Hacking

Water sector in the US and Israel still unprepared to defeat cyber attacks

Expert warns that the US and Israel are still unprepared to defeat a cyber attack against organizations in the water sector.

Ariel Stern, a former Israeli Air Force captain, warns that the US and Israel are still unprepared to defeat a cyber attack against the water sector that could be orchestrated by enemy states like Iran.

Stern highlighted the dangers for providers of critical infrastructure and issued his warning following the ransomware attack that in august disrupted the IT operations of South Staffordshire Water, a UK company supplying drinking water to 1.6M consumers daily.

The intelligence officer pointed out that nations like Russia, Iran, North Korea, and China have the capabilities to hit the water sector with dramatic consequences.

“He flagged that the main adversary in this sphere for Israel is Iran, but cautioned that even after past cyber attacks on Israel’s and America’s water sector in recent years, “we don’t have top minds in the water industry.”” reported The Jerusalem Post.“Most water sector workers are civil engineers. How can they ignore it [cyber dangers]? They are very sophisticated within their domain relating to pipes, water flows, ground stabilization and chemistry,” but not with regard to blocking hackers.”

One of the main problems for the industry is the lack of proper training for cyber defense.

A cyber attack against a water facility or an organization in the water sector could have a widespread impact because many infrastructures serve wide areas including many cities and states, and protecting them it is not easy.

In many cases, the IT and OT networks are not separated and are not designed to be resilient to cyber-attacks.

Stern explained that there are 55,000 distinct water operators in the US, but the majority of the population is served by a small number of those operators that are exposed to cyber attacks. He urges these organizations to rapidly adopt necessary defense measures.

Another factor that exposes the water sector to cyber attacks is the increasing technological penetration, more automation implies more systems potentially affected by vulnerabilities.

He added that the US government is delaying in putting out an order that everyone must comply with a given cybersecurity standard.

Many organizations in the industrial water sector continue to use low-quality systems.

“The story of cybersecurity is decades-long. We didn’t make enough progress over the years for how we secured critical infrastructure of power plants, water” and other sectors.” Biden administration cyber chief Anne Neuberger told TJP. “Almost immediately after the administration took office, we started drafting the [first new cyber] executive order. It got released right after [the] Colonial [Pipeline hack], but it was after months of work. President [Joe] Biden knew the issue. It was clear that cyber was a priority.”

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, critical infrastructure)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

20 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.