Cyber Threats to the Australian Water & Sewerage Sector
Ahead of the operational launch of CI-ISAC Australia on 6 February 2023, CI-ISAC is doing rolling releases of cyber threat overviews for each of the 11 SOCI Act prescribed critical infrastructure sectors. You can stay tuned by 'following' our LinkedIn page or going to the CI-ISAC website as they are released.
In 2000, a cyber-attack against water and sewerage infrastructure in Maroochydore, Queensland, became the world’s first publicly known example of a successful hack against a SCADA infrastructure system to cause significant damage. For cybersecurity professionals worldwide, this Critical Infrastructure (CI) attack remained the most studied malicious operational technology (OT) cyber incident until the world-famous Stuxnet cyber-attack in 2010; extensive analyses by MIT and MITRE are a testament to this.
Today, water and sewerage systems remain vulnerable to cyber-physical attacks
With a population of 26 million people spread across an expansive continent, it is a testament to Australia’s infrastructure investment that 94% of Australians have access to a mains water supply. Adopting new technology to manage geographically dispersed water infrastructure has resulted in significant operational and economic benefits; however, internet-facing control systems
The water and sewerage sector faces a significant concentration risk in terms of supply, with 7% (22) of the roughly 300 water and sewerage entities servicing 70% of the national population. Adopting a collective defence approach
Australia spends more than $6 billion annually on water and wastewater treatment services and endured one of the worst droughts of the last 100 years in 2019. Ensuring the continued availability of water and water treatment is a critical issue, with the Australian government recently establishing the 10-year/USD$2.5 billion National Water Grid Fund.
A cyber-attack against water infrastructure has the potential to affect public health and safety, cause expensive systemic damage, and result in personal and commercial data being stolen. The sector is vulnerable to numerous cyber-attack Tactics, Techniques, and Procedures (TTPs) employed by Threat Actors both locally and abroad who seek to compromise IT/OT networks, systems, and devices.
A subset of the common TTPs worth noting for the water and sewerage sector are as follows:
领英推荐
??Spear phishing personnel to deliver malicious payloads, including ransomware [T1556];
??The exploitation of internet-connected services and applications that enable remote access to water and sewerage networks [T1210];
??The exploitation of unsupported or outdated operating systems and software [T1190].
Exploiting outdated operating systems and software is particularly challenging for the water and sewerage sector as already limited resources are prioritised towards physical infrastructure upgrades instead of IT/OT modernisation. Most water and sewerage entities won’t have the capability to share ‘machine to machine’ intelligence so an industry partner is needed as the enabler/facilitator for cyber threat intelligence (CTI) and collective defence via other means. By taking on the role of the trusted advisor/facilitator for the intelligence exchange, an industry organisation would ensure the overall quality of information flowing through its systems and out to the CI members.
‘Forewarned is Forearmed’, and by joining a trusted cyber community of Critical Infrastructure owners and operators responsible for protecting their water and sewerage assets, you can join the movement to share contextual intelligence and proactively approach cyber defence. Cyber threat activity shared into the CI-ISAC ecosystem by one member has the potential to help others across the sector and the broader CI community stop similar attacks before they impact operations.
CI-ISAC, as a not-for-profit, member driven organisation, with a mission to serve its members and in turn their customers by building a trusted community and leveraging the best technology in its intelligence platform, and drawing on resources and resilience through its industry peer-to-peer network to anticipate, mitigate, and respond to cyber threats.
More information on CI-ISAC's sovereign intelligence-sharing capability can be found on CI-ISAC's official website.
Security Consultant | Squad Lead | Trusted Advisor
2 年Okay so whats the elephant in the room here ? What is the friction these critical infrastructure asset owners have when it comes to modernizing and securing their assets? Are we just dealing with years of neglect and poor inventory controls ? Leading to a complete lack of visibility ? Id prefer my water kept clean, so if any organisation needs someone with experience in auditing and building secure OT networks lets have the easy discussion to resolve this.
Australian Water Association
Non-Executive Director | National Security | Emerging Tech | Cybersecurity
2 年CTI sharing in this sector is important especially as the sector has tended to adopt tech ahead of a lot of other sectors. This adoption of IoT, cloud etc has meant that things like ransomware in corporate IT can cause availability issues in OT. However in my experience the sector still has a lot to go in terms of basics ie, asset visibility -> asset management -> vulnerability management. The added benefit is delivering value for a set of stakeholders (asset owners) that we need to absolutely influence.
Cyber Guy | People Leader | Business Builder
2 年Rue Maharaj, take a look