
Urgent Cybersecurity Advisory: Nationwide Cyberattacks Targeting Automatic Tank Gauges (ATGs)
April 14, 2026 | 
Urgent Cybersecurity Advisory: Nationwide Cyberattacks Targeting Automatic Tank Gauges (ATGs)
Tuesday, April 14, 2026 – The Energy Marketers of America has been informed of known cyberattacks targeting Automatic tank gauging (ATGs) in Tennessee, and cyber criminals are targeting systems nationwide. One convenience store chain has had at least 15 tanks now hit by this cyberattack. Thus far, there are no reports of any physical impacts.
Automatic tank gauging (ATG) systems are commonly used for fuel inventory and leak detection systems at retail fueling facilities, truck stops, marinas, and emergency generator facilities. Many of these devices are accessed remotely by computer networks to schedule fuel deliveries and maintain environmental compliance records for underground storage tank (UST) operational inspections.
Early reports indicate there have been multiple successful attempts to use computer network connections to gain unauthorized access to ATGs at multiple retail fueling convenience stores throughout the country. The attacks have allowed unauthorized access to fuel tank and fuel sensor information, and, in some cases, such information has been deleted from the ATG system.
The most common ATG system used is manufactured by the Veeder-Root Corporation. It appears that several successful attempts to modify the settings on these devices took place with sites equipped with Veeder-Root TLS-350 and TLS-450 Plus series consoles which were not programmed with network or password protection. Veeder-Root previously issued cybersecurity bulletins to address similar issues, which can be found at the links below:
The cyberattacks have also been documented on ATGs manufactured by other companies as well. In those instances, the targeted ATGs are not password-protected for remote network access. Each ATG should be equipped with site-specific network password protection (change the default password) and begin implementing network internet routers equipped with firewall protection.
The origin or purpose of the cyberattacks are currently unknown, but many suspect Iran is the instigator. To prevent unauthorized access to the local network and routers, tank owners should contact their local ATG service provider, which can add additional security measures to ensure your ATG system is adequately protected.
Recommended Immediate Actions
-
Change the default password on every ATG console (Veeder-Root TLS-350, TLS-450 Plus, and equivalents from other makers).
-
Deploy a dedicated firewall/router with the ATG on a segmented network (no direct internet exposure).
-
Contact your certified ATG service provider immediately—they can implement the hardening measures Veeder-Root recommends and verify compliance.
-
Store updated passwords securely inside or near the console (along with setup docs) for inspections.
-
Report incidents promptly via the CISA portal (https://www.cisa.gov/report), email report@cisa.gov, or phone (888-282-0870). Out-of-band communication is best if the network may be compromised.
When submitting a report to CISA’s portal, here’s the typical information that’s helpful to include:
-
Out-of-band method of communication (i.e., not via your potentially compromised IT network email) preferred for sharing any updates or sensitive information
-
Date and time of detection
-
Systems or networks affected
-
Type of incident (such as ransomware, DDoS, intrusion)
-
Indicators of Compromise (IOCs), like IPs, domains, or hashes
-
Impact details (data loss, operational disruption)
-
Mitigation steps already taken
EMA and the Tennessee Fuel & Convenience Store Association (TFCA) are working with DOE Cybersecurity, Energy Services and Emergency Response (CESER) and DHS Cybersecurity and Infrastructure Security Agency (CISA) to coordinate mitigation efforts and communication.
Additionally, EMA, TFCA and the Departments of Homeland Security (DHS) and Energy (DOE) urge members to use this opportunity to promote better cyber security in general. This incident is exploiting very basic cybersecurity deficiencies, and organizations that have this problem may also have vulnerabilities in other systems/equipment.
EMA urges its members to take advantage of CISA’s no-cost services to shore up cyber deficiencies at No-Cost Cybersecurity Services & Tools | CISA.





