Click Here

The other battlefield

16 snips
Mar 20, 2026
A deep dive into Iran-linked cyber intrusions that target critical infrastructure. Stories include water utility and brewery PLC defacements and how default credentials let attackers in. Discussion of a group leaking data and using emotional lures to spread malware. Exploration of how hybrid warfare tactics are reshaping digital conflict.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Cybersecurity Evangelist Drawn Into Small Plant Incident

  • Jennifer Lynn Walker fell into cybersecurity and became an evangelist focused on industrial facilities security.
  • She now runs cyber defense at Water ISAC and was pulled into a response meeting after the Aliquippa water alert revealed a PLC defacement from the Cyber Avengers.
INSIGHT

Physical Systems Are Exposed Through Internet-Connected PLCs

  • Industrial control attacks target access patterns, not company size, by exploiting PLCs that run physical processes like pressure and chemical dosing.
  • The Aliquippa hack used a Unitronics PLC with default credentials, showing physical risk from trivial internet exposure.
ADVICE

Remove Defaults And Disconnect Unnecessary PLCs

  • Change factory default credentials and remove PLCs from the internet when not needed to prevent trivial scanning-based attacks.
  • Cyber Avengers found Unitronics devices by scanning for defaults like password 1111 and exploited those reachable online.
Get the Snipd Podcast app to discover more snips from this episode
Get the app