WHAT NEXT AFTER THE WATER SUPPLY ATTACK?

WHAT NEXT AFTER THE WATER SUPPLY ATTACK?

The attack against the water supply in Florida, lands worry about the potential for future and copycat attacks against other lightly defended water treatment systems in small towns worldwide and what can be done to stem such incursions.

Last year, we saw water supply falling victims of similar attack in Israel and now in Florida - In the Florida case, criminals used remote access tools to gain a foothold and change chemical levels in the water supply, ramping them up to potentially hazardous levels.

That’s worrisome, including because hackers would normally have to gain specific knowledge of water treatment management systems, a very specific target demographic. That’s not a “spray and pray” attack; it’s targeted and takes some time to craft and deploy.

According to media reports, TeamViewer had been replaced as the remote access solution in use at this water treatment plant, yet it was still running, exposing the plant to the internet through a non-required interface.

And while this incident wasn’t a super stealthy zero-day attack, chances are that somebody was interested in the target for some time.

WHAT CAN OTHER WATERSUPPLY DO?

They should:-

1. Add/enforcing 2FA.

2. Patch systems.

3. Implement good change control processes.

4. Train staff on cyberhygiene.

5. Implement IDS and install reputable AV.

6. Do Vulnerability assessment regularly.



要查看或添加评论,请登录

Yusuph Kileo的更多文章

  • Fighting Ransomware Attacks

    Fighting Ransomware Attacks

    substantial increase of Ransomware attacks across the global, has drawn considerable attention in recent years – and…

  • 2021 CYBERSECURITY CHECKLIST: PROTECT YOUR SYSTEMS AND NETWORKS FROM A CYBERATTACK.

    2021 CYBERSECURITY CHECKLIST: PROTECT YOUR SYSTEMS AND NETWORKS FROM A CYBERATTACK.

    As the pandemic continues to unfold, organizations are operating in a real-life multi-stress environment, facing cyber…

    6 条评论
  • PREVENTING CYBERATTACKS BEGIN WITH YOU

    PREVENTING CYBERATTACKS BEGIN WITH YOU

    If you have not yet fallen victim of Cyberattacks, you should know it is just a matter of time before you fall victim –…

    2 条评论
  • MORE DATA LEAKS FROM MOBILE DEVISES IS EXPECTED THIS YEAR

    MORE DATA LEAKS FROM MOBILE DEVISES IS EXPECTED THIS YEAR

    We anticipate more data leaks from mobile devices through suspicious mobile applications and fake Wi-Fi access points…

    5 条评论
  • SECURITY CHECKLIST ON SOCIAL MEDIA

    SECURITY CHECKLIST ON SOCIAL MEDIA

    We have witness a rapid growing of social media users – We have more than two billions active social media accounts. Do…

    4 条评论
  • Addressing Fraud challenges in mobile financial services - Nairobi

    Addressing Fraud challenges in mobile financial services - Nairobi

    With the fast evolving and advancing digital financial services through technology enablement that has surpassed…

    2 条评论
  • CYBERAWARE: RECOGNISING SIGNIFICANCE OF CYBER SECURITY AWARENESS.

    CYBERAWARE: RECOGNISING SIGNIFICANCE OF CYBER SECURITY AWARENESS.

    In terms of global communications, the world is going through the most exciting period in human history. Now people are…

  • KNOWING WEAKEST LINKS TO CYBER SECURITY CHAIN

    KNOWING WEAKEST LINKS TO CYBER SECURITY CHAIN

    Despite growing threats in the cyberspace, only a few organisations consider this situation as critical,and have put…

    3 条评论
  • THE INSIDER THREATS ARE GROWING

    THE INSIDER THREATS ARE GROWING

    We now leave the most exciting period in human history, Life has been simplified with the existing technology – Our…

  • PREVENTING SECURITY BRITCHES

    PREVENTING SECURITY BRITCHES

    Authentication: This involves the prevention of unauthorized access to computer systems. Authentication takes a variety…

    2 条评论

社区洞察

其他会员也浏览了