‘Dangerous Stuff’: Hackers Tried to Poison Water Supply of Florida TownSomeone tried to poison a Florida city by hacking into the water trea...
Published on by Water Network Research, Official research team of The Water Network

Someone tried to poison a Florida city by hacking into the water treatment system, sheriff says
By Amir Vera, Jamiel Lynch and Christina Carrega, CNN
Updated 0407 GMT (1207 HKT) February 9, 2021
Pinellas County Sheriff Bob Gualtieri speaks at a press conference on Monday, February 8, about the attempted hacking of the city of Oldsmar's water treatment system.
Pinellas County Sheriff Bob Gualtieri speaks at a press conference on Monday, February 8, about the attempted hacking of the city of Oldsmar's water treatment system.
(CNN)A hacker gained access into the water treatment system of Oldsmar, Florida, on Friday and tried to increase the levels of sodium hydroxide -- commonly referred to as lye -- in the city's water, officials said, putting thousands at risk of being poisoned.
The incident took place Friday when an operator noticed the intrusion and watched the hacker access the system remotely. The hacker adjusted the level of sodium hydroxide to more than 100 times its normal levels, according to Pinellas County Sheriff Bob Gualtieri.
The operator immediately reduced the level back. At no time was there a significant adverse effect to the city's water supply, and the public was never in danger, Gualtieri said. It is unknown if the breach happened from someone locally, nationally or even outside of the United States.
SOURCE https://edition.cnn.com/2021/02/08/us/oldsmar-florida-hack-water-poison/index.html
Attached link
http://www.youtube.com/embed/8W0E2jnCD28Taxonomy
- Water Security
- Security
- Security
- Cyber Security
1 Comment
-
Breached water plant employees used the same TeamViewer password and no firewall Shortcomings illustrate the lack of security rigor in critical infrastructure environments. The Florida water treatment facility whose computer system experienced a potentially hazardous computer breach last week used an unsupported version of Windows with no firewall and shared the same TeamViewer password among its employees, government officials have reported. The computer intrusion happened last Friday in Oldsmar, a Florida city of about 15,000 that’s roughly 15 miles northwest of Tampa. After gaining remote access to a computer that controlled equipment inside the Oldsmar water treatment plant, the unknown intruder increased the amount of sodium hydroxide—a caustic chemical better known as lye—by a factor of 100. The tampering could have caused severe sickness or death had it not been for safeguards the city has in place. Beware of lax security According to an advisory from the state of Massachusetts, employees with the Oldsmar facility used a computer running Windows 7 to remotely access plant controls known as a SCADA—short for “supervisory control and data acquisition”—system. What’s more, the computer had no firewall installed and used a password that was shared among employees for remotely logging into city systems with the TeamViewer application Massachusetts officials wrote: The unidentified actors accessed the water treatment plant’s SCADA controls via remote access software, TeamViewer, which was installed on one of several computers the water treatment plant personnel used to conduct system status checks and to respond to alarms or any other issues that arose during the water treatment process. All computers used by water plant personnel were connected to the SCADA system and used the 32-bit version of the Windows 7 operating system. Further, all computers shared the same password for remote access and appeared to be connected directly to the Internet without any type of firewall protection installed. A private industry notification published by the FBI provided a similar assessment. It said: The cyber actors likely accessed the system by exploiting cyber security weaknesses including poor password security, and an outdated Windows 7 operating system to compromise software used to remotely manage water treatment. The actor also likely used the desktop sharing software TeamViewer to gain unauthorized access to the system. Sins and omissions The revelations illustrate the lack of security rigor found inside many critical infrastructure environments. In January, Microsoft ended support for Windows 7, a move that ended security updates for the operating system. Windows 7 also provides fewer security protections than Windows 10. The lack of a firewall and a password that was the same for each employee are also signs that the department’s security regimen wasn’t as tight as it could have been. The breach occurred around 1:30pm, when an employee watched the mouse on his city computer moving on its own as an unknown party remotely accessed an interface that controlled the water treatment process. The person on the other end changed the amount of lye added to the water from about 100 parts per million to 11,100 ppm. Lye is used in small amounts to adjust drinking water alkalinity and remove metals and other contaminants. In larger doses, the chemical is a health hazard. Christopher Krebs, the former head of the Cybersecurity and Infrastructure Security Agency, reportedly told a House of Representatives Homeland Security committee on Wednesday that the breach was “very likely” the work of “a disgruntled employee.” https://arstechnica.com/information-technology/2021/02/breached-water-plant-employees-used-the-same-teamviewer-password-and-no-firewall/