CyberAv3ngers | |
Other Names | CyberAveng3rs |
Location | Iran |
Date of initial activity | 2020 |
Suspected Attribution | State-sponsored threat group |
Associated Groups | Soldiers of Solomon |
Government Affiliation | Yes |
Motivation | Cyberwarfare |
Associated Tools | Crucio Ransomware |
Overview
CyberAv3ngers is an Advanced Persistent Threat (APT) group associated with the Iranian Government’s Islamic Revolutionary Guard Corps (IRGC). Emerging in 2020, CyberAv3ngers has been known for its targeted cyberattacks against critical infrastructure, particularly focusing on Israeli entities. This group, also known under variations like CyberAveng3rs or Cyber Avengers, has been linked to several high-profile attacks and defacement operations, leveraging sophisticated techniques to compromise and manipulate operational technology. Their recent activities include targeting U.S. water and wastewater systems by exploiting vulnerabilities in programmable logic controllers (PLCs), highlighting their ongoing and evolving threat to global infrastructure security.
Upgrade Device Firmware: Ensure that PLCs, particularly Unitronics Vision Series devices, are updated to the latest firmware versions. For instance, VisiLogic version 9.9.00 addresses vulnerabilities related to default passwords. This update requires users to change default passwords, reducing the risk of unauthorized access.
Change Default Passwords: Immediately update default passwords on all PLCs and other critical devices. Use strong, unique passwords to enhance security and prevent exploitation through brute force attacks.
Disconnect from Public Internet: If feasible, disconnect PLCs and other critical infrastructure devices from public-facing internet connections. This reduces the attack surface and mitigates the risk of remote exploitation.
Implement Multifactor Authentication (MFA): Where possible, deploy multifactor authentication for access to OT networks and systems. This adds an additional layer of security beyond just passwords.
Use Firewalls and VPNs: For remote access requirements, use firewalls and virtual private networks (VPNs) to control network access. Ensure that VPNs or gateway devices support multifactor authentication to secure remote connections.
Create Strong Backups: Regularly create and maintain strong backups of PLC configurations and logic. This allows for quick recovery in case of a ransomware attack or other forms of cyber intrusion.
Monitor and Update Security Practices: Continuously monitor and update security practices to address new threats and vulnerabilities. Stay informed about the latest security patches and updates from device manufacturers.
Engage with Third-Party Vendors: Ensure that third-party vendors involved in managing or maintaining critical infrastructure devices are also applying recommended security measures to mitigate risks.
Common targets
Attack Vectors
Bruteforce Attacks
Credential Based attacks