WSSC Water is investigating a ransomware attack that took place on May 24 and that targeted a portion of their network that operates non-essential business systems.
According to reports from WJZ13 Baltimore, the company removed the malware just hours later and locked out the threat, however, the attackers accessed internal files. WSSC has already notified the FBI, Maryland Attorney General, and state and local homeland security officials.
The company operates filtration and wastewater treatment plants, fortunately, the attack did not impact the water quality, but the investigation is still ongoing.
“WSSC Water continues to produce and deliver safe, clean water to 1.8 million customers in Montgomery and Prince George’s counties and at no time was the quality or reliability of our drinking water in jeopardy,” WSSC Water Police and Homeland Security Director David McDonough said in a statement. “These attacks have become more common, especially in recent weeks, and WSSC Water has prepared for this type of event,”
The company uses air-gapped networks and was able to restore encrypted files from backups.
The incident had no impact on the company because it was prepared to repel such attacks that are becoming frequent, McDonough explained.
WSSC is warning customers of possible attacks abusing the accessed data, it is recommending them to monitor their financial statements and report any suspicious transaction.
The company is going to offer affected people five years of credit monitoring with $1,000,000 in identity theft insurance at no cost.
Follow me on Twitter: @securityaffairs and Facebook
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, water facility)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.