Security Experts:

Connect with us

Hi, what are you looking for?



Ransomware Hit SCADA Systems at 3 Water Facilities in U.S.

Ransomware attacks hit SCADA systems at water plants

U.S. Warns of Attacks Targeting IT and OT Systems in Water Facilities

Ransomware attacks hit SCADA systems at water plants

U.S. Warns of Attacks Targeting IT and OT Systems in Water Facilities

Several U.S. government agencies issued a joint alert on Thursday to warn organizations in the water and wastewater sector about ongoing cyberattacks. The alert also describes three previously unreported ransomware attacks that impacted industrial control systems (ICS) at water facilities.

The alert was issued by the FBI, CISA, the EPA and the NSA. The agencies are aware of attacks — launched by both known and unknown threat actors — against the IT and OT (operational technology) networks of water facilities.

The agencies noted that while cyber threats are increasing across critical infrastructure sectors, the latest alert does not intend to suggest that the water and wastewater sector is targeted more than other sectors.

The new alert highlights the risks related to data, ransomware, network segmentation, network complexity, and system maintenance, and shares information on the tactics, techniques and procedures (TTPs) used by threat actors to compromise IT and OT systems and networks. It also provides recommendations on how organizations can prevent, detect, and respond to cyber threats.

The alert also provides several examples of attacks conducted over the past few years, both by malicious insiders and external threat actors. The examples include three incidents that occured this year and were not previously made public. In each of these attacks, supervisory control and data acquisition (SCADA) systems were impacted.

In one incident, which occurred in March, cybercriminals used unknown ransomware to target a water facility in Nevada. The malware affected SCADA and backup systems, but the agencies noted that the SCADA system only provided monitoring and visibility capabilities and it was “not a full industrial control system.”

Another incident occurred in July and it targeted a facility in Maine. Hackers deployed the ZuCaNo ransomware, which made its way onto a wastewater SCADA computer. “The treatment system was run manually until the SCADA computer was restored using local control and more frequent operator rounds,” the agencies said in their alert.

The third newly disclosed attack took place in August. Threat actors deployed a piece of ransomware named Ghost on the systems of a water plant in California. The ransomware was discovered roughly a month after the initial breach, after the organization noticed three SCADA servers displaying a ransomware message.

The security alert also describes two known incidents from 2019 and 2020, including one involving an insider who was charged earlier this year.

According to the government, there are more than 150,000 public water systems that provide drinking water to millions of Americans, and wastewater treatment facilities process roughly 34 billion gallons of wastewater. The U.S. classifies water and wastewater systems as national critical functions, and their disruption or corruption would “have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.”

Earlier this year, the FBI, CISA, the EPA and the Multi-State Information Sharing and Analysis Center (MS-ISAC) issued a warning after threat actors gained unauthorized access to a SCADA system at a drinking water treatment plant in Florida and allegedly attempted to poison the water supply.

Related: Probe Into Florida Water Plant Hack Led to Discovery of Watering Hole Attack

Related: Hackers Knew How to Target PLCs in Israel Water Facility Attacks: Sources

Related: Iranian Hackers Access Unprotected ICS at Israeli Water Facility

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.