Iranian APTs Intensify Cyberattacks on U.S. Transportation and Manufacturing Sectors

Table of Contents

πŸ“… July 11, 2025 | ⏱ 6 min read |β€ƒπŸ” Category: Cyber Threat Intelligence

In a significant escalation of cyber warfare, Iranian state-sponsored threat actors have ramped up their attacks on critical infrastructure in the United States, particularly targeting the Transportation and Manufacturing sectors. This surge, marked by a 133% increase in malicious activity during May and June 2025, coincides with rising geopolitical tensions linked to the recent Iranian conflict.

A Shift in Cyber Warfare Strategy

The dramatic rise in attacks represents a strategic shift in Iranian cyber operations, with threat intelligence data documenting 28 incidents over the two-month period, compared to just 12 in the previous quarter. This aggressive campaign has prompted urgent warnings from the Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Department of Homeland Security, emphasizing the need for heightened security measures across industrial and critical infrastructure organizations.

Key Players in the Campaign

Nozomi Networks Labs has identified six prominent Iranian Advanced Persistent Threat (APT) groups orchestrating these sophisticated attacks: MuddyWater, APT33, OilRig, CyberAv3ngers, FoxKitten, and Homeland Justice. These groups have demonstrated remarkable persistence and technical sophistication, employing diverse attack vectors tailored to compromise operational technology environments and industrial control systems.

Notable Incidents and Techniques

MuddyWater has emerged as the most prolific threat actor during this campaign, successfully breaching at least five U.S. companies within the targeted sectors. APT33 followed closely, targeting three American organizations, while OilRig, CyberAv3ngers, FoxKitten, and Homeland Justice each compromised at least two companies during the observed timeframe.

A particularly concerning development involves CyberAv3ngers’ reuse of command and control infrastructure associated with previous campaigns. Security researchers discovered that the group recycled an IP address linked to the deployment of OrpaCrab, also known as IOCONTROL malware, first identified in December 2024. This operational technology-focused malware poses a significant threat to industrial environments, capable of manipulating programmable logic controllers and other critical systems.

Implications and Recommendations

The reuse of infrastructure by CyberAv3ngers indicates a calculated approach to resource management and potentially reflects confidence in their operational security measures. Organizations are advised to monitor for indicators of compromise, including IP addresses 159.100.6[.]69, 169.150.227[.]230, and 95.181.161[.]50, among other malicious infrastructure identified in ongoing threat intelligence operations.

A Call for Enhanced Security Measures

As Iranian APTs continue to intensify their cyberattacks, it is imperative for organizations within the Transportation and Manufacturing sectors to bolster their cybersecurity defenses. This includes implementing advanced threat detection systems, conducting regular security audits, and ensuring robust incident response plans are in place. By staying vigilant and proactive, organizations can better protect themselves against these sophisticated threats.

Written by: Jack Hultgren

Cyberix

https://www.cyberixsafe.com

Picture of Nisar Nikzad
Nisar Nikzad

Nisar is a Federal Contracting Expert and Cybersecurity Professional with nearly two decades of experience in Government procurement and Compliance. He is the founder and CEO of Cyberix, where he helps organizations navigate Federal acquisition requirements and cybersecurity challenges through practical, strategic solutions.