An unidentified attacker accessed the computer systems of a water treatment facility in the US, altering sodium hydroxide levels in the potable water supply. With attacks on critical infrastructure increasingly common, this incident should not come as a surprise. Basic cyber-security hygiene could have lessened the likelihood of accessing the systems, but the network of the facility was not adequately secured. Simple attack techniques took advantage of the plant’s security weaknesses, including poor passwords shared across the plant, and widespread use of end-of-life software. These problems are very likely present in other water treatment plants, as well as other critical facilities. This incident casts a spotlight on the need to appropriately secure critical infrastructure systems, which may be mistakenly thought of as well guarded.
The People’s Republic of China-linked advanced persistent threat group “APT31” reportedly cloned and deploy...
Most Recent Flipbooks
Main story: Ransom Cartel and REvil: Partners in cybercrime?
Main story: Hacktivists fan flames of Iranian anti-regime protests
Main story: ProxyNotShell spells déjà vu for MS Exchange Server defenders
Main story: Rogue ex-developer leaks LockBit 3.0 builder
Main story: Uber compromised by Lapsus$'s resurgence
Main story: Cyber attacks shock the Italian energy sector
Main story: Back to school for students and ransomware groups