![]() The former incident made headlines internationally. Both incidents involved the use of illicit access to a TeamViewer account. Parallels with OldsmarĪs noted previously, the attack on the Oldsmar water treatment facility took place several weeks ahead of this attack. Utility operators did not specify which water treatment facility had been breached, and which city may have been affected. “No failures were reported as a result of this incident, and no individuals in the city reported illness from water-related failures,” stated the water treatment plant. ![]() At this point, administrators replaced older passwords and reinstalled programs. Water treatment facility employees did not discover the attack until the following day. As you may know, TeamViewer can enable IT support to remotely access distributed computers or infrastructure systems.Īfter breaking a virtual entry, the cyber criminal erased programs used by the water treatment plant to manage drinking water. The cyber criminal leveraged a username and password belonging to a former employee’s TeamViewer account. “…of all the country’s critical infrastructure, water might be the most vulnerable to hackers…” reports NBC News. This Bay Area water utility attack closely followed the Oldsmar, Florida attack, which had been publicly reported several weeks earlier. This incident had not been previously reported, and is likely one of many unreported cyber attacks within the US. ![]() The individual responsible for the incident has since been identified by law enforcement. On January 15 th, a cyber criminal attempted to poison a water treatment facility that serves the San Francisco Bay Area. “If you could imagine a community center run by two old guys who are plumbers, that’s your average water treatment plant,” said an anonymous cyber security consultant.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |