Skip to content

Hackers exploit unpatched flaw in industrial control systems, raising alarms

An unknown threat actor breached a real company’s operational tech, defacing interfaces and disabling alarms. Experts warn: outdated industrial systems are sitting ducks.

In this picture we can see a bug here, at the bottom there is mat, we can see wall in the...
In this picture we can see a bug here, at the bottom there is mat, we can see wall in the background.

Hackers exploit unpatched flaw in industrial control systems, raising alarms

A cyberattack on an industrial control system (ICS) honeypot has exposed ongoing threats to critical infrastructure. Between December 3 and 19, 2025, an unknown threat actor exploited a known vulnerability, allegedly linked to the pro-Russian hacktivist group TwoNet. The incident affected a real industrial company, raising concerns about security weaknesses in operational technology (OT) environments.

The attack began with TwoNet exploiting CVE-2021-26829, a cross-site scripting (XSS) flaw in OpenPLC ScadaBR. This vulnerability, present in both Windows and Linux versions of the software, allowed the group to gain access using default credentials. Once inside, they created a new user account, defaced the human-machine interface (HMI) login page, and disabled system logs and alarms to cover their tracks.

The incident highlights the urgent need for stronger defences in industrial control systems. CISA’s directive and expert warnings aim to prevent further exploitation of unpatched vulnerabilities. Organisations using OpenPLC ScadaBR must apply updates immediately to avoid similar breaches.

Read also: