[TheRecord] US govt reveals three more ransomware attacks on water treatment plants this year

Ransomware gangs have silently hit three US water and wastewater treatment facilities this year, in 2021, the US government said in a joint cybersecurity advisory published today by the FBI, NSA, CISA, and the EPA.

The attacks —which had been previously unreported— took place in March, July, and August and hit facilities in Nevada, Maine, and California, respectively.

The attacks led to the threat actors encrypting files, and in one case, even corrupting a computer used to control the SCADA industrial equipment deployed inside the treatment plant.

The three new incidents [see below] were listed as examples of what could happen when water treatment facilities ignore and fail to secure their computer networks.

In August 2021, malicious cyber actors used Ghost variant ransomware against a California-based WWS [water and wastewater system] facility. The ransomware variant had been in the system for about a month and was discovered when three supervisory control and data acquisition (SCADA) servers displayed a ransomware message.In July 2021, cyber actors used remote access to introduce ZuCaNo ransomware onto a Maine-based WWS facility’s wastewater SCADA computer. The treatment system was run manually until the SCADA computer was restored using local control and more frequent operator rounds.In March 2021, cyber actors used an unknown ransomware variant against a Nevada-based WWS facility. The ransomware affected the victim’s SCADA system and backup systems. The SCADA system provides visibility and monitoring but is not a full industrial control system (ICS).

Two other examples from previous years were also included in the joint advisory:

In September 2020, personnel at a New Jersey-based WWS facility discovered potential Makop ransomware had compromised files within their system.In March 2019, a former employee at Kansas-based WWS facility unsuccessfully attempted to threaten drinking water safety by using his user credentials, which had not been revoked at the time of his resignation, to remotely access a facility computer [see media coverage].

Three incidents that were not included in the joint advisory but which also hit water treatment had been widely reported also included:

In January 2021, a hacker tried to poison a water treatment plant that served parts of the San Francisco Bay Area [see media coverage].In February 2021, a hacker tried to alter chemical levels at the WWS facility in Oldsmar, Florida. The intrusion was detected right away, and the hacker’s modifications were reversed. [see media coverage]In May 2021, hackers breached the network of the Belle Vernon Municipal Authority in Pennsylvania [see media coverage].

The four US government agencies said that the joint advisory published today does not show an uptick in cyber activity targeting US water systems.

Instead, they said that while attacks on other sectors are more common, any malicious activity targeting the US water system “threatens the ability of WWS facilities to provide clean, potable water to, and effectively manage the wastewater of, their communities,” hence a reason to be proactive in making sure the security posture of these facilities is up to par with the role they play.

“CISA, FBI, EPA, and NSA strongly urge organizations to implement the measures described in the Recommended Mitigations section of this advisory,” the four agencies said.

The post US govt reveals three more ransomware attacks on water treatment plants this year appeared first on The Record by Recorded Future.

Source: Read More (The Record by Recorded Future)

You might be interested in …

[BleepingComputer] REvil ransomware asks $70 million to decrypt all Kaseya attack victims

REvil ransomware has set a price for decrypting all systems locked during the Kaseya supply-chain attack. The gang wants $70 million in Bitcoin for the tool that allows all affected businesses to recover their files. […] Source: Read More (BleepingComputer)

Read More

[ESET] Ransomware runs rampant, so how can you combat this threat?

All posts, ESET feed

A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim The post Ransomware runs rampant, so how can you combat this threat? appeared first on WeLiveSecurity Source: Read More (WeLiveSecurity)

Read More

Daily NCSC-FI news followup 2021-03-29

Channel Nine cyber-attack disrupts live broadcasts in Australia www.bbc.com/news/world-australia-56554641 “Our IT teams are working around the clock to fully restore our systems which have primarily affected our broadcast and corporate business units. Publishing and radio systems continue to be operational,” the company said in a statement.. See also: www.smh.com.au/technology/nine-cyber-attack-has-all-the-hallmarks-of-ransomware-without-the-ransom-20210329-p57eum.html Docker Hub images downloaded 20M times […]

Read More