What is an Automatic Tank Gauge (ATG)?
An automatic tank gauge is an electronic monitoring system used to measure fuel levels, detect leaks, and support inventory management in underground or aboveground fuel storage systems (U.S. Environmental Protection Agency [EPA], n.d.; DIVD, 2025). In practice, ATGs help operators track tank conditions and support release detection obligations that are part of underground storage tank compliance and environmental protection programs (EPA, n.d.).
Who Controls ATGs?
ATGs are generally controlled by the owners and operators of fuel storage systems, such as gas stations, convenience stores, fuel distributors, and operators of facilities that store petroleum or hazardous substances (EPA, n.d.). State, territorial, tribal, and federal regulators do not typically operate the devices directly, but they regulate the broader underground storage tank environment and compliance expectations surrounding release detection and environmental protection (EPA, n.d.). Vendors, service contractors, and remote monitoring providers may also play a role when they install, configure, maintain, or remotely access the systems (DIVD, 2025; Veeder-Root, 2024).
How Many ATGs Are There in the United States?
A precise national count of ATG devices in the United States is uncertain. The EPA states that approximately 542,000 underground storage tanks nationwide store petroleum or hazardous substances, but that figure refers to tanks rather than ATG units, and one facility may have multiple tanks while not every tank count translates directly into a one-to-one ATG count (EPA, n.d.). The closest verifiable contextual figure is the EPA’s estimate of approximately 542,000 underground storage tanks in the United States (EPA, n.d.).
What Are the Vulnerabilities of ATGs?
The clearest recurring vulnerability is direct exposure of ATG interfaces to the public internet without proper authentication or network isolation (DIVD, 2025; BitSight, 2024). DIVD reported that exposed systems from multiple manufacturers, especially certain Veeder-Root models, could be accessed through serial interfaces commonly reachable on TCP port 10001, allowing unauthorized parties to view fuel levels, change tank labels, alter alarm thresholds, and modify monitoring parameters (DIVD, 2025). BitSight reported multiple critical vulnerabilities across six ATG systems from five vendors and warned that internet-exposed ATGs remain attractive targets for sabotage and cyberwarfare scenarios (BitSight, 2024).
Other weaknesses include poor password practices, insecure remote connectivity, weak segmentation between operational technology and business networks, and overreliance on remote polling designs that require open network paths into the ATG environment (DIVD, 2025; PAS, 2025). Veeder-Root’s guidance also emphasizes controls such as firewalls, access restrictions, and secure remote connectivity, which indirectly confirms that misconfiguration and unnecessary exposure are central risk factors (Veeder-Root, 2024).
What Are the Threats to ATGs?
The threat landscape includes unauthorized access, reconnaissance, tampering, denial-of-service activity, and operational disruption (DIVD, 2025). Researchers and industry alerts have described attackers changing passwords, modifying system information, deleting data, and interfering with remote access and fuel operations when gauges are exposed online (In Food & Fuel, 2026; DIVD, 2025). In addition to opportunistic criminal exploitation, researchers have warned that ATGs could be targeted in sabotage or cyberwarfare contexts because they are part of the fuel distribution ecosystem and are present at critical facilities beyond retail gas stations (BitSight, 2024; DIVD, 2025).
What Harm Could Come from a Cyberattack on an ATG?
Potential harm from an ATG cyberattack includes environmental damage, operational shutdowns, business interruption, false inventory readings, disabled alarms, and impaired leak detection (BitSight, 2024; DIVD, 2025). BitSight reported that attackers may be able to change critical parameters such as tank geometry and capacity, disable alarms, and interfere with automatic or manual responses, creating the possibility of fuel leaks, safety incidents, and economic losses (BitSight, 2024). Industry reporting in 2026 also described incidents in which stations could not pump gas until affected devices were reset or restored, showing that even attacks short of physical damage can disrupt daily commerce and fuel availability (In Food & Fuel, 2026).
Who Would Want to Threaten an ATG and Why?
Several categories of adversaries could have an interest in ATG systems. Cybercriminals may target them for disruption, extortion, vandalism, or opportunistic exploitation of poorly secured systems (DIVD, 2025; In Food & Fuel, 2026). Nation-state or state-aligned actors may view ATGs as a soft target within critical infrastructure, particularly because fuel distribution has economic and public safety significance and ATGs are often locally managed rather than defended through a uniform national architecture (BitSight, 2024; CNN, 2026). Hacktivists or malicious insiders could also target ATGs to cause embarrassment, interrupt fuel sales, or manipulate records and alarms for ideological, retaliatory, or personal reasons, although specific motive patterns vary by incident and are not always publicly confirmed (DIVD, 2025).
What Are the Recent Reports of Attacks on ATGs?
Industry and media reporting from 2026 indicates that attacks against ATGs were not merely theoretical. Energy Marketers of America circulated a cybersecurity advisory in April 2026 stating that known cyberattacks were targeting ATGs in Tennessee and that cybercriminals were targeting systems nationwide, including at least 15 affected tanks at one convenience store chain (Energy Marketers of America, 2026). In Food & Fuel reported that the Utah Department of Public Safety had identified 76 vulnerable ATGs in Utah and more than 4,000 across the United States, while also describing confirmed incidents involving unauthorized access to tank and sensor data, false alarms, and deletion of system information (In Food & Fuel, 2026).
Mainstream reporting also linked the 2026 campaign to suspected Iranian actors. CNN reported that U.S. officials believed Iranian hackers had breached fuel tank monitoring systems at gas stations across multiple states by accessing internet-connected ATGs that lacked password protection (Bertrand et al., 2026). Because attribution in fast-moving cyber incidents can evolve, that point should be treated as a reported government assessment rather than a final judicial finding (Bertrand et al., 2026).
What Measures Should Be in Place to Protect ATGs?
The strongest protective measure is to avoid exposing ATGs directly to the public internet (DIVD, 2025; Veeder-Root, 2024). Recommendations include placing ATGs behind properly configured firewalls, using VPN gateways or dedicated hardware interfaces for remote connectivity, applying source IP filtering, and setting passwords on serial ports where the feature is supported (DIVD, 2025; Veeder-Root, 2024). Operators should also audit their network configurations regularly to identify exposed systems, restrict third-party remote access to only what is necessary, and separate ATG environments from broader corporate or payment networks (DIVD, 2025; PAS, 2025).
Additional protective measures include maintaining documented incident response procedures, validating alarm and leak-detection settings, coordinating with qualified service vendors, and promptly applying vendor guidance or security updates when available (DIVD, 2025; Veeder-Root, 2024). Because some ATG risk stems from insecure deployment rather than a single patchable flaw, sound architecture, restricted connectivity, and administrative discipline remain as important as software maintenance (DIVD, 2025).
References
Bertrand, N., Lillis, K. B., & Marquardt, A. (2026, May 15). Iranian hackers have breached fuel tank readers at gas stations across multiple U.S. states, sources say. CNN. https://www.cnn.com/2026/05/15/politics/iran-hackers-tank-readers-gas-stations
BitSight. (2024, September 23). Critical vulnerabilities discovered in automated tank gauge systems. https://www.bitsight.com/blog/critical-vulnerabilities-discovered-automated-tank-gauge-systems
Dutch Institute for Vulnerability Disclosure. (2025, August 25). DIVD-2025-00005 - Exposed automated tank gauge systems. https://csirt.divd.nl/cases/DIVD-2025-00005/
Energy Marketers of America. (2026, April 13). Urgent cybersecurity advisory: Nationwide cyberattacks targeting automatic tank gauges (ATGs). https://www.fueliowa.com/latest-news.cfm/Article/INDUSTRY-NEWS/Urgent-Cybersecurity-Advisory-Nationwide-Cyberattacks-Targeting-Automatic-Tank-Gauges-ATGs/2026-4-14
In Food & Fuel. (2026, April 23). Cybersecurity alert: Automatic tank gauge systems targeted. https://www.infoodandfuel.org/news/cybersecurity-alert-automatic-tank-gauge-systems-targeted
PAS. (2025, April 24). Securing your Veeder-Root ATG: Protecting against vulnerabilities in remote connectivity. https://passtesting.com/news/securing-your-veeder-root-atg-protecting-against-vulnerabilities-in-remote-connectivity
Perplexity AI. (2026). Perplexity AI [Large language model]. https://www.perplexity.ai/
U.S. Environmental Protection Agency. (n.d.). Underground storage tanks (USTs). https://www.epa.gov/ust
Veeder-Root. (2024, August 14). Ensuring automatic tank gauge security compliance. https://www.veeder.com/us/ensuring-automatic-tank-gauge-security-compliance
AI Use Statement
Perplexity AI was employed in the research and development of this information.
=-=-=-=-=-=
Video: https://youtu.be/HbBIadarg60


