Hacking

Water sector in the US and Israel still unprepared to defeat cyber attacks

Expert warns that the US and Israel are still unprepared to defeat a cyber attack against organizations in the water sector.

Ariel Stern, a former Israeli Air Force captain, warns that the US and Israel are still unprepared to defeat a cyber attack against the water sector that could be orchestrated by enemy states like Iran.

Stern highlighted the dangers for providers of critical infrastructure and issued his warning following the ransomware attack that in august disrupted the IT operations of South Staffordshire Water, a UK company supplying drinking water to 1.6M consumers daily.

The intelligence officer pointed out that nations like Russia, Iran, North Korea, and China have the capabilities to hit the water sector with dramatic consequences.

“He flagged that the main adversary in this sphere for Israel is Iran, but cautioned that even after past cyber attacks on Israel’s and America’s water sector in recent years, “we don’t have top minds in the water industry.”” reported The Jerusalem Post.“Most water sector workers are civil engineers. How can they ignore it [cyber dangers]? They are very sophisticated within their domain relating to pipes, water flows, ground stabilization and chemistry,” but not with regard to blocking hackers.”

One of the main problems for the industry is the lack of proper training for cyber defense.

A cyber attack against a water facility or an organization in the water sector could have a widespread impact because many infrastructures serve wide areas including many cities and states, and protecting them it is not easy.

In many cases, the IT and OT networks are not separated and are not designed to be resilient to cyber-attacks.

Stern explained that there are 55,000 distinct water operators in the US, but the majority of the population is served by a small number of those operators that are exposed to cyber attacks. He urges these organizations to rapidly adopt necessary defense measures.

Another factor that exposes the water sector to cyber attacks is the increasing technological penetration, more automation implies more systems potentially affected by vulnerabilities.

He added that the US government is delaying in putting out an order that everyone must comply with a given cybersecurity standard.

Many organizations in the industrial water sector continue to use low-quality systems.

“The story of cybersecurity is decades-long. We didn’t make enough progress over the years for how we secured critical infrastructure of power plants, water” and other sectors.” Biden administration cyber chief Anne Neuberger told TJP. “Almost immediately after the administration took office, we started drafting the [first new cyber] executive order. It got released right after [the] Colonial [Pipeline hack], but it was after months of work. President [Joe] Biden knew the issue. It was clear that cyber was a priority.”

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, critical infrastructure)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

7 hours ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

12 hours ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

17 hours ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

20 hours ago

Linux variant of Cerber ransomware targets Atlassian servers

Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…

1 day ago

Ivanti fixed two critical flaws in its Avalanche MDM

Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can…

2 days ago

This website uses cookies.