Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Ransomware Hit SCADA Systems at 3 Water Facilities in U.S.

Ransomware attacks hit SCADA systems at water plants

U.S. Warns of Attacks Targeting IT and OT Systems in Water Facilities

Ransomware attacks hit SCADA systems at water plants

U.S. Warns of Attacks Targeting IT and OT Systems in Water Facilities

Several U.S. government agencies issued a joint alert on Thursday to warn organizations in the water and wastewater sector about ongoing cyberattacks. The alert also describes three previously unreported ransomware attacks that impacted industrial control systems (ICS) at water facilities.

The alert was issued by the FBI, CISA, the EPA and the NSA. The agencies are aware of attacks — launched by both known and unknown threat actors — against the IT and OT (operational technology) networks of water facilities.

The agencies noted that while cyber threats are increasing across critical infrastructure sectors, the latest alert does not intend to suggest that the water and wastewater sector is targeted more than other sectors.

The new alert highlights the risks related to data, ransomware, network segmentation, network complexity, and system maintenance, and shares information on the tactics, techniques and procedures (TTPs) used by threat actors to compromise IT and OT systems and networks. It also provides recommendations on how organizations can prevent, detect, and respond to cyber threats.

The alert also provides several examples of attacks conducted over the past few years, both by malicious insiders and external threat actors. The examples include three incidents that occured this year and were not previously made public. In each of these attacks, supervisory control and data acquisition (SCADA) systems were impacted.

In one incident, which occurred in March, cybercriminals used unknown ransomware to target a water facility in Nevada. The malware affected SCADA and backup systems, but the agencies noted that the SCADA system only provided monitoring and visibility capabilities and it was “not a full industrial control system.”

Another incident occurred in July and it targeted a facility in Maine. Hackers deployed the ZuCaNo ransomware, which made its way onto a wastewater SCADA computer. “The treatment system was run manually until the SCADA computer was restored using local control and more frequent operator rounds,” the agencies said in their alert.

Advertisement. Scroll to continue reading.

The third newly disclosed attack took place in August. Threat actors deployed a piece of ransomware named Ghost on the systems of a water plant in California. The ransomware was discovered roughly a month after the initial breach, after the organization noticed three SCADA servers displaying a ransomware message.

The security alert also describes two known incidents from 2019 and 2020, including one involving an insider who was charged earlier this year.

According to the government, there are more than 150,000 public water systems that provide drinking water to millions of Americans, and wastewater treatment facilities process roughly 34 billion gallons of wastewater. The U.S. classifies water and wastewater systems as national critical functions, and their disruption or corruption would “have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.”

Earlier this year, the FBI, CISA, the EPA and the Multi-State Information Sharing and Analysis Center (MS-ISAC) issued a warning after threat actors gained unauthorized access to a SCADA system at a drinking water treatment plant in Florida and allegedly attempted to poison the water supply.

Related: Probe Into Florida Water Plant Hack Led to Discovery of Watering Hole Attack

Related: Hackers Knew How to Target PLCs in Israel Water Facility Attacks: Sources

Related: Iranian Hackers Access Unprotected ICS at Israeli Water Facility

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...