Cyber Criminals Attacking Drinking Water Facilities in US

1 in 5 small water facilities have “low to no” cyber defense capability.

Mayhem and chaos the aim of big players Russia, Iran and China.

University of Maryland:

Volt Typhoon uses malicious software that penetrates internet-connected systems by exploiting vulnerabilities such as weak administrator passwords, factory default logins and devices that haven’t been updated regularly. The hackers have targeted communications, energy, transportation, water and wastewater systems in the U.S. and its territories, such as Guam.

In many ways, Volt Typhoon functions similarly to traditional botnet operators that have plagued the internet for decades. It takes control of vulnerable internet devices such as routers and security cameras to hide and establish a beachhead in advance of using that system to launch future attacks.

Operating this way makes it difficult for cybersecurity defenders to accurately identify the source of an attack. Worse, defenders could accidentally retaliate against a third party who is unaware that they are caught up in Volt Typhoon’s botnet.

Disrupting critical infrastructure has the potential to cause economic harm around the world. Volt Typhoon’s operation also poses a threat to the U.S. military by potentially disrupting power and water to military facilities and critical supply chains.

One thought on “Cyber Criminals Attacking Drinking Water Facilities in US”

Leave a Reply

Discover more from This is Not Cool

Subscribe now to keep reading and get access to the full archive.

Continue reading