You are here

Hacktivist Targeting of Small Texas Utility Demonstrates Interest in Less-Secure OT Networks

Hacktivist Targeting of Small Texas Utility Demonstrates Interest in Less-Secure OT Networks

Created: Tuesday, October 22, 2024 - 14:31
Categories:
Cybersecurity, OT-ICS Security, Intelligence

CSO Online has published an article revealing details on a recent ICS/OT-related cyberattack targeting the water system of Stanton, Texas. Despite only serving a population of 2,700, Russia-linked hacktivists still breached the utility’s network in order to access a human-machine interface (HMI) and manipulate its settings. Due to the threat actor’s inexperience, they were only capable of randomly changing settings, resulting in the loss of some untreated water. However, a more sophisticated state adversary with the same level of access could cause more significant damage.

Small American water utilities are a popular target for patriotic hacktivists linked to U.S. adversaries due to their resource poor, target rich environments that often have low standards of security, making it easier for threat actors with less technical skill to gain credibility in their community for executing an attack that appears like it has a significant impact or gains widespread attention. While their lack of ICS/OT experience means this impact usually ends up being minimal, the consistent pace of attacks resulting in successful OT-level access demonstrates the water and wastewater sector’s vulnerability if geopolitical realities change and advanced persistent threat (APT) state actors utilize sympathetic hacktivists to do more.

Small and medium sized utility members should consider their OT security efforts in light of these current trends. Being a smaller utility can actually make an organization a more attractive target as they are perceived to have weaker security and less resources, creating a higher chance of a successful attack. Read more at CSO Online.

Previous WaterISAC Coverage on Hacktivist Threat Activity: