Skip to content

Increased cyber aggressions traced back to Iranian groups targeting American essential infrastructure

Malicious actors from nation-states are leveraging weaknesses in solutions from Check Point Software, Palo Alto Networks, and various other vendors to launch attacks against numerous sectors.

increased cyber assaults originating from actors linked to Iran against critical U.S....
increased cyber assaults originating from actors linked to Iran against critical U.S. infrastructures

Increased cyber aggressions traced back to Iranian groups targeting American essential infrastructure

In a concerning development, Iran-linked actors have been collaborating with ransomware groups to launch attacks on critical infrastructure providers in the U.S. and foreign countries. This heightened activity, which has intensified since early 2025, particularly targets sectors such as transportation, manufacturing, water, energy, and healthcare.

The joint warning was issued by the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense Cyber Crime Center. Notably, these operations include defacements, data exfiltration, ransomware deployment, and pre-positioning for future geopolitical contingencies.

One such group, Pioneer Kitten, has been actively scanning IP addresses for potential vulnerabilities, including CVE-2024-24919 related to Check Point Security Gateways, in July. However, detailed information on their recent activities, including the exploitation of this vulnerability, has not been explicitly documented.

Pioneer Kitten has been observed working with high-profile ransomware actors such as AlphV, Ransomhouse, and NoEscape. The group has also been using the Tickler malware to attack federal and state governments, oil and gas, satellite and communications sectors in the U.S. and United Arab Emirates.

Before deploying the Tickler malware, the attackers have been abusing Azure infrastructure of targeted organizations for command and control. Microsoft researchers have warned about Peach Sandstorm, a threat actor linked to Iran's Islamic Revolutionary Guard Corps, deploying a custom backdoor called Tickler.

CISA officials declined to comment on the Iran-linked threat activity beyond what was issued in the advisory. Palo Alto Networks has provided customers with mitigation advice for the command injection vulnerability, CVE-2024-24919, which could allow an unauthenticated attacker to execute arbitrary code with root privileges.

It's worth noting that Patching vulnerabilities like these often involves complex processes, potential downtime, and risk of disrupting critical services. According to researchers from Tenable, only about half of the vulnerable assets have been properly remediated.

U.S. cybersecurity authorities, such as the Department of Homeland Security and industrial cybersecurity researchers like Nozomi Networks, have issued warnings about ongoing Iran-affiliated cyber threats and urged critical infrastructure operators to strengthen defenses, disallow direct internet exposure of OT and ICS assets, and enhance situational awareness against such sophisticated threats.

In summary, while Iranian cyber operations—including potentially Pioneer Kitten—continue aggressively against U.S. critical infrastructure with advanced tactics and collaboration with ransomware groups, specific public evidence tying Pioneer Kitten to CVE-2024-24919 exploitation is not currently available. The broader context is one of heightened vigilance and evolving complexity in Iranian cyber threat activities targeting U.S. sectors vital to national security and economic stability.

  1. To safeguard against potential attacks, cybersecurity measures should be strengthened, including the reinforcement of firewalls and the prompt patching of vulnerabilities like CVE-2024-24919.
  2. The use of malware, such as Tickler, deployed by groups like Pioneer Kitten, poses a significant threat to critical infrastructure sectors, such as transportation, manufacturing, and healthcare.
  3. Privacy is at risk due to the collaboration between Iran-linked actors and ransomware groups, as these operations can lead to data exfiltration and pre-positioning for future geopolitical contingencies.
  4. Technology companies, such as Microsoft and Palo Alto Networks, play a crucial role in the fight against cyber threats by providing customers with mitigation advice and alerts about potential vulnerabilities.

Read also:

    Latest