Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities

Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine

  • Tyler Wall
  • May 26, 2022
Courtesy: CFE Media and Technology
Total
0
Shares
0
0
0
0

In April 2020, Israel suffered a cyberattack on their water facilities were lucky enough to avoid the consequences. The threat actors attempted to hack into the industrial control systems (ICS) of five Israeli Water Authority facilities and raise the level of chlorine in the nation’s water supply.

According to FirstPoint, “The attacks were designed to compromise the ICS command and control systems for Israel’s pumping stations, sewer systems, wastewater plants and agriculture pumps.”

If successful, this would have caused major health issues to all those who drank the water, as well as severely harmed the agriculture industry. The attack was quickly thwarted, but fear of more attacks continued to loom in the air, begging the question: “What should we do now?”

Who was the attacker?

This attack happened when threat actors broke into the facilities’ programmable logic controllers (PLCs) and took control of the water supply. Though the attacker is unknown, it is alleged that Iran was behind the intrusions. According to The Washington Post, “Investigators found that the hackers routed their attempted attack through computer servers in the United States and Europe — a common tactic used by adversaries of the West.”

This could have happened because the threat actors wanted to make it seem like the U.S. attacked Israel and/or were covering up their tracks and making it difficult to discover who the real intruder was. Employees at the water facility detected a change in water chlorine levels and swiftly alerted Israel’s cybersecurity agency, who took it from there.

Israel has a history of unleashing cyberattacks on Iran. Both the United States and Israel worked together to create Stuxnet to halt uranium enrichment in Iran. Stuxnet was an aggressive malware designed to stop PLCs from working. The attack on the Israeli water facilities may have been a revenge play by the Iranian government because of Stuxnet and the continued support the U.S. gives Israel.

Iran proceeded to release a statement, refuting all evidence of their involvement. Interestingly, Iran has never conducted a successful cyberattack on another nation’s industrial equipment, as far as we know. In several instances, such as with the Bowman Avenue Dam, Iran has attacked areas of the United States’ critical infrastructure, but they were never able to do any damage.

Protection and futureproofing

In response to the attack on their water systems, Israel hired cybersecurity company SIGA OT Solutions to aid in protecting against future cyberattacks on critical infrastructure.

Co-founder and CEO of SIGA Amir Samoiloff stated, “Water utilities are at the forefront of global cyberattacks. But utilities have minimal tolerance for a downtime in service, and no utility would agree to a hacker deciding whether its infrastructure will operate or not.”

The Israeli facilities updated all firmware on the ICSs and replaced outdated equipment with newer systems. All employees of the facilities were required to change their login passwords as a precaution.

Oldsmar water treatment facility attack

In early 2021, the United States experienced a similar cyberattack at the Oldsmar water treatment facility in Florida. However, this attack was successful. The unknown hacker managed to raise the lye content in the water supply from 100 parts per million (ppm) to 11,100 ppm. This is enough lye to do damage to skin tissue upon contact. Thankfully, before any damage was done, an engineer noticed this substantial increase and decreased the lye count back to the normal number.

Both the Israeli water supply hack and the Oldsmar water treatment hack were attacks that could have had a massive toll on critical infrastructure, health nd human safety if they were successful. Even though threat actors have different intentions, it only takes one competent hacker to bring a civilization to its knees.

In order to ensure the safety of critical infrastructure, nations must continue to update their cybersecurity methods and inform their citizens of different cybersecurity strategies to protect themselves. This is why various government organizations have been rising up to the challenge of protecting critical infrastructures and growing out cybersecurity departments, budgets and control.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Tyler Wall

Tyler Wall is an Associate Editor at CFE Media and Technology.

Related Topics
  • CFE Content
  • Featured
  • news
Previous Article
  • Strategies

Will CISA recommend securing industrial control systems?

  • Dale Peterson
  • May 25, 2022
Read More
Next Article
A hacker in the background.
  • Threats & Vulnerabilities

Throwback Attack: MiniDuke malware attacks 23 countries

  • Christina Miller
  • June 3, 2022
Read More
You May Also Like
Read More

How a desert water utility helped protect critical infrastructure

A robot powered by OSARO’s machine learning system picks consumer goods. Courtesy: A3/OSARO
Read More

Industrial robot utilization requires cybersecurity strategy

Courtesy: Brett Sayles
Read More

Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

Read More

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

Courtesy: CFE Media and Technology
Read More

Lack of qualified cybersecurity personnel for critical infrastructure

Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect
Read More

Cybersecurity-centered systems and fundamentals

Read More

Port and maritime cybersecurity vulnerabilities are getting more focus

Figure 1: For smaller organizations with limited network resources, it can be tempting to plug your machine directly into the business network. Courtesy: DMC
Read More

Securing your facility

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT