Skip to main content

March 4, 2026

Iran's hackers surge as CISA runs on 800 furloughed-down staff

American Kahani
Appropriations.com
Bipartisan Policy Center
Brandefense
CyberScoop
+28

Congress''s funding lapse leaves CISA at 31% staff as Iran targets U.S. infrastructure

"When the DHS funding lapse began in mid-February 2026, CISA furloughed roughly two-thirds of its 2,540-person workforce — leaving the agency that guards federal civilian networks and critical infrastructure with about 800 active employees. Of CISA's 2,341 employees, only 888 were designated as "excepted" staff who continue working through the shutdown, while the remaining 1,453 work without pay.\n\nMadhu Gottumukkala, who had been serving as acting director since May 2025, warned House appropriators the week before the shutdown: "I want to be clear — when the government shuts down, cyber threats do not." His testimony proved prophetic as Iran launched cyberattacks precisely when CISA was at its weakest."

"Gottumukkala's warning proved prophetic in the worst possible way. On February 28, the same night Operation Epic Fury launched in Iran, CISA's website displayed a notice that it had not been updated since February 17 "due to a lapse in federal funding" and was "not being actively managed."\n\nThe agency responsible for publishing threat advisories, vulnerability alerts, and critical infrastructure warnings had gone dark at the exact moment the United States entered active conflict with one of the world's most capable state-sponsored cyber powers. The shutdown also halted implementation of CIRCIA, the Cyber Incident Reporting for Critical Infrastructure Act, which was already delayed beyond its May 2026 deadline."

"The leadership void compounded the operational crisis. Gottumukkala — who had come to CISA from a South Dakota state IT role, with close ties to Kristi Noem, and no cybersecurity background — was reassigned to a DHS cost-cutting review division the week before the shutdown.\n\nPolitico had already reported that during his nine months as acting director he had uploaded sensitive contracting documents to the public version of ChatGPT and failed the polygraph test required to access sensitive cyber intelligence shared with CISA by partner agencies. His lack of cybersecurity experience raised serious questions about his qualifications to lead America's primary cyber defense agency."

"Nick Andersen, the agency's executive assistant director for cybersecurity and a career professional, stepped into the acting director role — CISA's third acting director in a matter of weeks.\n\nSean Plankey, Trump's nominee to permanently lead CISA, a retired Coast Guard officer with genuine cybersecurity credentials, was meanwhile escorted out of DHS headquarters by security after clashing internally with Gottumukkala over contracts. Plankey had his access badge removed and was physically removed from the Coast Guard headquarters in an unprecedented move for a presidential nominee."

"Plankey's Senate confirmation remained blocked — initially by Sen. Rick ScottRick Scott (R-FL) over a Florida shipbuilding contract dispute, then by Sen. Thom Tillis (R-NC) over the Noem DHS obstruction imbroglio.\n\nThe leadership chaos created a dangerous vacuum at the precise moment when U.S. cyber defenses needed stable, experienced leadership most. Three Republican senators refused to move forward with Plankey's confirmation for unrelated reasons, leaving CISA without permanent leadership as Iran prepared cyberattacks."

"Into this vacuum, Iranian state-sponsored hacking groups surged. Cybersecurity experts and intelligence firms told NBC and Nextgov that Iran's IRGC-linked units — APT33 (Refined Kitten) and APT34 (OilRig) — were increasing targeting of U.S. businesses and critical infrastructure sectors including energy grids, water utilities, and financial services.\n\nPavel Gurvich, founder of cybersecurity startup Tenzai, told CNBC: "From a timing perspective, it's now or never. In that sense, the danger is meaningfully higher." Iran was explicitly exploiting the American government shutdown to launch cyber operations when U.S. defenses were weakest."

"DHS issued a Critical Incident Report to law enforcement partners warning that the Cyber Islamic Resistance had called for cyberattacks against the United States and Israel.\n\nThe timing was not coincidental — Iran was explicitly exploiting the American government shutdown to launch cyber operations when U.S. defenses were weakest. Iranian hackers had been probing U.S. critical infrastructure for months but waited for the CISA shutdown to escalate their attacks."

"On March 3, Iran struck three Amazon Web Services data centers — one in Bahrain, two in the UAE — knocking all three offline and marking the first time a major U.S. tech company's physical cloud infrastructure was explicitly targeted by a foreign power during a U.S. military operation.\n\nIran's state news agency attributed the attacks to AWS's support for U.S. military and intelligence operations. AWS holds classified contracts with the CIA and DoD through GovCloud. The attacks paralyzed banking, government offices, and key industries across the Middle East, with one minute of downtime costing millions in economic damage."

"The structural lesson exposed by all of this is that CISA's operational capacity is directly tethered to congressional appropriations politics — meaning foreign adversaries can time cyberattacks to coincide with domestic budget fights.\n\nRep. Andrew Garbarino (R-NY), chair of the House Homeland Security Subcommittee on Cybersecurity, said: "Iranian regime-backed cyber actors continue to pose a serious threat to the United States and our allies, from probing our water utilities to running influence operations that undermine our democracy." The attacks demonstrated how domestic political disputes directly create national security vulnerabilities."

"Garbarino emphasized: "CISA and its skilled personnel need to remain fully operational — and paid — to ensure our nation is ready to deter and respond to cyber threats against critical infrastructure."\n\nHis warning highlighted how domestic political disputes directly create national security vulnerabilities. Neither the Republican shutdown blame strategy nor the Democratic demands for immigration enforcement reforms included any emergency carve-out to keep CISA fully funded during the DHS lapse."

"House Appropriations chair Tom ColeTom Cole had written a month earlier that CISA's personnel were already "stretched thin" and that a shutdown would "hinder the country's ability to protect critical infrastructure and hospitals."\n\nNeither the Republican shutdown blame strategy nor the Democratic demands for immigration enforcement reforms included any emergency carve-out to keep CISA fully funded during the DHS lapse. The failure to protect CISA funding represented a catastrophic breakdown in congressional oversight of national security functions."

🔒Digital Rights🛡️National Security🏛️Government

People, bills, and sources

Madhu Gottumukkala

CISA Acting Director (May 2025 – late February 2026); reassigned to DHS cost-cutting review

Nick Andersen

CISA Acting Director (from late February 2026); Executive Assistant Director for Cybersecurity

Sean Plankey

Trump's CISA Director-nominee; retired Coast Guard officer; removed from DHS senior adviser role

Rick Scott

Rick Scott

U.S. Senator (R-FL)

Andrew Garbarino

U.S. Representative (R-NY), Chair, House Homeland Security Subcommittee on Cybersecurity

Tom Cole

Tom Cole

U.S. Representative (R-OK), Chair, House Appropriations Committee

Pavel Gurvich

Founder and CEO, Tenzai (cybersecurity startup)

IRGC Cyber Units (APT33 / APT34)

Iranian Revolutionary Guard Corps state-sponsored hacking groups

Amazon Web Services

Amazon cloud computing division (AWS)

Jen Easterly

Former CISA Director (2021–January 2025)

Tricia McLaughlin

Former DHS Assistant Secretary for Public Affairs; wife of Strategy Group CEO Ben Yoho

What you can do

1

civic action

Contact your senators to demand immediate DHS funding to restore CISA

CISA is the primary federal body responsible for protecting critical infrastructure — power grids, water systems, financial systems — from cyberattacks. Running it at 31% capacity during an active Iranian cyber campaign is a direct national security choice. Senators who vote against DHS funding are voting to keep CISA degraded.

Hello, I am [NAME], a constituent from [CITY/STATE]. I'm calling about CISA's degraded capacity during the Iran war.

Key concerns:

  • CISA is running at 31% capacity — 800 of 2,540 staff — due to the DHS funding lapse
  • Iranian hackers (APT33/APT34) are actively increasing targeting of U.S. critical infrastructure in response to Operation Epic Fury
  • Amazon Web Services lost three data centers to Iranian drone strikes on March 3, the first direct attack on U.S. tech infrastructure in a military conflict

Questions to ask:

  • Will Senator [NAME] support emergency DHS funding to restore CISA to full operational capacity?
  • Does Senator [NAME] believe running CISA at 31% during an active Iranian cyber campaign is acceptable?

Specific request: I am asking Senator [NAME] to vote for immediate DHS funding legislation to end the furloughs and restore CISA's full workforce.

Question: What is Senator [NAME]'s position on the DHS funding lapse and its impact on CISA?

Thank you.

2

research

Monitor CISA threat advisories and infrastructure alerts

CISA publishes threat advisories and vulnerability alerts for businesses, government agencies, and the public. Tracking when alerts stop being published — as they did after Feb. 17 — is itself a measure of the agency's operational capacity. Citizens can sign up for CISA alert emails to monitor this directly.