This week, the House Committee on Homeland Security’s Subcommittee on Cybersecurity and Infrastructure Protection held hearings to explore evolving cyber threats to U.S. critical infrastructure since the discovery of Stuxnet, the world’s first digital weapon, which targeted Iran’s nuclear program in 2010. The session underscored the growing sophistication of cyberattacks and the urgent need to bolster defenses for operational technology (OT) and critical infrastructure systems.
Operational technology is the hardware and software systems that directly interact with and control physical equipment and processes, such as assembly lines, power grids, and water treatment facilities. This differs significantly from Information Technology (IT), which focuses on managing and protecting digital information.
Critical Infrastructure in the Crosshairs
Fifteen years ago, Stuxnet demonstrated malware’s potential to cause physical damage, destroying 1,000 centrifuges at Iran’s Natanz facility. This marked a shift in cyber warfare, highlighting vulnerabilities in industrial control systems. Hearing witnesses, including Kim Zetter, author of Countdown to Zero Day, and Nate Gleason from Lawrence Livermore National Laboratory, emphasized that Stuxnet catalyzed an era of complex cyberattacks targeting critical infrastructure, such as power grids, pipelines, and water systems. They noted a 30% global increase in such attacks last year, with nation-states like China and Iran alongside criminal networks exploiting vulnerabilities for espionage, disruption, or strategic prepositioning.
The hearing highlighted specific threats, such as China’s Volt and Salt Typhoon campaigns, which have infiltrated U.S. telecommunications and other networks, and a 133% surge in Iranian cyberattacks in May and June 2025. Witnesses stressed the importance of reauthorizing the Cybersecurity Information Sharing Act (CISA 2015) and extending the State and Local Cybersecurity Grant Program to strengthen public-private partnerships and local cybersecurity.
90% of OT Infrastructure Unmonitored
Witnesses pointed out that only 10% of U.S. OT infrastructure is currently monitored, leaving significant vulnerabilities. For instance, the investigation of a pipeline incident revealed 10,000 open, unprotected ports, underscoring the need for comprehensive OT asset inventories and assessments, implementation of basic cyber hygiene practices such as multi-factor authentication, and monitoring of supply chain security.
Small and mid-sized utilities were identified as particularly vulnerable due to limited resources and expertise. Representative Andy Ogles (R-TN) expressed concern that these entities could be initial targets in a broader attack to destabilize electrical grids or water systems. The witnesses also discussed the imbalance in cyber spending, with 95% allocated to IT systems and only 5% to OT, despite OT’s critical role in national security and community stability. Robert Lee advocated for a balanced approach to offensive and defensive cyber strategies to deter adversaries, warning of escalatory risks if not carefully managed.
The hearing also addressed legislative efforts, such as the Cyber PIVOTT Act, which aims to address the shortage of 500,000 cybersecurity professionals through scholarships for two-year degrees in exchange for government service. Additionally, the Strengthening Cyber Resilience Against State-Sponsored Threats Act, passed in December 2024, establishes a task force led by the Cybersecurity and Infrastructure Security Agency (CISA) to counter state-sponsored cyber threats, particularly from China. The session underscored the need for proactive measures, streamlined regulations, and robust public-private partnerships to safeguard critical infrastructure against increasingly sophisticated cyber threats.
Fully Operational: Stuxnet 15 Years Later and the Evolution of
Cyber Threats to Critical Infrastructure
- Watch video of the hearing
- Read the witnesses' written testimony
|