MAGNET S2 WEEKLY SNAPSHOT – 260419-1800Z
United States – 7 Day OSINT Overview
Reporting Period: 12–18 April 2026


MAGCON STATUS

MAGCON LEVEL 3 – ELEVATED

Credible threat reporting continues across cyber and lone-actor domains. No confirmed coordinated nationwide attack activity.

TREND VS LAST WEEK: STABLE


PRIMARY RISK DRIVERS

• Iran-linked cyber operations targeting U.S. infrastructure
• persistent foreign threat environment tied to Iran conflict
• continued ISIS-inspired and lone-actor attack plotting


DELTA SUMMARY

• sustained federal warnings on Iranian cyber targeting of U.S. infrastructure
• continued public reporting of Iran-linked threat posture toward U.S.-based targets
• additional confirmation of disrupted ISIS-inspired plots tied to New York targets


SECTOR THREAT LEVELS

Terrorism / Extremism: ELEVATED
Cyber Activity: ELEVATED
Critical Infrastructure: ELEVATED
Civil Unrest: ROUTINE
Transportation Systems: ROUTINE
Supply Chain: HEIGHTENED


GLOBAL CHOKEPOINT WATCH

Strait of Hormuz: ELEVATED
Bab el-Mandeb / Red Sea: ELEVATED
Panama Canal: ROUTINE


KEY INCIDENTS

United States – Iran-Linked Cyber Targeting
U.S. agencies warned that Iranian-affiliated cyber actors are actively targeting critical infrastructure sectors including water, wastewater, energy, and government systems. Activity includes exploitation of internet-facing PLC and SCADA systems, with some incidents causing operational disruption and financial impact.

United States – FBI Iran Threat Reporting
Federal intelligence reporting indicates Iran continues to pose a persistent threat to U.S. military personnel, government facilities, Jewish and Israeli institutions, and Iranian dissidents within the United States. No broad public threat identified.

United States – ISIS-Inspired Plot Activity
Recent FBI and DOJ releases confirm continued disruption of ISIS-inspired plots targeting Jewish locations in New York, including attempted attacks involving explosives and planned mass-casualty events.


CYBER / INFRASTRUCTURE

Industrial Control System Targeting
Iran-linked actors are actively scanning and exploiting exposed industrial control systems, particularly PLC devices used in municipal and utility environments.

Disruption-Oriented Activity
Cyber operations are assessed as capable of causing localized service disruption rather than nationwide system failure, with observed impacts including manipulation of system interfaces and data extraction.


EMERGING INDICATORS

• increased scanning of internet-facing infrastructure systems
• phishing and credential harvesting linked to nation-state actors
• continued targeting interest in Jewish and symbolic locations
• overlap between geopolitical escalation and domestic threat posture


VERIFIED STATUS

No confirmed coordinated terrorist campaign in the United States.
No confirmed nationwide critical infrastructure failure.


OPERATOR GUIDANCE

• report phishing, credential abuse, and suspicious MFA activity
• review exposure of internet-facing systems and remote access points
• maintain awareness at religious, government, and symbolic locations
• monitor for suspicious activity tied to public events or facilities
• avoid amplifying unverified threat reporting

Submit reporting through MAGNET channels.


To Learn More About MAGNET, Visit www.MAGNETHF.COM


SOURCE LIST

Reuters – Iranian hackers targeting U.S. critical infrastructure
https://www.reuters.com/world/middle-east/iranian-hackers-targeting-us-critical-infrastructure-has-escalated-since-start-2026-04-07/

The Guardian – U.S. warning on Iran cyberattacks
https://www.theguardian.com/world/2026/apr/07/iran-cyberattacks-infrastructure

Reuters – FBI report on Iran threat to U.S. targets
https://www.reuters.com/world/us/intelligence-report-warned-irans-persistent-threat-us-white-house-downplayed-2026-04-08/

FBI – Terrorism News and Press Releases
https://www.fbi.gov/investigate/terrorism/news

CISA – Iranian-affiliated cyber actors advisory
https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a


Comments are closed