdocs.com/article/2144-wordpress-security-advisory-smart-slider-3-pro-3-5-1-35-compromise
3. China Breaches FBI Wiretap Management System, Labeled a “Major Incident”
What happened:
The system at the center of the breach is an unclassified component of the FBI’s Digital Collection System Network (DCSNet), the bureau’s internal infrastructure used to manage court-authorized wiretaps and foreign intelligence surveillance requests, specifically DCS-3000 (known as Red Hook). The system processes pen register and trap-and-trace surveillance operations, which law enforcement use to monitor calls made to or from a specific phone or websites visited by an internet-connected device. The breach was first detected on February 17, 2026, when FBI analysts noticed abnormal log activity, and targeted an unclassified internal network containing call metadata, surveillance returns, and the personal details of people under active FBI investigation. The FBI formally labeled it a “major incident” under FISMA and briefed Congress the first week of April. To the best of former FBI Cyber Division deputy assistant director Cynthia Kaiser’s knowledge, the FBI has not declared a major cyber incident since 2020.
Technical details that matter:
The FBI told Congress the attackers got into their system by “leveraging infrastructure from a commercial Internet service provider,” a third-party attack strategy that has become increasingly popular with threat actors for penetrating high-security systems. No group has been formally named, but investigators have focused attention on Salt Typhoon, the threat actor linked to China’s Ministry of State Security, which between 2019 and 2024 breached all three major U.S. cellular providers, siphoning call records from tens of millions of Americans and accessing FBI wiretap infrastructure. Pivoting through a commercial ISP to reach a downstream federal network is consistent with Salt Typhoon’s documented playbook of compromising the carrier layer rather than attacking federal systems directly. The hack targeted FBI systems in the Virgin Islands, not FBI headquarters, suggesting the actors identified a lower-security node in the DCSNet architecture as their entry point, consistent with how this campaign has operated across every prior victim.
Why critical institutions should care:
The metadata exposed here is operationally more damaging than the “unclassified” label implies. Pen register and trap-and-trace returns tell a foreign intelligence service exactly who the FBI is currently surveilling, which includes any of their own operatives inside the United States. Foreign intelligence agencies can combine metadata from multiple breaches to construct detailed intelligence profiles. For non-government organizations, the structural lesson is the same one Salt Typhoon has been teaching since 2024: the ISP and carrier infrastructure connecting your facilities has been a confirmed attack vector into federal systems for years and remains largely unremediated at the industry level. Your connectivity layer is not a neutral pipe.
Key sources:
- https://www.nbcnews.com/news/us-news/fbi-labels-suspected-china-hack-law-enforcement-data-major-cyber-incid-rcna266495
- https://www.hstoday.us/fbi/fbi-labels-china-linked-hack-of-surveillance-system-a-major-cyber-incident/
- https://www.nextgov.com/cybersecurity/2026/04/suspected-chinese-breach-fbi-system-exposed-surveillance-targets-phone-numbers/412612/
- https://www.ibtimes.co.uk/fbi-major-cybersecurity-incident-chinese-hack-1789954
Update: Stryker Confirms Material Q1 Earnings Impact from March Handala Attack
Last week this column covered Handala’s ongoing operations after the FBI seized its domains and noted that the group’s Stryker attack had disrupted manufacturing and shipping across 79 countries. The financial picture is now formalized.
Stryker said in a regulatory filing on April 10 that the March cyberattack had a material impact on its first-quarter earnings. The March 11 incident was a wiper attack abusing the company’s Microsoft Intune environment. The attackers wiped data from thousands of company devices and briefly disabled Stryker’s electronic ordering systems. The U.K.’s National Health Service issued an update in March noting that certain Stryker orders in the days after the attack were impacted and an interim ordering system was set up.
The attackers wiped nearly 80,000 devices early that morning using a new Global Administrator account created after compromising a Windows domain admin account. CISA and Microsoft released guidance on securing Intune and hardening Windows domains to block similar attacks, and the FBI seized two websites used by the Handala hackers. The seizures had no material impact on Handala’s operations, as covered last week.
The Intune vector deserves a second mention here because it is underappreciated as a risk surface. An attacker with a compromised admin account issuing remote wipe commands through MDM generates no malware alerts, no lateral movement detections, and no anomalous binary executions. It looks like an administrator doing their job. Any organization running Microsoft Intune should be auditing Global Administrator accounts, enabling activity logging on bulk device operations, and requiring dual approval for high-impact MDM actions including remote wipe.
Key sources:
- https://www.cybersecuritydive.com/news/stryker-Iran-cyberattack-material-impact-earnings/817211/
- https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-fully-operational-after-data-wiping-attack/
The Pattern This Week
Two of this week’s three incidents share something with last week’s Trivy supply chain story: the attacker arrived through an authorized channel. Iran used legitimate Rockwell engineering software to connect to internet-exposed PLCs the same way a technician would. The Smart Slider attackers used the official plugin update pipeline. The Stryker update reinforces the same point from the MDM direction: wipe commands issued from a compromised admin account are indistinguishable from authorized IT operations.
The FBI breach is slightly different in structure but lands in the same place. The attacker didn’t breach federal infrastructure directly. They got there through a commercial ISP, a layer most defenders don’t monitor because it’s outside their perimeter.
The defense problem is not that these attacks are sophisticated. It is that they operate at the authorization layer, using credentials, software, and channels that your detection stack is configured to trust. Your SIEM is not alerting on an engineer connecting to a PLC with Studio 5000. It is not alerting on a plugin auto-updating through the vendor’s official channel. It is not alerting on an MDM admin issuing a wipe command.
One thing you can do today: Pull a list of every service, tool, or device in your environment that has internet access it doesn’t strictly need. OT devices, internal portals, admin panels, and legacy systems are the most common offenders. For each one, ask: if an attacker obtained valid credentials for this, what is the blast radius, and would we see it? That single audit will surface more exploitable exposure than a full penetration test in most environments.
See you next week.

