Daily OT Security News: April 26, 2026

Today’s operational technology (OT) security landscape remains highly volatile, with persistent threats from state-sponsored actors, evolving ransomware tactics, and increasing supply chain risks. Critical infrastructure sectors such as energy, water, and industrial systems face growing challenges as attackers exploit network exposures, unpatched vulnerabilities, and geopolitical complexities. Organizations must prioritize tailored cybersecurity measures to defend against these sophisticated and targeted campaigns.

Iranian State Actors Actively Exploiting Rockwell and Allen-Bradley PLCs in U.S. Critical Infrastructure

A joint advisory from CISA, the FBI, NSA, and U.S. Cyber Command has confirmed ongoing exploitation of internet-facing Rockwell Automation and Allen-Bradley programmable logic controllers (PLCs) by Iranian-affiliated advanced persistent threats (APTs). Targeted sectors include water, wastewater, energy, and government facilities, where attackers leverage legitimate vendor software over exposed ports to manipulate HMI and SCADA displays, causing operational outages and financial damage. Organizations are urged to eliminate direct internet exposure of PLCs, enforce strict network segmentation, and consult the full advisory for mitigation guidance.

Source: Zentera Threat Briefing – April 2026


CISA Adds SimpleHelp, Samsung MagicINFO, and D-Link Flaws to Known Exploited Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog with four new critical flaws actively targeted by threat actors. Among these are high-severity vulnerabilities in Samsung MagicINFO 9 Server, SimpleHelp remote support software, and D-Link DIR-823X routers, with exploitations ranging from unauthorized code execution to command injection. Federal agencies face a remediation deadline of May 8, 2026, while private sector entities are strongly encouraged to prioritize patching to reduce exposure.

Source: Security Affairs – April 25, 2026


Trigona Ransomware Deploys Custom Exfiltration Tool to Evade Detection in Industrial Environments

Symantec researchers have uncovered a significant advancement in Trigona ransomware’s operational tactics, notably the use of a bespoke data exfiltration tool named uploader_client.exe. This proprietary utility replaces commonly detected tools, employing multiple parallel TCP connections and rotating them after transferring 2 GB of data to evade network monitoring. Targeting sensitive industrial documents, the group disables endpoint security with specialized tools and gains initial access via AnyDesk, highlighting the increasing sophistication of ransomware-as-a-service campaigns linked to the Rhantus cybercrime group.

Source: Security Affairs – April 26, 2026


Supply Chain Cyber Sovereignty Emerges as Critical Priority for OT and Industrial Organizations

Industrial Cyber’s recent analysis underscores the rising importance of supply chain cyber sovereignty within critical infrastructure sectors. Highlighted by World Economic Forum research, supply chain complexity is increasingly recognized as a key barrier to cyber resilience. Industrial cybersecurity experts emphasize the need for procurement strategies that integrate geopolitical risk alongside safety and interoperability, with continuous assurance practices and comprehensive Software and Hardware Bills of Materials (SBOMs and HBOMs) becoming essential governance tools to manage hidden dependencies and long-tail vendor risks.

Source: Industrial Cyber – April 26, 2026


Emerson and OPSWAT Partner to Deliver OT-Native Patch Management for Power and Water Sectors

Emerson has announced a strategic reseller partnership with OPSWAT to embed OT-native cybersecurity solutions within its Ovation™ Automation Platform, serving more than 800 global sites in power and water. The integration includes OPSWAT’s MetaDefender Endpoint™ and My OPSWAT™ OnPremise Central Manager, offering purpose-built patch management tailored to industrial control systems. Emerson President Robert Yeager highlighted the necessity of OT-specific cybersecurity solutions amid escalating threats from nation-state actors and ransomware, with this collaboration extending existing OPSWAT deployments on Emerson’s DeltaV™ platform.

Source: InforCapital – April 25, 2026


As threat actors grow more sophisticated and the OT threat landscape evolves, continuous vigilance and proactive defense remain imperative for critical infrastructure operators. Staying informed on emerging tactics, patching known vulnerabilities promptly, enhancing supply chain scrutiny, and deploying purpose-built OT security solutions are key steps in safeguarding industrial environments against increasingly complex cyber risks.

Share this