Iranian Hackers Breach US Gas Stations, CISA Launches KEV Nomination Form, and Industrial Router Exploitation Surges
Recent developments in cybersecurity have underscored the persistent vulnerabilities within critical infrastructure and the ongoing challenges faced by organizations in safeguarding sensitive data. This week, significant incidents involving Iranian hackers, a CISA contractor’s credential exposure, and the exploitation of industrial routers have emerged, highlighting the evolving threat landscape.
Iranian Hackers Target US Gas Stations
U.S. officials have identified Iranian hackers as the perpetrators behind breaches of automatic tank gauge (ATG) systems at gas stations across several states. These systems are crucial for monitoring fuel levels in underground storage tanks. The attackers exploited unprotected, internet-connected devices that lacked basic security measures, such as passwords, allowing them to alter display readings. Although the hackers could not manipulate actual fuel volumes, the breaches raised alarms about potential risks, including the masking of gas leaks and threats to critical infrastructure.
The cybersecurity community has long warned about the vulnerabilities associated with exposed ATG systems. The implications of such intrusions extend beyond immediate operational disruptions; they pose significant risks to public safety and trust in essential services.
CISA Contractor Exposes Sensitive Credentials
In a separate incident, a contractor working for the Cybersecurity and Infrastructure Security Agency (CISA) inadvertently left a public GitHub repository named Private-CISA accessible for several months. This exposure included administrative keys to multiple AWS GovCloud accounts and plaintext passwords for internal CISA systems. While CISA has stated that there is currently no evidence of unauthorized access to sensitive data, the potential for lateral movement into government systems or tampering with internal software packages remains a concern.
This incident underscores the critical importance of secure coding practices and the need for stringent access controls, particularly when handling sensitive information within government agencies.
Industrial Router Exploitation on the Rise
The cybersecurity landscape is also witnessing a surge in exploitation of vulnerabilities within industrial routers, particularly the Four-Faith F3x36 series. Attackers have been actively exploiting CVE-2024-9643, an authentication bypass flaw attributed to hardcoded administrative credentials. CrowdSec has reported a significant increase in exploitation attempts since late April 2026, with activity escalating to mass exploitation levels by mid-May. Compromised devices are being integrated into botnets for further malicious campaigns.
This trend highlights the vulnerabilities inherent in industrial control systems and the urgent need for organizations to prioritize security measures to protect critical infrastructure from such threats.
New Features in Cyber threat intelligence Sharing
In an effort to enhance collective cybersecurity defense, Anthropic has introduced a new feature in its Mythos vulnerability discovery platform. This update allows users to share cyber threat intelligence, facilitating faster dissemination of threat details among security teams and researchers. The move aims to bolster collaborative efforts in identifying and mitigating emerging threats.
Cloudflare has also evaluated the capabilities of Anthropic’s Mythos model, noting its ability to construct exploit chains from low-severity primitives and autonomously generate working proofs of concept. However, challenges remain, including high false positive rates and the need for tailored harnesses to achieve effective results.
CISA Launches KEV Nomination Form
In a proactive step to improve the identification and remediation of vulnerabilities, CISA has launched an online Nomination Form. This tool enables researchers, vendors, and industry partners to submit known exploited vulnerabilities (KEVs) directly for faster review and inclusion in CISA’s catalog. The initiative aims to enhance the agency’s capacity to validate and share actively exploited flaws, providing clear remediation guidance to stakeholders.
This development reflects a growing recognition of the importance of community engagement in cybersecurity efforts, as collaboration between various stakeholders can lead to more effective threat mitigation strategies.
Conclusion
The recent incidents involving Iranian hackers, credential exposure by a CISA contractor, and the exploitation of industrial routers serve as stark reminders of the evolving cybersecurity landscape. As organizations navigate these challenges, the need for robust security measures and collaborative efforts in threat intelligence sharing becomes increasingly critical.
For further insights into the latest cybersecurity developments, threat intelligence, and breaking updates from across the Middle East, keep reading.
Source: www.securityweek.com


