www.manufacturing.net
Open in
urlscan Pro
104.22.66.237
Public Scan
Submitted URL: https://blog.onsec.io/r/e9f992a2?m=c695482f-04d3-448b-81ea-c24a15c0acf0
Effective URL: https://www.manufacturing.net/cybersecurity/blog/22928580/drowning-in-danger-the-vulnerability-of-water-treatment-facilities?r...
Submission Tags: falconsandbox
Submission: On December 12 via api from US — Scanned from IL
Effective URL: https://www.manufacturing.net/cybersecurity/blog/22928580/drowning-in-danger-the-vulnerability-of-water-treatment-facilities?r...
Submission Tags: falconsandbox
Submission: On December 12 via api from US — Scanned from IL
Form analysis
1 forms found in the DOMGET https://industrialmedia.dragonforms.com/loading.do
<form action="https://industrialmedia.dragonforms.com/loading.do" method="GET">
<div class="form-group"><label for="footer-newsletter-signup-email">Email</label><input id="footer-newsletter-signup-email" class="form-control" type="email" placeholder="example@gmail.com" name="em" required=""><input type="hidden"
name="omedasite" value="mnet_signup"></div><button class="btn btn-primary" type="submit">Sign Up</button>
</form>
Text Content
* Since 1998 * Video * Advertise * Newsletter Signup * Podcast * Sign In * Aerospace * AI * Automotive * Cybersecurity * Energy * Gen Z * Industry 4.0 * Operations * Software * Supply Chain Topics * Aerospace * AI * Automotive * Cybersecurity * Energy * Gen Z * Industry 4.0 * Operations * Software * Supply Chain Resources * Video * About Us * Contact Us * Advertise User Tools * Sign In Follow Manufacturing.net Facebook iconTwitter X icon YouTube iconLinkedIn icon * Newsletter Signup * Subscribe - Today in Manufacturing Podcast * Subscribe - Security Breach Podcast * Sign In Follow Manufacturing.net Facebook iconTwitter X icon YouTube iconLinkedIn icon * Aerospace * AI * Automotive * Cybersecurity * Energy * Gen Z * Industry 4.0 * Operations * Software * Supply Chain * Since 1998 * Video * Advertise * Newsletter Signup * Podcast * Video * About Us * Contact Us * Advertise × 1. Cybersecurity DROWNING IN DANGER: THE VULNERABILITY OF WATER TREATMENT FACILITIES Despite investments in areas like endpoint and perimeter security, breaches continue to occur. Trevor Dearing Dec 12, 2024 iStock.com/Tuachanwatthana In 2021, a cyberattacker tried to poison a Florida city's water supply by remotely accessing internal systems and tampering with levels of lye at the local water treatment facility. Thankfully, that attempt failed, but it was hardly an isolated incident. Earlier this year, hackers targeted plants in Tipton, Indiana and Aliquippa, Pennsylvania with ransomware. Last month, a hacker exploited unpatched software vulnerabilities to disrupt customer service and billing systems at American Water Works, the largest water and wastewater utility company in the U.S. Despite significant investments in preventative measures like endpoint and perimeter security solutions, breaches continue to occur. To achieve cyber resilience, water treatment facilities must expand their focus and find ways to limit the impact of a successful breach so that catastrophic outcomes are avoided. BEHIND THE RISE IN WATER TREATMENT FACILITY HACKS The Environmental Protection Agency (EPA) issued an enforcement alert earlier this year, indicating that 70 percent of the water systems exhibited "alarming cybersecurity vulnerabilities" such as outdated default passwords and insecure single login configurations. This report is especially concerning given that bad actors frequently use AI-powered technology to make their attacks difficult to detect. Once an attacker penetrates a facility’s network, they may wait undetected for weeks, sometimes months. Meanwhile, these so-called “sleeper cells” will perform reconnaissance looking for vulnerabilities to exploit across the attack surface. The longer attackers remain undetected, the more damage they can do. Because it is no longer if an attack will happen but when, prevention and detection tools alone are no longer enough. The ability to quickly discover a breach and contain an attack is key to ensuring a breach doesn’t become a cyber disaster. Fortunately, there are several steps security teams can take to mitigate the impact of an inevitable breach starting with complete, end-to-end visibility into their environment. This insight is critical to understand where risk lies therefore, what must be secured. Next, implement a Zero Trust security model – a cybersecurity framework that operates on the principal of “never trust, always verify” – to continuously verify the identity and legitimacy of users and devices trying to access critical assets. Because there will never be a “one-size-fits-all" solution for Zero Trust in critical infrastructure, organizations must tailor their zero trust strategies and implementation plans to the specific needs and vulnerabilities of their operations. By aligning efforts with organizational objectives, identifying critical risk areas, and prioritizing security around the most vital data sets, systems, and operations, meaningful progress can be made. Zero Trust technologies, including foundational tools like segmentation, will help agencies proactively prepare for breaches. Microsegmentation is key as it contains breaches by isolating critical systems which prevents attackers from spreading or moving laterally in data centers, clouds, and networks. Regular security audits and risk assessments enable ongoing identification of vulnerabilities and help determine prioritization of investments in resources and personnel. As the EPA discovered, employees can either be a strength or a vulnerability. Don’t wait for an audit to reveal outdated default passwords, insecure single login configurations, and other risky behaviors. Regularly educate employees about cybersecurity threats and best practices, not just when onboarding new hires. As the old saying goes, “practice makes perfect.” Develop and regularly update incident response plans to prepare for various attack types, including data breaches and ransomware, allowing for quick restoration of operations. Continuous monitoring with advanced tools enables real-time detection of unusual activity while investing in AI and machine learning, which enhances threat detection capabilities. Finally, collaborating with industry peers and government agencies for information sharing strengthens overall resilience against cyber threats. Water treatment facilities can significantly decrease their chances of suffering a data breach or falling victim to ransomware by implementing Zero Trust architecture, regular risk assessments, employee training, and incident response planning. Failing to act on these strategies increases the risk of financial loss and poses severe threats to public safety and trust in essential services. Prioritizing cybersecurity is not just about protecting systems, it is about ensuring public safety and maintaining trust in the essential services that communities rely on. As threats evolve, so must the strategies employed to safeguard our critical water infrastructure. This requires focusing on preparedness, flexibility, and rapid recovery. Collaborating on safeguarding this critical infrastructure and protecting water supplies from both cyber and operational risks is a collective responsibility among government agencies, utility operators and industry peers. DO YOU LIKE THIS CONTENT? Subscribe to our newsletters to receive the latest information Subscribe to our newsletters Facebook IconLinkedIn IconTwitter X iconPinterest Icon Latest in Cybersecurity Sponsored TODAY IN MANUFACTURING PODCAST December 10, 2024 COMBATTING THE QUANTUM THREAT OF HARVEST NOW, DECRYPT LATER ATTACKS December 12, 2024 DROWNING IN DANGER: THE VULNERABILITY OF WATER TREATMENT FACILITIES December 12, 2024 SECURITY BREACH: LOOKING BACK TO MOVE FORWARD December 12, 2024 Related Stories Cybersecurity BASIC STRATEGIES WILL HAVE TO EVOLVE Cybersecurity COMBATTING THE QUANTUM THREAT OF HARVEST NOW, DECRYPT LATER ATTACKS Cybersecurity SECURITY BREACH: LOOKING BACK TO MOVE FORWARD Sponsor Content TODAY IN MANUFACTURING PODCAST More in Cybersecurity Sponsored HOW TO TRACK ACTUAL COSTS AND ENSURE PROFITABILITY? Tracking actual costs is vital in industries where production costs fluctuate. Here is how to implement actual costing. December 3, 2024 Cybersecurity COMBATTING THE QUANTUM THREAT OF HARVEST NOW, DECRYPT LATER ATTACKS Quantum computers will significantly threaten current security by easily breaking current encryption algorithms. December 12, 2024 Cybersecurity SECURITY BREACH: LOOKING BACK TO MOVE FORWARD As we begin to close out 2024 and look ahead to 2025, some favorite guests are revisited. December 12, 2024 Video SECURITY BREACH: AI IS MAKING DATA YOUR MOST VULNERABLE ATTACK SURFACE The more operational, intellectual and personal data you have, the easier you are to attack. December 5, 2024 Cybersecurity MORE COMPLEX RANSOMWARE, AI AND 'MISSION-IMPOSSIBLE' STYLE HACKS Experts weigh in on how the threat landscape will continue to evolve in 2025. December 5, 2024 Cybersecurity TENABLE ADDS AUTONOMOUS PATCH MANAGEMENT The goal is to streamline the steps from discovery to remediation with customizable controls. December 4, 2024 Cybersecurity REPORT EXPLORES NETWORK SECURITY TRENDS IN MANUFACTURING Where the industry continues to struggle, and how hackers are taking advantage. December 4, 2024 Cybersecurity FORD DATA BREACH 'EMBARASSING,' BUT LIKELY MINOR Ford is blaming a third party supplier for leaked information. December 4, 2024 Cybersecurity BULLIED BY HACKERS The three reasons behind manufacturing’s cyber struggle. December 4, 2024 Cybersecurity U.S. ARMY CYBER COMMAND, DARPA EVALUATE ADVANCED CYBER THREAT DETECTION TECHNOLOGIES Developers were able to detect and analyze malicious activity. November 26, 2024 Cybersecurity WHY THE HOLIDAY SHOPPING SEASON MAY RELY ON SECURING THE MANUFACTURING INDUSTRY Investments in cybersecurity usually fail to match those made in inventory, logistics and production technology. November 21, 2024 Video SECURITY BREACH: MINIMIZING HACKS BY FOCUSING ON UPTIME Strategies need to focus less on cybersecurity cost and more on patching, IP protection and all the factors impacting uptime. November 21, 2024 Cybersecurity OVERLOOKED, BUT ESSENTIAL CYBERSECURITY MEASURES Hackers are targeting enterprises of all sizes, making prep and response vital to operational continuity. November 21, 2024 Cybersecurity MAZDAS COULD BE COMPROMISED IN MINUTES Hackers could “achieve a complete and persistent compromise of the infotainment system.” November 21, 2024 Cybersecurity HOMELAND SECURITY DEPARTMENT RELEASES FRAMEWORK FOR USING AI IN CRITICAL INFRASTRUCTURE AI could play a critical role in the power grid, water system, and other pieces of critical infrastructure. November 15, 2024 Load More Content Subscribe To Our Newsletters Subscribe to receive the latest information. Email Sign Up Topics * Aerospace * AI * Automotive * Cybersecurity * Energy * Gen Z * Industry 4.0 * Operations * Software * Supply Chain Resources * Video * About Us * Contact Us * Advertise User Tools * Newsletter Signup * Subscribe - Today in Manufacturing Podcast * Subscribe - Security Breach Podcast Follow Manufacturing.net Facebook iconTwitter X icon YouTube iconLinkedIn icon 1. About Us 2. Contact Us 3. Advertise 4. Privacy Policy 5. Terms & Conditions 6. CA Consumer Privacy Act 7. Site Map © 2024 Industrial Media, LLC. All rights reserved.