Loading
Blog | Water/Wastewater
Recent ActivityRecent Activity

Water Supply Security and Aging Infrastructure

Migrating legacy equipment can open your business to new cyber risks. Take a proactive approach to network security to protect your plant from cyberattacks.

Share This:

LinkedInLinkedIn
TwitterTwitter
FacebookFacebook
PrintPrint
EmailEmail
 water production and distribution concept in Water wastewater  treatment plant.
Blog | Water/Wastewater
Recent ActivityRecent Activity
Water Supply Security and Aging Infrastructure
Migrating legacy equipment can open your business to new cyber risks. Take a proactive approach to network security to protect your plant from cyberattacks.

Share This:

LinkedInLinkedIn
TwitterTwitter
FacebookFacebook
PrintPrint
EmailEmail

Until recent times, water supply security was based largely on the principle of isolation. Process control systems were a series of disconnected systems and applications over decades, air-gapped by virtue of not being connected to other computers or to the internet and making infiltration by external cybercriminals unlikely.

In the last 20 years, Critical Infrastructure providers - including water and wastewater facilities - have modernized their plants and distribution networks, integrating IT assets with operational technology (OT) and industrial control systems (ICS). The converged domains have unified information and control networks, delivering advantages such as centralized management and visibility into OT production and performance.

On the downside, it didn’t take long for cybercriminals to discover they could access OT and ICS networks by gaining a foothold on internet-facing IT systems and moving laterally into adjacent connected OT assets. With that, a new era of cyber threats was born.

In the water and wastewater industries, threat actors have infiltrated IT assets to disrupt business systems. More alarmingly, attackers have damaged equipment, discharged wastewater into environmentally sensitive areas, and implanted ransomware that disrupted operations.

Then came COVID-19. When the pandemic forced nonessential businesses to close and employees began working from home, organizations had to quickly, and often haphazardly, deploy remote access environments. The new remote access setups often lacked basic protections such as multi-factor authentication or identity and access management (IAM). Cybercriminals quickly flooded unsuspecting remote workers with phishing and ransomware attacks, often using COVID-19 lures.

Biggest challenges for Critical Infrastructure providers

  • Maintaining uptime
  • Asset visibility and governance
  • Lifecycle management and patching
  • Cybersecurity threat info
  • Incident response, disaster recovery and business continuity
  • Employee training and education
  • Technical assistance and assessments

Source: Rockwell Automation

Increasingly damaging cyber threats

Today, threat actors have shifted their focus to the OT systems of Critical Infrastructure providers. Legacy infrastructure, high impacts of downtime and service interruption make potential ransomware payouts a greater likelihood. In a recent survey, 83% of Critical Infrastructure providers reported at least one OT security breach in the prior 36 months[1].

What’s more, geopolitical tensions have risen dramatically. In recent months, conflicts have alarmed Critical Infrastructure operators and governments. Many cybersecurity experts believe that Russia’s aggressive moves on Ukraine will lead to cyberattacks on Critical Infrastructure in other parts of the world.

As in other industries, the number one cyber threat facing water and wastewater utilities is ransomware. This technique enables threat actors to infiltrate IT systems and networks, often using stolen credentials, and implant malicious software that allows them to worm into connected OT systems and encrypt data. The results can be disastrous.

For example, the high-profile breach of Colonial Pipeline in May 2021 shut down the company’s business systems and prompted it to preemptively disconnect OT systems. The entire pipeline was disabled, causing gas shortages across the eastern U.S. This attack clearly demonstrated the ability of threat actors to breach OT systems and underscored the potentially catastrophic impact of attacks on OT systems of Critical Infrastructure providers. 

For water utilities, risks hit closer to home in February 2021. A hacker gained access to a water treatment plant in Oldsmar, Fla., and hijacked operational controls. The intruder spiked the system, adding sodium hydroxide, or lye, into the facility’s water system, contaminating it to dangerous levels. Had a plant operator not noticed and returned the lye to normal levels, thousands of people could have potentially been sickened, or worse.

Following the Oldsmar attack, the FBI and other federal agencies issued a joint advisory warning of escalating attacks on IT and OT networks, systems, and devices in the water and wastewater sector. The advisory warned operators to watch out for spear phishing, ransomware, and exploitation of outdated operating systems and firmware.

Though cyberattacks continuously evolve into more sophisticated threats, the good news is, most breaches take advantage of known and solvable gaps in an organization’s IT and OT infrastructure. Given the common nature of the gaps, available solutions and rising costs of unprotected operations, cybersecurity today must be considered as a cost of doing business – an operational insurance policy towards reliable uptime.

Read about how one Canadian water and power utility solved multiple cybersecurity and operational challenges in this new Rockwell Automation case study. Need help today? Contact us to speak to an expert. 

 
Contact Us
 
 

This article was originally published in Water Conditioning & Purification International.

 

Published September 9, 2022

Top Critical Infrastructure Cyber Threats

  • Ransomware
  • Nation state-sponsored attacks
  • Insider threats
  • Cyberattacks by terrorists

Source: Rockwell Automation

 

Tags: Water Wastewater, Infrastructure

Jordan Lutz
Jordan Lutz
Sales Specialist for Networks and Security, Rockwell Automation
Jordan has been at Rockwell Automation for 8 years, currently as a Network and Security Services Specialist, where he is responsible for helping our customers mitigate risk as they plan, execute and manage their evolving network infrastructure and cybersecurity journey.
Connect:
EmailEmail
Subscribe

Subscribe to Rockwell Automation and receive the latest news, thought leadership and information directly to your inbox.

Subscribe
Recommended for You
Loading
  • Sales
  • Customer Care
  • TechConnect Support
  • General Questions
  1. Chevron LeftChevron Left Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Company Chevron RightChevron Right
  3. Chevron LeftChevron Left News Chevron RightChevron Right
  4. Chevron LeftChevron Left Blogs Chevron RightChevron Right