Helpdesk Impersonation Scams and Iranian Cyber Threats Targeting U.S. Critical Infrastructure
TL;DR
ESET’s Tony Anscombe highlights the rise of helpdesk impersonation scams using Microsoft Teams and Iranian hackers targeting U.S. critical infrastructure. Nearly 4,000 programmable logic controllers (PLCs) are exposed, raising concerns for organizations operating these devices.
Main Analysis
In April 2026, ESET Chief Security Evangelist Tony Anscombe discussed significant cybersecurity incidents, emphasizing the threat of helpdesk impersonation scams. Recent reports indicate that malicious actors are exploiting Microsoft Teams to deceive users into granting remote access, complicating the defense against such social engineering tactics. This method utilizes a widely trusted collaboration tool, leveraging the platform’s familiarity to manipulate victims effectively.
Additionally, threats from Iranian cyber actors specifically targeting Rockwell PLCs have surfaced, with reports identifying almost 4,000 of these devices vulnerable within U.S. critical infrastructure sectors. This poses a serious risk, as attackers could potentially gain access to crucial operational controls. Understanding these vulnerabilities is vital for protecting systems fundamental to national security and public safety.
The FBI’s Internet Crime Complaint Center (IC3) has documented significant financial losses due to cyber-enabled crimes, amounting to nearly $21 billion last year. While this statistic highlights the ongoing threat landscape, it also indicates an alarming trend for organizations that may underestimate the risk and financial impact of cyber incidents.
Defensive Context
Organizations in the critical infrastructure sector that utilize Rockwell PLCs need to be particularly vigilant. These systems are integral to manufacturing, energy, and water services, making them prime targets for cyber actors. On the other hand, organizations not utilizing this specific infrastructure may not be as affected directly but should remain aware of the increasing sophistication of social engineering techniques showcased by helpdesk impersonation scams.
Why This Matters
The risks highlighted indicate an escalation in targeted attacks, particularly against vital infrastructure. Organizations that operate PLCs are at a heightened risk, as successful attacks could lead to operational disruptions and safety hazards. The detailed awareness of these incidents is crucial for defenders in government and private sectors managing critical infrastructure.
Defender Considerations
Entities leveraging Microsoft Teams should train users on recognizing social engineering attempts, particularly those involving unsolicited remote access requests. For organizations using Rockwell PLCs, reviewing their security posture and access controls is essential to mitigate potential exposures associated with Iranian cyber threats.
Indicators of Compromise
No specific indicators of compromise were mentioned in this analysis.



