Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

US Says National Water Supply ‘Absolutely’ Vulnerable to Hackers

Water Facility

Water Facility

Cyber defenses for US drinking water supplies are “absolutely inadequate” and vulnerable to large-scale disruption by hackers, a senior official said Thursday.

“There’s inadequate resilience to even a criminal sector,” the official said. “The threshold of resilience is not what it needs to be.”

President Joe Biden has attempted to address infrastructure cybersecurity but is limited by the fact that the vast majority of services are provided by private, not government, companies.

The scale of the challenge became clear in May last year when a ransomware attack temporarily crippled the Colonial Pipeline, a major oil pipeline network. A similar attack was carried out on JBS, one of the world’s biggest meat-processing companies.

[ READ: Remote Hacker Caught Poisoning Florida City Water Supply ]

US officials, who spoke to reporters on condition of anonymity, unrolled a plan to get water companies to cooperate with the government in a concerted effort to close up security gaps. The government is asking companies to share information of attacks and to cooperate in hardening defenses.

“The bottom line is that really after decades of us kicking the can down the road… the administration really takes steps to reverse this trend,” one official said.

However, the program, similar to initiatives already in place for the electric and natural gas sectors, is voluntary.

Advertisement. Scroll to continue reading.

There’s also a hurdle in the sheer number of different water providers — about 150,000 systems serving 300 million Americans, the official said.

[ READ: Ransomware Hit SCADA Systems at 3 Water Facilities in U.S. ]

These systems are increasingly automated, with computers managing treatment, storage and distribution. “These processes — I want to underscore this point — could all be vulnerable to cyberattacks, which could disable or manipulate monitoring control systems,” the official said.

“We’re particularly concerned that a cyberattack could be carried out, for example, to manipulate treatment processes to produce unsafe water. Also to damage water infrastructure or even to stop the flow of water,” the official said.

Related: Industry Reactions to U.S. Water Plant Hack: Feedback Friday

Related: Hack Exposes Vulnerability of Cash-Strapped US Water Plants

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Kim Larsen is new Chief Information Security Officer at Keepit

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.