About Partners Contact Client Portal
LinkedIn Twitter
Services Industries Insights & Events Careers & Culture
Insights & Events

Services

RubinBrown specializes in providing a comprehensive range of services to meet business and personal needs. Whether you require expert tax, strategic business consulting, audit services or more, RubinBrown's team of experienced professionals are here to support you.

View All Our Services
Assurance Services
Benefit Plan Audit Services Public Company Services SOC Examinations, IT Audit, & Third-Party Risk
Consulting Services
AI & Data Services Business Process Improvement Services Business Restructuring & Bankruptcy Services Cyber Security Services Environmental, Social and Governance Services Independent ERP Selection Consultants Fraud & Forensics Healthcare Consulting Services SOC Examinations, IT Audit, & Third-Party Risk Information Technology Services Litigation Services Mergers & Acquisitions Services Risk & Internal Audit Services Valuation Services
Entrepreneurial Services
Outsourced Accounting & Advisory Services
Tax Services
Federal Tax Services Private Client Services Credits & Incentives Services State & Local Tax Services
Wealth Management Services by RubinBrown Advisors RubinBrown Corporate Finance

Industries

At RubinBrown, we bring experience across a range of industries. Our experience enables our professionals to offer tailored solutions catering to the intricacies of each sector. Our professionals have years of focused engagement and skills, allowing them to navigate industry-specific challenges to benefit our clients.

View All Our Industries
Colleges & Universities Construction Financial Institutions Gaming Healthcare Law Firms Life Sciences & Technology Manufacturing & Distribution Not-For-Profit Private Equity Public Sector Real Estate Transportation & Dealerships

Careers & Culture

At RubinBrown, we are inspired team members, working as one firm, living our core values, and Being Our Best for Others while delivering totally satisfied clients. We invite you to learn more about the Firm's culture, the Be Your Best for Others mentality, and explore the available opportunities at RubinBrown.

Discover Our Culture
Baker Tilly International Campus Recruiting Diversity & Inclusion Experienced Recruiting RubinBrown Charitable Foundation Join The Team
Back to Insights

Iran Cyber Attacks on U.S. Critical Infrastructure: Elevated Risks and How to Defend Your Organization

Contact Us

Iran Cyber Attacks on U.S. Critical Infrastructure: Elevated Risks and How to Defend Your Organization

Contact Us
Iran-linked cyber activity is rising, targeting U.S. critical infrastructure, water systems, healthcare, and financial services. Learn key defenses to implement now.

Modern geopolitical conflicts rarely remain confined to the physical battlefield. Escalating conflicts in the Middle East include increased cyber attacks against Western targets from Iran state-sponsored hackers and affiliates, with a heavy focus on U.S. critical infrastructure and high-profile targets of opportunity. Organizations protecting state, local, commercial, and critical infrastructure in the U.S. need to verify their basic defenses are in place and actively monitored.

It is important to separate credible risk from worst-case speculation. Despite Iran’s near-total internet blackout, their geographically dispersed proxies—including IRGC-affiliated cyber actors and hacktivist groups, continue to operate through VPNs and external infrastructure, and sometimes-allies in the region are increasing their attacks. A catastrophic Iranian cyber attack against U.S. infrastructure seems unlikely, but organizations should expect an increase in disruptive attacks designed to create high-visibility, disruptive, and psychological impacts.

Recent reporting indicates U.S. intelligence and cyber resources expect an increase in Distributed Denial of Service (DDoS) attacks, website defacements, and disruptive activity like ransomware and system disruptions. Financial institutions have reportedly moved to heightened alert levels based on the threat of disrupting operations and causing financial losses.

An important complicating factor is the impact to the Department of Homeland Security, specifically the Cybersecurity & Infrastructure Security Agency (CISA). CISA’s budgets and staffing have already had significant disruption, and the government shutdown threatens to further limit their support against these types of attacks. Organizations that have relied on CISA for threat intelligence and incident response coordination should be prepared to operate with reduced federal support.

U.S. Sectors at Highest Risk from Iran-Linked Cyber Attacks

Iran and affiliated groups have a well-established playbook. Their tactics are not always sophisticated—they typically exploit gaps in basic cyber hygiene. Previous successful operations have relied on exploiting default or weak passwords on internet-facing systems, brute-force credential attacks and MFA push-bombing, partnerships with ransomware operators, and targeted phishing and social engineering campaigns.

Based on historical patterns and current threat warnings from CISA, CrowdStrike, and Google Threat Intelligence Group, the sectors at highest risk include:
  • Water and wastewater systems: A long history of targeting this sector for disruption. In 2023–2024, IRGC-affiliated threat actors compromised U.S. water utilities by exploiting default passwords on internet-facing programmable logic controllers (PLCs)—a basic vulnerability that remains unaddressed at many facilities.
  • Healthcare networks: Hospitals and health systems remain attractive targets due to the urgency of restoring operations and the sensitivity of patient data. Iranian actors have used brute-force credential attacks and ransomware partnerships to compromise healthcare organizations.
  • State and local government: Constrained budgets, limited personnel, legacy systems, and limited security monitoring provide a target of opportunity. An Iranian national previously pleaded guilty to ransomware attacks that crippled Baltimore and other U.S. municipalities, causing tens of millions in damages.
  • Financial services: JPMorgan Chase CEO Jamie Dimon publicly stated that banks should expect a rise in cyber and terrorist attacks. Iran conducted massive denial-of-service attacks against major U.S. banks in 2012–2013, and CrowdStrike has reported a surge in claimed disruptions targeting the financial sector.
  • Defense industrial base: CISA specifically flagged defense contractors with holdings or relationships tied to Israeli defense firms as at increased risk of attack.

Recommended Cybersecurity Steps to Defend Against Iran-Linked Attacks

It is neither time to panic, nor is it the time to think about a multi-year initiative. A quick check to ensure basic security blocking and tackling measures are in place is an excellent idea—you can bet attackers will take advantage of low-hanging fruit. We recommend verifying the following basics are in place:
  • Multi-Factor Authentication: Validate that email, remote access, and (ideally) privileged account use requires multi-factor authentication. Be aware that Iranian actors have used MFA push-bombing—flooding users with authentication requests—to bypass this control. Consider number-matching or phishing-resistant MFA where possible.
  • Privileged Account Review: Always good to do this annually, but now is a good time for a quick review of the administrator accounts on critical systems and applications to ensure old accounts are disabled and double check these accounts have been hardened and are monitored.
  • Internet-Accessible Solutions: Verify recent vulnerability scans (or conduct one) and any organizationally controlled accounts have long passphrases and multi-factor authentication. Pay particular attention to email, remote access solutions, and devices that could provide access to the interior network (e.g., IoT, OT, control systems, etc.).
  • Incident Response Plan: Run a tabletop exercise (CISA has free resources) to review and test the plan. Clever attackers will eventually compromise most environments—be prepared to respond with less stress.
  • Security Awareness Training: Take a moment to do a quick refresher on phishing, social engineering, and related attacks with staff. If you have one of the training/phishing solutions in place, consider increasing the frequency in the short term.
  • Monitoring: Ensure security monitoring tools are in place and are being actively monitored. The best solutions monitor for anomalous behavior, but use the tools available to actively watch for attacks, particularly across critical infrastructure and internet exposed solutions and services.
  • Backups: Review your backup solution to verify ongoing backups are in progress, recoverability is tested and verified, and are protected against deletion or corruption. Wiper malware is a documented component of Iran’s cyber toolkit.
  • Qualified Support: Identify qualified individuals on staff or from outside the organization you can quickly engage if the organization has questions, needs help, or has to respond to an incident.

A Real but Manageable Cyber Threat from Iran

Iran, Iranian state-sponsored hackers, and their affiliates have the capability and motivation to create chaos, disruption, and possibly damage with cyber attacks. Historically, their tactics and attacks are sometimes clever, but are typically not that sophisticated, they generally exploit gaps in cyber hygiene, human elements, or recycle old passwords from dark web disclosures that were never changed.

The Bottom Line: Do Not Be an Easy Target

Calmly, but with perhaps a sense of urgency, address the basics, stay vigilant, and continue with longer-term plans to improve the organization’s security posture.
 


The RubinBrown Cyber Security Services team is dedicated to helping organizations identify risks, strengthen defenses, and build lasting cybersecurity resilience through proactive strategy, education, and technical expertise. If you have questions or need assistance please reach out to your RubinBrown point of contact or submit a message.
 


 

Published: 03/11/2026

Readers should not act upon information presented without individual professional consultation.

Any federal tax advice contained in this communication (including any attachments): (i) is intended for your use only; (ii) is based on the accuracy and completeness of the facts you have provided us; and (iii) may not be relied upon to avoid penalties.

 

Contact Us:

Be Your Best for Others at RubinBrown

At RubinBrown, our firm fosters a culture built upon five vision points, and are guided by our philosophy of Being Our Best for Others. Discover how you can be your best at RubinBrown today by visiting our Careers & Culture Overview for available opportunities and more.

Discover Our Culture

Join Our Mailing List

RubinBrown periodically sends breaking regulatory updates, technical summaries, industry-specific information and event (in-person and virtual) invitations through electronic newsletters.

Sign Up for Our Communications
1-800-678-3134 Certified Public Accountants & Business Consultants

Ranked a Top 50 Accounting Firm by Inside Public Accounting

Firm News Disclaimers Privacy Policy Client Payment © 2026 RubinBrown LLP
RubinBrown Executive Recruiting RubinBrown Advisors RubinBrown Corporate Finance