Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

White House, EPA warn water sector of cybersecurity threats
Cyber Scoop ^ | March 19, 2024 | Christian Vasquez

Posted on 03/20/2024 7:57:14 AM PDT by Heartlander

White House, EPA warn water sector of cybersecurity threats

The EPA is also convening a task force to take on some of the challenges facing the sector around cybersecurity efforts.

The White House sent a stark warning to U.S. governors on Monday that “disabling” cyberattacks targeting water systems are occurring throughout the United States, in what is the Biden administration’s latest plea to state authorities to direct more resources and attention to protecting water utilities. 

In their letter, the White House and the Environmental Protection Agency invited state officials to a Thursday meeting to discuss how to improve digital defenses for the more than 150,000 utilities in the U.S. The EPA is also setting up a water sector cybersecurity task force that will outline some of the biggest challenges the sector faces and develop strategies to defend against the threat.

“Disabling cyberattacks are striking water and wastewater systems throughout the United States. These attacks have the potential to disrupt the critical lifeline of clean and safe drinking water, as well as impose significant costs on affected communities,” National Security Advisor Jake Sullivan and EPA Administrator Michael Regan wrote in the letter.

The letter pointed to the China-sponsored hacking group Volt Typhoon’s targeting of critical infrastructure sectors like drinking water in the U.S. as an example of the threat. National security officials have been sounding the alarm that Volt Typhoon’s intrusion suggests that China is pre-positioning itself to carry out disruptive attacks in the event of a conflict over Taiwan.

Speaking to reporters last week ahead of his retirement, NSA Cybersecurity Director Rob Joyce warned that federal investigators are continuing to discover victims of Volt Typhoon’s hacking campaign and that the full scope of the group’s spree remains unclear.

According to Joyce, the campaign has two primary objectives: being able to disrupt U.S. communication with and military deployment to East Asia in the event of a conflict between the United States and China, and to disable critical U.S. systems and incite widespread panic in a crisis. 

Monday’s letter, points out that water systems face attacks by other groups as well, including opportunistic attacks by a group known as the Cyber Av3ngers — an outfit linked to the Iranian Islamic Revolutionary Guard Corps. That group was responsible for attacks on devices made by the Israeli firm Unitronics that impacted several water facilities in the U.S.

While there is no evidence that the attacks were specifically targeting the water sector, the Iran-linked hacking group was only able to breach the devices due to the failure of Unitronics and the water facilities to change the default password. The letter said that basic cybersecurity precautions like changing the default password “can mean the difference between business as usual and a disruptive cyberattack.”

The EPA had attempted to impose more stringent cybersecurity rules for water utilities, but backed off that effort last year amid legal challenges to the effort. 

The EPA initiative relied on a creative approach to use the agency’s sanitation authorities to impose some measure of cybersecurity mandates on a water industry that currently lacks binding rules for how to protect its digital systems. 

The move was part of a larger attempt to add more stringent cybersecurity regulations to critical infrastructure sectors, many of which are unregulated when it comes to cybersecurity. In the absence of the EPA rules, the water sector continues to have no binding cybersecurity rules. 

Major portions of the water sector are notoriously underfunded to secure themselves against state-backed threats, and experts have called for the need for additional funds in order to improve defenses.

Monday’s letter points to existing resources for the sector through both the EPA and the Cybersecurity and Infrastructure Security Agency, and notes that the upcoming meeting will highlight efforts by the government to promote secure practices as well as discuss the need for additional action.


TOPICS: Crime/Corruption; News/Current Events
KEYWORDS:

1 posted on 03/20/2024 7:57:14 AM PDT by Heartlander
[ Post Reply | Private Reply | View Replies]

To: Heartlander

An attack before the election resulting in either a delayed election or “alternate” voting methods?

No way! /s


2 posted on 03/20/2024 7:59:15 AM PDT by brownsfan (It's going to take real, serious, hard times to wake the American public.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Heartlander

Not to worry. Top men are on the case. Top government bureaucrats who absolutely hate the country are on the case.

And why does the EPA have anything to do with this?


3 posted on 03/20/2024 7:59:53 AM PDT by Organic Panic (Democrats. Memories as short as Joe Biden's eyes.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Heartlander

That’s one thing I hate about being in town- no private well-


4 posted on 03/20/2024 8:01:56 AM PDT by Bob434
[ Post Reply | Private Reply | To 1 | View Replies]

To: Heartlander

won’t happen at our property....unless hackers can manipulate the pump handle


5 posted on 03/20/2024 8:03:57 AM PDT by abigkahuna
[ Post Reply | Private Reply | To 1 | View Replies]

To: Organic Panic
Not to worry. Top men are on the case. Top government bureaucrats who absolutely hate the country are on the case.

And why does the EPA have anything to do with this?


The EPA is involved because in the event of equipment failure that results in untreated water or a sewage overflow, it's definitely an environmental problem.

I'm a cybersecurity professional and also chairman of our local Municipal Authority (sewage). Our existing SCADA system needs VPN access, and we're replacing it with new SCADA at all our pump stations that will have even tighter security.
6 posted on 03/20/2024 8:06:44 AM PDT by BikerJoe
[ Post Reply | Private Reply | To 3 | View Replies]

To: Heartlander

“Target the GOP voting districts” according to a government leak.


7 posted on 03/20/2024 8:26:49 AM PDT by Karl Spooner
[ Post Reply | Private Reply | To 1 | View Replies]

To: Heartlander

These bureaucrats study more, warn more, and do less. They are worthless.

I’ve known for years that our water supplies would be the easiest and most effective places to sabotage the coundry.

So what are the apparatchiks toing? Telling the STATES to get busy.


8 posted on 03/20/2024 8:39:23 AM PDT by Migraine ( )
[ Post Reply | Private Reply | To 1 | View Replies]

To: Heartlander
Warnings about attacks on critical infrastructure have been made for at least thirty years. Has any progress been made in that time?

There is a real risk of serious damage to power generating equipment from cyberattacks. I suspect the biggest threat against water supplies is ransomware attacks. Indeed...

Ransomware Hit SCADA Systems at 3 Water Facilities in U.S., October 15, 2021, SecurityWeek.

Several U.S. government agencies issued a joint alert on Thursday to warn organizations in the water and wastewater sector about ongoing cyberattacks. The alert also describes three previously unreported ransomware attacks that impacted industrial control systems (ICS) at water facilities.

The alert was issued by the FBI, CISA, the EPA and the NSA. The agencies are aware of attacks — launched by both known and unknown threat actors — against the IT and OT (operational technology) networks of water facilities.

The agencies noted that while cyber threats are increasing across critical infrastructure sectors, the latest alert does not intend to suggest that the water and wastewater sector is targeted more than other sectors.

...The third newly disclosed attack took place in August 2021. Threat actors deployed a piece of ransomware named Ghost on the systems of a water plant in California. The ransomware was discovered roughly a month after the initial breach, after


Another article reports... The U.S. government agencies confirmed the Dragos assessment, warning that the tools have a virtual console with a command interface that mirrors the interface of the targeted ICS/SCADA device.

“Modules interact with targeted devices, enabling operations by lower-skilled cyber actors to emulate higher-skilled actor capabilities. The APT actors can leverage the modules to scan for targeted devices, conduct reconnaissance on device details, upload malicious configuration/code to the targeted device, back up or restore device contents, and modify device parameters.”


That used to be called "script kiddies" where low-level tech person could launch sophisticated attacks.
9 posted on 03/20/2024 8:40:39 AM PDT by ProtectOurFreedom (“Occupy your mind with good thoughts or your enemy will fill them with bad ones.” ~ Thomas More)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BikerJoe

“...untreated water or a sewage overflow”

Exactly right. And that could go on for a LONG time. In some existing attacks, the operators have had to revert to manual control while the ICS/SCADA systems were restored. That meant a lot more operators walking around and probably the loss of of a lot of measurements of water quality, chemical injection, flow rates, etc. I’d hate to be flying blind without instrumentation trying to operate a plant.


10 posted on 03/20/2024 8:43:10 AM PDT by ProtectOurFreedom (“Occupy your mind with good thoughts or your enemy will fill them with bad ones.” ~ Thomas More)
[ Post Reply | Private Reply | To 6 | View Replies]

To: BikerJoe
I was concerned about all of this when I was a WTP Operator 15-20 years ago.

I was given the "title" of System Security and the Office and Board Members would dismiss ALL of the items that were vulnerable because they didn't want to spend the money !!!

The most difficult thing I had to do was try to make the DAMNED GM and Bookkeeper's understand that we were vulnerable to attacks on our Systems from multiple levels from physical attacks and SCADA attacks.

After getting all of the necessary information to increase our System Security shot down for budget requests for the first year I finally told them that I was going to resign from the "title" because it was a waste of My time gathering information but never given the budget for any of it.

I never liked the GM, Bookkeeper and Highly Ridicules and a few years after I left that System I heard via the grapevine that that little group had been scamming Money to the tune of $250,000.00+ and were keeping it in an Account at the same Bank as the rest of the Accounts for the System. That's why I was always denied funding to Secure the System...

11 posted on 03/20/2024 9:08:59 AM PDT by mabarker1 ( (Congress- the opposite of PROGRESS!!! A fraud, a hypocrite, a liar. I'm a member of Congress!!!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: BikerJoe

Seeing similar, if all the people worried about an EMP understood the risks in and holes in critical infrastructure and energy related to legacy control systems they’d probably all crap their pants.

I’ve been privy to things over the last few years that have motivated me to the point I don’t want to even drive near certain facilities.


12 posted on 03/20/2024 9:29:21 AM PDT by Manuel OKelley
[ Post Reply | Private Reply | To 6 | View Replies]

To: Manuel OKelley

Yeah...lucky, as a Girl Scout in the 60s I learned how to build a “latrine”


13 posted on 03/20/2024 9:53:50 AM PDT by goodnesswins (The "pandemic" was never serious enough to close the US southern border.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: BikerJoe

FACT about “treated water’ no one wants to disclose:

When a human used drugs, about 1/2 of the excrement & other liquids THAT leave the body go into the “treatment” plant.

THERE IS NO KNOWN FILTER OR PROCESS THAT CAN CLEAN UP THAT WATER.

Then rest stays in the human


14 posted on 03/20/2024 12:52:25 PM PDT by ridesthemiles (not giving up on TRUMP---EVER)
[ Post Reply | Private Reply | To 6 | View Replies]

To: mabarker1
The most difficult thing I had to do was try to make the DAMNED GM and Bookkeeper's understand that we were vulnerable to attacks on our Systems from multiple levels from physical attacks and SCADA attacks.

I used a poor choice of words at first. I said our current SCADA system NEEDS VPN access. What I MEANT was that it currently USES VPN access, so we're already pretty good there.

As far as the beancounters not taking security seriously, it's a recurring theme everywhere.

I'm fortunate that my org DOES take it VERY SERIOUSLY. I put together the systems for the modern equivalent of a MASH unit, so you can imagine how important it is, being forward deployed. Yet, every time we go through the DoD audit, they tell us "You're the only ones who even seem to try!" That scares the hell out of me, because it makes me wonder what everyone else is doing (or NOT doing). I think what we're doing should be standard, not exceptional.
15 posted on 03/20/2024 7:12:57 PM PDT by BikerJoe
[ Post Reply | Private Reply | To 11 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson