Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities

Throwback Attack: Kemuri Water Company attack puts critical infrastructure at risk

  • Gary Cohen
  • February 3, 2022
Courtesy: CFE Media and Technology 
Courtesy: CFE Media and Technology 
Total
0
Shares
0
0
0
0

Almost one year ago, on Feb. 8, 2021, public officials from the city of Oldsmar, Florida, held a press conference to disclose what they called “an unlawful intrusion into the city’s water treatment system.” An unnamed hacker had connected to TeamViewer software on the workstation connected to the water treatment controls and significantly raised the levels of lye in the area’s drinking water. Fortunately, an astute plant employee noticed the workstation’s cursor seemingly moving of its own volition and performing unauthorized tasks, and the attack was thwarted.

While the last year has shown just how vulnerable critical infrastructure is to motivated threat actors – with multiple attacks on water/wastewater, oil pipelines, and the food and beverage industry – the alarm was raised well before that. One such attack was disclosed in March 2016 when Verizon’s data breach digest described a hit on an unnamed water facility it called the Kemuri Water Company. They used this pseudonym due to the sensitive nature of the breach, where hackers took advantage of outdated systems and poor cyber hygiene to access 2.5 million financial records and to manipulate the area’s water supply.

Like Oldsmar, this attack was halted before it endangered human health and safety, but it’s clear operational technology (OT) systems are at risk. At the hands of a savvier attacker, this sort of event could be calamitous.

The Kemuri Water Company attack

In the months prior to reporting the breach, the Kemuri Water Company’s IT team had begun noticing signs of a security breach – namely, valve and duct movements that were impacting many of the plant’s programmable logic controllers (PLCs). These PLCs are used to manage water flow rate and to control the chemical treatment of the water supply, making it drinkable.

Verizon Security Solutions is the telecommunications giant’s cybersecurity arm and is often enlisted by companies to help manage cybersecurity threats. When Verizon started looking into Kemuri, “They immediately noticed that the organization had a poor security architecture, with Internet-facing systems plagued by high-risk vulnerabilities known to be exploited in the wild, and outdated operation technology systems that had been more than 10 years old,” according to an article in Security Week.

Verizon said the attack happened because the company’s information technology (IT) network was using operating systems that were more than a decade old, and the supervisory control and data acquisition (SCADA) platform was powered by an ancient IBM AS/400 system released back in 1988. This IBM server was so outdated only one employee in the entire plant could operate it properly. It connected to both the plant’s IT network (thus the financial records) and OT systems (controlling the water treatment facility and water supply for surrounding areas).

The Verizon researchers believed the threat actors were able to get into the plant, and the IBM AS/400 system, via a vulnerability in the payment application web server. But because the AS/400 also controlled valve and flow control, the hackers were able to cross breach, jumping from the IT side to the OT side.

Unskilled hackers

In their report, Verizon pointed out that while the attackers managed to gain access to more than 2.5 million customer records and were able to manipulate aspects of the area’s water system – making the attack potentially dangerous – they likely didn’t realize what they were doing. Similar to Oldsmar, these hackers were unskilled in the ways of industrial control systems and possibly did not have malicious intentions toward the water supply.

That’s the rub with attacking most OT systems: Attackers need to understand how they work to create real chaos.

The Kemuri Water Company was able to remediate the changes made to the water supply, and the customer impact was minimal. But the insecurity of the plant’s networks could have led to far more serious consequences, including risk to human safety.

“KWC’s breach was serious and could have easily been more critical. If the threat actors had a little more time, and with a little more knowledge of the ICS/SCADA system, KWC and the local community could have suffered serious consequences,” Verizon’s researchers wrote in the report.

“Having internet facing servers, especially web servers, directly connected to SCADA management systems is far from a best practice. Many issues like outdated systems and missing patches contributed to the data breach — the lack of isolation of critical assets, weak authentication mechanisms and unsafe practices of protecting passwords also enabled the threat actors to gain far more access than should have been possible.”

Despite the lack of real-world damage done in the Kemuri Water Company incident, it’s essential for critical national infrastructure assets to be proactive about their cyber hygiene and take the threat from outside seriously. It’s been proven time and again their systems are vulnerable.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Gary Cohen

Gary Cohen is senior editor/product manager at CFE Media.

Related Topics
  • CFE Content
  • Featured
  • news
Previous Article
  • IT/OT

How to implement a cybersecurity maturity model for the industrial space

  • Jim Fledderjohn
  • February 3, 2022
Read More
Next Article
Courtesy: CFE Media and Technology
  • Facilities

Lack of qualified cybersecurity personnel for critical infrastructure

  • John Livingston
  • February 4, 2022
Read More
You May Also Like
Read More

How a desert water utility helped protect critical infrastructure

A robot powered by OSARO’s machine learning system picks consumer goods. Courtesy: A3/OSARO
Read More

Industrial robot utilization requires cybersecurity strategy

Courtesy: Brett Sayles
Read More

Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

Read More

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

Courtesy: CFE Media and Technology
Read More

Lack of qualified cybersecurity personnel for critical infrastructure

Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect
Read More

Cybersecurity-centered systems and fundamentals

Read More

Port and maritime cybersecurity vulnerabilities are getting more focus

Figure 1: For smaller organizations with limited network resources, it can be tempting to plug your machine directly into the business network. Courtesy: DMC
Read More

Securing your facility

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT