A cyberattack on April 1 hit the Patriot Regional Emergency Communications Center in Massachusetts, disrupting emergency dispatch for police, fire, and EMS across five towns — Pepperell, Ashby, Dunstable, Groton, and Townsend. While 911 remained operational, non-emergency and business phone lines went down. This is the same state where a utility was compromised by Chinese state actors (profiled on 60 Minutes), and where a South Shore dispatch center was hit by Russian hackers in August 2025. The pattern is clear: Massachusetts energy and emergency infrastructure is under sustained multi-nation-state targeting. When emergency communications go down, the communities that depend on them lose their ability to coordinate response — and that is exactly the kind of disruption that adversaries seek.
CISA, FBI, EPA, and DOE issued a joint alert warning that unsophisticated actors are targeting ICS/SCADA systems in the oil and gas sector. The key insight is not the sophistication of the attackers — it is the vulnerability of the targets. Basic intrusion techniques using weak passwords and internet-exposed control systems can cause operational disruptions and physical damage. These are not advanced persistent threats; these are opportunistic actors exploiting systems that should not be accessible in the first place.
On the vulnerability front, CISA published an advisory on April 2 for multiple Siemens SICAM 8 product vulnerabilities affecting critical power systems. This is directly relevant in the context of Volt Typhoon, which remains embedded inside U.S. utility control loops — additional ICS vulnerabilities in the same infrastructure where a PRC state-sponsored actor is known to operate expand the attack surface for disruption. Separately, a new ICS/SCADA malware called VoltRuptor has emerged on dark web forums — featuring multi-protocol support for DNP3, Modbus, and IEC 61850, with persistence and anti-forensics capabilities.
The bottom line: cyberattacks on U.S. utilities increased 70% in 2024. By 2026, more than a third of global energy infrastructure is expected to have experienced cyber pre-positioning activity. The energy sector is being targeted from every direction — nation-states pre-positioning for conflict, hacktivists seeking disruption, and opportunistic criminals exploiting poor cyber hygiene. The question is no longer whether your systems are being probed — they are. The question is whether you can see it.