Suspected Iranian hackers have breached and tampered with fuel storage tank monitoring systems at gas stations across multiple U.S. states [1, 2, 3].

This breach represents a significant security concern because these systems monitor critical infrastructure. Tampering with fuel-level readings could disrupt supply chain logistics, or mask the theft and leakage of hazardous materials.

U.S. officials said the attackers specifically targeted the "tank readers" used to track fuel levels [1, 2]. By gaining access to these systems, the hackers were able to manipulate the data reported by the monitoring hardware [1, 3]. The scope of the attack spans several states, though the exact number of affected stations has not been disclosed [2, 3].

Investigators believe the campaign is the work of actors based in Iran [1, 2]. Officials said the motivation behind the cyberattacks is likely tied to ongoing geopolitical tensions between the U.S. and the Iranian government [1, 3].

Cybersecurity experts said fuel monitoring systems are often overlooked in broader infrastructure security audits. These devices frequently rely on legacy software or insecure network connections, making them attractive targets for state-sponsored actors seeking to demonstrate capability or cause economic instability [1, 3].

Government agencies are currently working with private sector fuel providers to secure the compromised systems. The focus remains on purging the unauthorized access and verifying the integrity of current fuel-level data across the affected networks [2, 3].

Suspected Iranian hackers have breached and tampered with fuel storage tank monitoring systems.

The targeting of industrial control systems at the retail level suggests a shift toward 'low-visibility' infrastructure attacks. By manipulating data rather than shutting down systems entirely, attackers can create operational chaos and erode trust in critical monitoring tools without triggering immediate emergency responses.