www.manufacturing.net Open in urlscan Pro
104.22.66.237  Public Scan

Submitted URL: https://blog.onsec.io/r/e9f992a2?m=c695482f-04d3-448b-81ea-c24a15c0acf0
Effective URL: https://www.manufacturing.net/cybersecurity/blog/22928580/drowning-in-danger-the-vulnerability-of-water-treatment-facilities?r...
Submission Tags: falconsandbox
Submission: On December 12 via api from US — Scanned from IL

Form analysis 1 forms found in the DOM

GET https://industrialmedia.dragonforms.com/loading.do

<form action="https://industrialmedia.dragonforms.com/loading.do" method="GET">
  <div class="form-group"><label for="footer-newsletter-signup-email">Email</label><input id="footer-newsletter-signup-email" class="form-control" type="email" placeholder="example@gmail.com" name="em" required=""><input type="hidden"
      name="omedasite" value="mnet_signup"></div><button class="btn btn-primary" type="submit">Sign Up</button>
</form>

Text Content

 * Since 1998
 * Video
 * Advertise
 * Newsletter Signup
 * Podcast

 * Sign In

 * Aerospace
 * AI
 * Automotive
 * Cybersecurity
 * Energy
 * Gen Z
 * Industry 4.0
 * Operations
 * Software
 * Supply Chain

Topics
 * Aerospace
 * AI
 * Automotive
 * Cybersecurity
 * Energy
 * Gen Z
 * Industry 4.0
 * Operations
 * Software
 * Supply Chain

Resources
 * Video
 * About Us
 * Contact Us
 * Advertise

User Tools
 * Sign In

Follow Manufacturing.net
Facebook iconTwitter X icon YouTube iconLinkedIn icon
 * Newsletter Signup
 * Subscribe - Today in Manufacturing Podcast
 * Subscribe - Security Breach Podcast

 * Sign In

Follow Manufacturing.net
Facebook iconTwitter X icon YouTube iconLinkedIn icon
 * Aerospace
 * AI
 * Automotive
 * Cybersecurity
 * Energy
 * Gen Z
 * Industry 4.0
 * Operations
 * Software
 * Supply Chain
 * Since 1998
 * Video
 * Advertise
 * Newsletter Signup
 * Podcast

 * Video
 * About Us
 * Contact Us
 * Advertise



×
 1. Cybersecurity


DROWNING IN DANGER: THE VULNERABILITY OF WATER TREATMENT FACILITIES

Despite investments in areas like endpoint and perimeter security, breaches
continue to occur.

Trevor Dearing
Dec 12, 2024
iStock.com/Tuachanwatthana

In 2021, a cyberattacker tried to poison a Florida city's water supply by
remotely accessing internal systems and tampering with levels of lye at the
local water treatment facility. Thankfully, that attempt failed, but it was
hardly an isolated incident. Earlier this year, hackers targeted plants in
Tipton, Indiana and Aliquippa, Pennsylvania with ransomware. Last month, a
hacker exploited unpatched software vulnerabilities to disrupt customer service
and billing systems at American Water Works, the largest water and wastewater
utility company in the U.S.  

Despite significant investments in preventative measures like endpoint and
perimeter security solutions, breaches continue to occur. To achieve cyber
resilience, water treatment facilities must expand their focus and find ways to
limit the impact of a successful breach so that catastrophic outcomes are
avoided.


BEHIND THE RISE IN WATER TREATMENT FACILITY HACKS

The Environmental Protection Agency (EPA) issued an enforcement alert earlier
this year, indicating that 70 percent of the water systems exhibited "alarming
cybersecurity vulnerabilities" such as outdated default passwords and insecure
single login configurations. This report is especially concerning given that bad
actors frequently use AI-powered technology to make their attacks difficult to
detect.

Once an attacker penetrates a facility’s network, they may wait undetected for
weeks, sometimes months. Meanwhile, these so-called “sleeper cells” will perform
reconnaissance looking for vulnerabilities to exploit across the attack surface.
The longer attackers remain undetected, the more damage they can do.

Because it is no longer if an attack will happen but when, prevention and
detection tools alone are no longer enough. The ability to quickly discover a
breach and contain an attack is key to ensuring a breach doesn’t become a cyber
disaster. Fortunately, there are several steps security teams can take to
mitigate the impact of an inevitable breach starting with complete, end-to-end
visibility into their environment. This insight is critical to understand where
risk lies therefore, what must be secured. 

Next, implement a Zero Trust security model – a cybersecurity framework that
operates on the principal of “never trust, always verify” – to continuously
verify the identity and legitimacy of users and devices trying to access
critical assets. Because there will never be a “one-size-fits-all" solution for
Zero Trust in critical infrastructure, organizations must tailor their zero
trust strategies and implementation plans to the specific needs and
vulnerabilities of their operations.

By aligning efforts with organizational objectives, identifying critical risk
areas, and prioritizing security around the most vital data sets, systems, and
operations, meaningful progress can be made. Zero Trust technologies, including
foundational tools like segmentation, will help agencies proactively prepare for
breaches. Microsegmentation is key as it contains breaches by isolating critical
systems which prevents attackers from spreading or moving laterally in data
centers, clouds, and networks. 

Regular security audits and risk assessments enable ongoing identification of
vulnerabilities and help determine prioritization of investments in resources
and personnel. As the EPA discovered, employees can either be a strength or a
vulnerability. Don’t wait for an audit to reveal outdated default passwords,
insecure single login configurations, and other risky behaviors. Regularly
educate employees about cybersecurity threats and best practices, not just when
onboarding new hires. 

As the old saying goes, “practice makes perfect.” Develop and regularly update
incident response plans to prepare for various attack types, including data
breaches and ransomware, allowing for quick restoration of operations. 

Continuous monitoring with advanced tools enables real-time detection of unusual
activity while investing in AI and machine learning, which enhances threat
detection capabilities. Finally, collaborating with industry peers and
government agencies for information sharing strengthens overall resilience
against cyber threats. 

Water treatment facilities can significantly decrease their chances of suffering
a data breach or falling victim to ransomware by implementing Zero Trust
architecture, regular risk assessments, employee training, and incident response
planning. Failing to act on these strategies increases the risk of financial
loss and poses severe threats to public safety and trust in essential services. 

Prioritizing cybersecurity is not just about protecting systems, it is about
ensuring public safety and maintaining trust in the essential services that
communities rely on. As threats evolve, so must the strategies employed to
safeguard our critical water infrastructure. This requires focusing on
preparedness, flexibility, and rapid recovery. Collaborating on safeguarding
this critical infrastructure and protecting water supplies from both cyber and
operational risks is a collective responsibility among government agencies,
utility operators and industry peers.


DO YOU LIKE THIS CONTENT?

Subscribe to our newsletters to receive the latest information

Subscribe to our newsletters

Facebook IconLinkedIn IconTwitter X iconPinterest Icon
Latest in Cybersecurity
Sponsored

TODAY IN MANUFACTURING PODCAST

December 10, 2024

COMBATTING THE QUANTUM THREAT OF HARVEST NOW, DECRYPT LATER ATTACKS

December 12, 2024

DROWNING IN DANGER: THE VULNERABILITY OF WATER TREATMENT FACILITIES

December 12, 2024

SECURITY BREACH: LOOKING BACK TO MOVE FORWARD

December 12, 2024

Related Stories
Cybersecurity

BASIC STRATEGIES WILL HAVE TO EVOLVE

Cybersecurity

COMBATTING THE QUANTUM THREAT OF HARVEST NOW, DECRYPT LATER ATTACKS

Cybersecurity

SECURITY BREACH: LOOKING BACK TO MOVE FORWARD

Sponsor Content

TODAY IN MANUFACTURING PODCAST


More in Cybersecurity
Sponsored

HOW TO TRACK ACTUAL COSTS AND ENSURE PROFITABILITY?

Tracking actual costs is vital in industries where production costs fluctuate.
Here is how to implement actual costing.
December 3, 2024
Cybersecurity

COMBATTING THE QUANTUM THREAT OF HARVEST NOW, DECRYPT LATER ATTACKS

Quantum computers will significantly threaten current security by easily
breaking current encryption algorithms.
December 12, 2024

Cybersecurity

SECURITY BREACH: LOOKING BACK TO MOVE FORWARD

As we begin to close out 2024 and look ahead to 2025, some favorite guests are
revisited.
December 12, 2024
Video

SECURITY BREACH: AI IS MAKING DATA YOUR MOST VULNERABLE ATTACK SURFACE

The more operational, intellectual and personal data you have, the easier you
are to attack.
December 5, 2024
Cybersecurity

MORE COMPLEX RANSOMWARE, AI AND 'MISSION-IMPOSSIBLE' STYLE HACKS

Experts weigh in on how the threat landscape will continue to evolve in 2025.
December 5, 2024
Cybersecurity

TENABLE ADDS AUTONOMOUS PATCH MANAGEMENT

The goal is to streamline the steps from discovery to remediation with
customizable controls.
December 4, 2024

Cybersecurity

REPORT EXPLORES NETWORK SECURITY TRENDS IN MANUFACTURING

Where the industry continues to struggle, and how hackers are taking advantage.
December 4, 2024
Cybersecurity

FORD DATA BREACH 'EMBARASSING,' BUT LIKELY MINOR

Ford is blaming a third party supplier for leaked information.
December 4, 2024
Cybersecurity

BULLIED BY HACKERS

The three reasons behind manufacturing’s cyber struggle.
December 4, 2024
Cybersecurity

U.S. ARMY CYBER COMMAND, DARPA EVALUATE ADVANCED CYBER THREAT DETECTION
TECHNOLOGIES

Developers were able to detect and analyze malicious activity.
November 26, 2024

Cybersecurity

WHY THE HOLIDAY SHOPPING SEASON MAY RELY ON SECURING THE MANUFACTURING INDUSTRY

Investments in cybersecurity usually fail to match those made in inventory,
logistics and production technology.
November 21, 2024
Video

SECURITY BREACH: MINIMIZING HACKS BY FOCUSING ON UPTIME

Strategies need to focus less on cybersecurity cost and more on patching, IP
protection and all the factors impacting uptime.
November 21, 2024
Cybersecurity

OVERLOOKED, BUT ESSENTIAL CYBERSECURITY MEASURES

Hackers are targeting enterprises of all sizes, making prep and response vital
to operational continuity.
November 21, 2024
Cybersecurity

MAZDAS COULD BE COMPROMISED IN MINUTES

Hackers could “achieve a complete and persistent compromise of the infotainment
system.”
November 21, 2024
Cybersecurity

HOMELAND SECURITY DEPARTMENT RELEASES FRAMEWORK FOR USING AI IN CRITICAL
INFRASTRUCTURE

AI could play a critical role in the power grid, water system, and other pieces
of critical infrastructure.
November 15, 2024
Load More Content
Subscribe To Our Newsletters
Subscribe to receive the latest information.
Email
Sign Up
Topics
 * Aerospace
 * AI
 * Automotive
 * Cybersecurity
 * Energy
 * Gen Z
 * Industry 4.0
 * Operations
 * Software
 * Supply Chain

Resources
 * Video
 * About Us
 * Contact Us
 * Advertise

User Tools
 * Newsletter Signup
 * Subscribe - Today in Manufacturing Podcast
 * Subscribe - Security Breach Podcast


Follow Manufacturing.net
Facebook iconTwitter X icon YouTube iconLinkedIn icon
 1. About Us
 2. Contact Us
 3. Advertise
 4. Privacy Policy
 5. Terms & Conditions
 6. CA Consumer Privacy Act
 7. Site Map

© 2024 Industrial Media, LLC. All rights reserved.