JavaScript

This website requires the use of Javascript to function correctly. Performance and usage will suffer if it remains disabled.
Computer Hack Exposes Vulnerability of Cash-Strapped U.S. Water Plants

Real Truth logo

World News Desk

Computer Hack Exposes Vulnerability of Cash-Strapped U.S. Water Plants

Learn the why behind the headlines.

Subscribe to the Real Truth for FREE news and analysis.

Subscribe Now

ST. PETERSBURG, Florida (AP) – A hacker’s botched attempt to poison the water supply of a small Florida city is raising alarms about just how vulnerable the nation’s water systems may be to attacks by more sophisticated intruders. Treatment plants are typically cash-strapped and lack the cybersecurity depth of the power grid and nuclear plants.

A local sheriff’s startling announcement Monday that the water supply of Oldsmar, population 15,000, was briefly in jeopardy last week exhibited uncharacteristic transparency. Suspicious incidents are rarely reported and usually are chalked up to mechanical or procedural errors, experts say. No federal reporting requirement exists, and state and local rules vary widely.

“In the industry, we were all expecting this to happen. We have known for a long time that municipal water utilities are extremely underfunded and under-resourced, and that makes them a soft target for cyberattacks,” said Lesley Carhart, principal incident responder at Dragos Security, which specializes in industrial control systems.

“I deal with a lot of municipal water utilities for small, medium and large-sized cities. And in a lot of cases, all of them have a very small IT staff. Some of them have no dedicated security staff at all,” she said.

The nation’s 151,000 public water systems lack the financial fortification of the corporate owners of nuclear power plants and electrical utilities. They are a heterogenous patchwork, less uniform in technology and security measures than in other rich countries.

As the computer networks of vital infrastructure become easier to reach via the internet—and with remote access multiplying dizzily during the COVID-19 pandemic—security measures often get sacrificed. That appeared to be the case at Oldsmar.

Cybersecurity experts said the attack at the plant 15 miles northwest of Tampa seemed ham-handed, it was so blatant. Whoever breached Oldsmar’s plant on Friday using a remote access program shared by plant workers briefly increased the amount of lye—sodium hydroxide—by a factor of 100, according to Pinellas County Sheriff Bob Gualtieri. Lye is used to lower acidity, but in high concentrations it is highly caustic and can burn. It is found in drain cleaning products.

How the hacker got in remains unclear, Mr. Gualtieri said. But some details have emerged.

An advisory that Massachusetts posted for its public water suppliers said the intruder entered through a remote-access program called TeamViewer. It was loaded on all computers used by plant personnel, all of which were connected to the plant’s control system, the advisory said, adding that all users shared the same password—ignoring cybersecurity best practices. Further, those computers “appeared to be connected directly to the Internet without any type of firewall protection installed.”

The Massachusetts advisory said the FBI and other agencies had issued a situational report on the incident. An FBI spokesperson declined to comment on the report.

Oldsmar officials declined to questions about cybersecurity measures at the plant.

The intruder’s timing and visibility seemed almost comical to cybersecurity experts. A supervisor monitoring a plant console about 1:30 p.m. saw a cursor move across the screen and change settings, Mr. Gualtieri said, and was able to immediately reverse it. The intruder was in and out in five minutes.

The public was never in peril, though the intruder took “the sodium hydroxide up to dangerous levels,” the sheriff said. Also, plant safeguards would have detected the chemical alteration in the 24 hours to 36 hours it would have taken to affect the water supply, he said.

Mr. Gualtieri said Tuesday that water goes to holding tanks before reaching customers, and “it would have been caught by a secondary chemical check.” He did not know if the hacker was domestic or foreign, and said no one related to a plant employee was suspected. He said the FBI and Secret Service were assisting in the investigation.

Jake Williams, CEO of the cybersecurity firm Rendition Infosec, said engineers have been creating safeguards “since before remote control via cyber was a thing,” making it highly unlikely the breach could have led to “a cascade of failures” tainting Oldsmar’s water.

There has been an uptick in hacking attempts of water treatment plants in the past year, the cybersecurity firm FireEye said, but most were by novices, many stumbling on systems while using a kind of search engine for industrial control systems called Shodan. At a congressional hearing Wednesday, former Cybersecurity and Infrastructure Security Agency director Christopher Krebs said he thought it “very likely” the Oldsmar hacker was a disgruntled employee.

A 2020 paper in the Journal of Environmental Engineering found that water utilities have been hacked by a variety of intruders, including amateurs just poking around, disgruntled former employees, cybercriminals looking to profit and state-sponsored hackers. Although such incidents have been relatively few, that does not mean the risk is low and that most water systems are secure.

After Friday’s incident, Oldsmar officials disabled the remote-access system and warned other city leaders in the region—which was hosting the Super Bowl—to check their systems.

Chris Sistrunk, a technical manager at FireEye’s Mandiant division, said cybersecurity issues are relatively new for U.S. water utilities, whose biggest problems are pipes freezing and busting in winter or getting clogged with disposable wipes. The Oldsmar hack highlights the need for more training and basic security protocols, but not drastic measures such as sweeping new regulations.

“We have to do something, we can’t do nothing. But we can’t overreact,” he said.

 
  • Articles
  • SCIENCE & TECHNOLOGY
Should You Trust Big Tech?
Large tech companies harvest data to profit, but many find their intentions dubious.


FREE Email Subscription (sent weekly)


Contact Information This information is required.

Comments or Questions? – Receive a Personal Response! Field below is optional.



Send

Your privacy is important to us. The email address above will be used for correspondence and free offers from The Restored Church of God. We will not sell, rent or give your personal information to any outside company or organization.

Latest News

View All Articles View All World News Desk