Securing Water Infrastructure: Lessons from Real OT/ICS Cyber Attacks
Zakhar Bernhardt
ICS/OT Cybersecurity Expert | Labshock & Patented NVIDIA AI IDS & 1st OT SIEM Creator | 10k+ Followers | Pentesting & SOC
Different industries have unique environments, devices, and processes. Study your field and learn from its history. Detecting and responding to attacks gets easier because tactics and methods are often repeated.
Focus on your industry!
If you missed previous article about Energy sector, feel free to check it!
Let's dive today into some real-life attacks on Water Treatment & Sewage Systems. We'll look at how these happened, what went wrong, and what we can learn from them to keep our water safe. And of course, how OT SIEM can help us.
2021 Oldsmar Water Treatment Facility
remote access directly to HMI -> easy
The Oldsmar attack highlighted vulnerabilities in remote access configurations and the importance of monitoring and securing SCADA systems in critical infrastructure.
[>] Chain of Attack
[1] Reconnaissance
[2] Weaponization
[3] Delivery
[4] Exploitation
[5] Installation
[6] Command & Control
[7] Actions
[>] How OT SIEM Can Detect Such an Attack
The Oldsmar case serves as a reminder of the need for robust cybersecurity practices in OT environments, including secure remote access, regular audits of credentials, and comprehensive monitoring systems like OT SIEM to detect and respond to threats before they cause harm.
2000 Maroochy Shire Sewage Spill
insider attack using stolen equipment -> no fun
The Maroochy attack demonstrated how physical access to OT systems can lead to environmental disasters, highlighting the need for comprehensive security measures.
[>] Chain of Attack:
[1] Reconnaissance
[2] Weaponization
[3] Delivery
[4] Exploitation
[5] Installation
[6] Command & Control
[7] Actions
[>] How OT SIEM Can Detect Such an Attack
This incident stresses the importance of securing physical access to OT environments and integrating physical security measures with cyber security protocols.
2013 Bowman Avenue Dam Hack
one more remote attack with internet-facing SCADA
This attack highlighted the risks associated with internet-connected infrastructure and the potential for cyber-physical attacks.
[>] Chain of Attack
领英推荐
[1] Reconnaissance
[2] Weaponization
[3] Delivery
[4] Exploitation
[5] Installation
[6] Command & Control
[7] Actions
[>] How OT SIEM Can Detect Such an Attack
This incident underscores the need for securing even seemingly minor infrastructure components from cyber threats, emphasizing network security, regular vulnerability assessments, and proactive monitoring.
2023 Cyber Av3ngers Attack on Water Facilities
multiple water utilities with internet-facing PLC
This attack showcased how easily accessible internet-facing devices could be compromised to disrupt services.
[>] Chain of Attack
[1] Reconnaissance
[2] Weaponization
[3] Delivery
[4] Exploitation
[5] Installation
[6] Command & Control
[7] Actions
[>] How OT SIEM Can Detect Such an Attack
This incident emphasizes the need for securing OT devices from internet exposure, enforcing strong authentication practices, and implementing comprehensive monitoring solutions.
2019 Wyatt the Wichita Wildman
remote access from former employee
Two months after resigning from his position at the Post Rock Rural Water District in Ellsworth, Kansas, 22 old man, managed to remotely access the control system of his former workplace. Still using his old login details, he was able to disrupt water services to approximately 1,500 customers by shutting down the supply.
The reasons behind actions are shrouded in mystery. According to the prosecutor, he was under such heavy influence of alcohol during the incident that he claimed to have no recollection of the events.
Conclusion
The attacks on water infrastructure underscore the urgent need for improved cybersecurity in OT environments.
-> Remote access
-> Insider threats
-> Internet-exposed devices
have all been exploited to cause disruption or demonstrate vulnerabilities.
Lessons from these incidents emphasize securing access controls, implementing strong authentication, monitoring critical systems, and integrating OT SIEM solutions.
By understanding the attack chains and weak points, you can better protect essential water services from future cyber threats.
You are at Level 2 Documentation Tree - Attacks 2/5 Skill
Don't forget to check your main Leveling Guide
And put comments or likes, it helps a lot to get your feedback ??
ICS/OT Cybersecurity Expert | Labshock & Patented NVIDIA AI IDS & 1st OT SIEM Creator | 10k+ Followers | Pentesting & SOC
2 个月Full PDF version with all ICS Attacks available here: https://www.dhirubhai.net/posts/zakharb_otics-attacks-by-sectors-with-kill-chains-activity-7287876711029903360-uDAJ
Cybersecurity Advisory | Vulnerability Mgt | Cloud Security & Governance | Cybersecurity Solution Architecture | Third-party Risk Mgt | OT & ICS Cybersecurity | Secure SDLC | Product Security | DevSecOps | GRC
2 个月Thanks for sharing.. Continuous assessment of possible attack surfaces within the OT domain is crucial.
ICS/OT Cybersecurity Expert | Labshock & Patented NVIDIA AI IDS & 1st OT SIEM Creator | 10k+ Followers | Pentesting & SOC
2 个月Next Article about Manufactory Attacks > Documentation Tree > Level 2 > Attacks 4/5 https://www.dhirubhai.net/pulse/monitoring-manufacturing-diagrams-from-real-otics-cyber-bernhardt-arm5f/?trackingId=OtFRLUm8RL2K3yTsu3CVnQ%3D%3D
IT/OT Cybersecurity & Risk Management | International Speaker | Adjunct Professor | Mentor
2 个月Zakhar, I think the risks exist for the first example, but Oldsmar itself has been recognized as human error after the fact. This doesn’t diminish the points you make, and the threat vectors as a hypothetical should be considered and mitigated nonetheless. https://industrialcyber.co/utilities-energy-power-water-waste/oldsmar-water-treatment-plant-incident-allegedly-caused-by-human-error-not-remote-access-cybersecurity-breach/
ICS/OT Cybersecurity Expert | Labshock & Patented NVIDIA AI IDS & 1st OT SIEM Creator | 10k+ Followers | Pentesting & SOC
2 个月You can find next part about Oil & Gas & Petrochemical here: https://www.dhirubhai.net/pulse/practical-ics-diagrams-from-cyberattacks-securing-oil-bernhardt-1u4wf?utm_source=share&utm_medium=member_ios&utm_campaign=share_via