Securing Water Infrastructure: Lessons from Real OT/ICS Cyber Attacks
Different industries have unique environments, devices, and processes. Study your field and learn from its history. Detecting and responding to attacks gets easier because tactics and methods are often repeated.
Focus on your industry!
If you missed previous article about Energy sector, feel free to check it!
Let's dive today into some real-life attacks on Water Treatment & Sewage Systems. We'll look at how these happened, what went wrong, and what we can learn from them to keep our water safe. And of course, how OT SIEM can help us.
2021 Oldsmar Water Treatment Facility
remote access directly to HMI -> easy
The Oldsmar attack highlighted vulnerabilities in remote access configurations and the importance of monitoring and securing SCADA systems in critical infrastructure.
[>] Chain of Attack
[1] Reconnaissance
[2] Weaponization
[3] Delivery
[4] Exploitation
[5] Installation
[6] Command & Control
[7] Actions
[>] How OT SIEM Can Detect Such an Attack
The Oldsmar case serves as a reminder of the need for robust cybersecurity practices in OT environments, including secure remote access, regular audits of credentials, and comprehensive monitoring systems like OT SIEM to detect and respond to threats before they cause harm.
2000 Maroochy Shire Sewage Spill
insider attack using stolen equipment -> no fun
The Maroochy attack demonstrated how physical access to OT systems can lead to environmental disasters, highlighting the need for comprehensive security measures.
[>] Chain of Attack:
[1] Reconnaissance
[2] Weaponization
[3] Delivery
[4] Exploitation
[5] Installation
[6] Command & Control
[7] Actions
[>] How OT SIEM Can Detect Such an Attack
This incident stresses the importance of securing physical access to OT environments and integrating physical security measures with cyber security protocols.
2013 Bowman Avenue Dam Hack
one more remote attack with internet-facing SCADA
This attack highlighted the risks associated with internet-connected infrastructure and the potential for cyber-physical attacks.
[>] Chain of Attack
Recommended by LinkedIn
[1] Reconnaissance
[2] Weaponization
[3] Delivery
[4] Exploitation
[5] Installation
[6] Command & Control
[7] Actions
[>] How OT SIEM Can Detect Such an Attack
This incident underscores the need for securing even seemingly minor infrastructure components from cyber threats, emphasizing network security, regular vulnerability assessments, and proactive monitoring.
2023 Cyber Av3ngers Attack on Water Facilities
multiple water utilities with internet-facing PLC
This attack showcased how easily accessible internet-facing devices could be compromised to disrupt services.
[>] Chain of Attack
[1] Reconnaissance
[2] Weaponization
[3] Delivery
[4] Exploitation
[5] Installation
[6] Command & Control
[7] Actions
[>] How OT SIEM Can Detect Such an Attack
This incident emphasizes the need for securing OT devices from internet exposure, enforcing strong authentication practices, and implementing comprehensive monitoring solutions.
2019 Wyatt the Wichita Wildman
remote access from former employee
Two months after resigning from his position at the Post Rock Rural Water District in Ellsworth, Kansas, 22 old man, managed to remotely access the control system of his former workplace. Still using his old login details, he was able to disrupt water services to approximately 1,500 customers by shutting down the supply.
The reasons behind actions are shrouded in mystery. According to the prosecutor, he was under such heavy influence of alcohol during the incident that he claimed to have no recollection of the events.
Conclusion
The attacks on water infrastructure underscore the urgent need for improved cybersecurity in OT environments.
-> Remote access
-> Insider threats
-> Internet-exposed devices
have all been exploited to cause disruption or demonstrate vulnerabilities.
Lessons from these incidents emphasize securing access controls, implementing strong authentication, monitoring critical systems, and integrating OT SIEM solutions.
By understanding the attack chains and weak points, you can better protect essential water services from future cyber threats.
You are at Level 2 Documentation Tree - Attacks 2/5 Skill
Don't forget to check your main Leveling Guide
And put comments or likes, it helps a lot to get your feedback ☢️
ICS/OT Cybersecurity Consultant | Creator of 1st OT SIEM & NVIDIA AI IDS Patented | Incident Response & SOC Expert | Industrial Pentester OSCP | OT Cybersecurity Writer
1wArnold Murphy Stuart Thomas Leandro Correia .'. Desmond Lamptey Fadi Hassan thanks a lot for reposting!
Senior OT/ICS/IT & Cybersecurity Consultant
1wVery helpful
Information Security Enthusiast || ICS/OT Security Aspirant || Lifelong learner
1wZakhar Bernhardt : Your posts are amazing..the visuals and flow of explanation are great.. Learnings: - OT environments are no longer targeted by specific adversaries like Nation State or APT'. Even Hacktivist and Cyber Criminals have realised the importance and flaws in OT. - Reviewing the infra on a timely basis should be incorporated in the security culture. - Access- Reviews to be done on a regular basis to avoid resigned employees have unwanted access - Visibility using the right tools is important for understanding abnormal behaviour and patterns
Cybersecurity Advisory | Vulnerability Mgt | Cloud Security & Governance | Cybersecurity Solution Architecture | Third-party Risk Mgt | OT & ICS Cybersecurity | Secure SDLC | Product Security | GRC
1wZakhar Bernhardt. Sure, cyber attack on water system will have devastating impact on human lives. And that is why this critical infrastructure sector requires solid cybersecurity controls and network monitoring. I like the layout of your article showcasing the attack vector, target, impact and lesson. And the chain of attack. These helped in putting the attack scenarios into perspective. 3 key vectors highlighted in your article: Remote Access: Control: For 3rd-parties, remote access only allowed when there’s authorized need, not left exposed 24x7. In addition, deploy 2FA at the appropriate level. Internet-connected devices (SCADA, PLC): Control: These critical OT assets should not have been exposed to the Internet in the first place. An external attack surface management tool could have detected these exposed Internet-facing OT assets. Shodan can do this. Insider Threats: this is a bit difficult to control. An authorized user with a malicious intent is an insider threat. An accidental or error-prone activity by an authorized user is also an insider threat. Excellent article as usual. Thanks.
Founder & CEO @ SecureClaw & GrassDew IT Solutions 🛡️ Doctorate in Cybersecurity from SSBM Switzerland 👉 We Offer🕵️Virtual CISO | VAPT | SAST | BDSLCCI | Software Development | Teleservices
1wGood explanation!